facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

We Get You the Right Tech

We Get You the Right Tech

What kind of hardware and software solutions make up your technology infrastructure? You should know that all businesses have different needs, and not everyone will manage and acquire the same tools. Some businesses don’t even know what their needs are, prompting many to turn to technology professionals for assistance. We want to be the ones you turn to for your hardware and software needs.

0 Comments
Continue reading

Tip of the Week: Consider Killing a Server Before it Kills Your Business

Tip of the Week: Consider Killing a Server Before it Kills Your Business

We thought we would do something a little bit different for this week’s tip. Instead of giving you some software tips or some kind of thing you can use to make your business more productive, we thought that we’d help you with the thing that you already know, but may not realize:

0 Comments
Continue reading

Identifying All Office Technology

Identifying All Office Technology

The average business deploys plenty of technology, that much is true. You work alongside it--and often directly with it--but if you had to explain what it is to another person, could you? If you can’t, we’ve got your back. This month we will take you through a tour of the various technologies that your business uses, where they can be found, and what their general purpose is.

0 Comments
Continue reading

Tip of the Week: How to Troubleshoot Your Device’s Sound Problems

Tip of the Week: How to Troubleshoot Your Device’s Sound Problems

There’s nothing quite as annoying as a computer whose volume is either too low or too high. Today’s tip is dedicated to helping you assess and respond to sound problems with your computer or device.

0 Comments
Continue reading

Cable Modem Considerations

Cable Modem Considerations

For those of us that don’t have access to fiber-to-the-home or LTE Internet, the cable modem is a must-have. You can always rent a modem from your ISP or you can purchase your own, but no matter what your decision is, knowing what to look for when modem shopping is advantageous. Let’s take a look.

0 Comments
Continue reading

Does Retail Finally Need Technology?

Does Retail Finally Need Technology?

Unlike the office environment, the technology used in retail has been relatively stagnant. The times are changing, though. It’s been a long time coming, but the technology used in the retail environment is finally evolving to meet the growing needs of organizations. Unfortunately, this has been met with the challenges of implementing said technology in the industry.

0 Comments
Continue reading

Simple and Smart Audio Recording Technology

PMR61_400_400

Transparency in government is a key component of any free society, and U.S. law encourages government agencies to make records available to the public whenever possible.

0 Comments
Continue reading

How Service Offerings Can Save Your Precious Capital

How Service Offerings Can Save Your Precious Capital

Managing and maintaining the plethora of solutions your business depends on can be challenging, to say the least. For some businesses, however, the most difficult part of using multiple solutions can often be not just managing them, but paying for them. Thankfully, there is a great service out there that uses the cloud to make all of this easier for small businesses.

0 Comments
Continue reading

Get the Technology Your Company Requires

Get the Technology Your Company Requires

The hardware that makes up your business’ IT infrastructure can be difficult to manage--particularly if that’s not where your specialty lies. While the first step to having a successful IT strategy is to have the proper hardware, acquiring it can be rather challenging at times, especially if your business doesn’t have an in-house IT department. Sometimes an outsourced approach is the best way to gain the best tech for your goals.

0 Comments
Continue reading

Information Technology: How to Handle the Inevitable

Information Technology: How to Handle the Inevitable

Sometimes it might feel like your technology never works as you want it to. You might try to open up a software application only to find an error message that keeps you from being productive. The error doesn’t go away no matter how many times you reload the application. How can you eliminate these issues that threaten to derail your productivity throughout the workday?

0 Comments
Continue reading

Chromebooks Deserve More Credit than You Might Think

Chromebooks Deserve More Credit than You Might Think

It can be easy to dismiss the simple Chromebook as a limited solution, a one-trick pony of technology. However, while this may have once been true of the devices, more recent models are capable of much more than their predecessors. We’ll address a few misconceptions people have about, and against, Chromebooks.

0 Comments
Continue reading

Holiday Shopping Just Got Easier--Check out These Gadgets!

Holiday Shopping Just Got Easier--Check out These Gadgets!

It can often be difficult to figure out what to get someone for a holiday gift. Fortunately, there is almost always a new gadget or gizmo that can make someone with particular interests happy. In this blog, we’ll go over a few cool gadgets that make excellent special-interest gifts.

0 Comments
Continue reading

A Beginner’s Guide to Running Cables in Your Office

A Beginner’s Guide to Running Cables in Your Office

Arguably one of the most important parts of running a business is the physical infrastructure of your office environment. This involves ensuring that the cabling of all network assets is properly implemented. Unfortunately, this is easier said than done, as no two businesses will utilize the same setup. We’ll walk you through some of the variables that you’ll need to consider during the cabling process, and what you can do to make it easier to handle.

0 Comments
Continue reading

When Your Business' Hardware Fails, You’ve Got Options

When Your Business' Hardware Fails, You’ve Got Options

With computing and networking hardware shown to be unreliable over time, businesses need to have a strategy in place to fix or replace their hardware. This is especially the case when it comes to servers. Replacing a server is expensive, but when it fails, you aren’t left with a lot of choices. What’s your plan for dealing with hardware failure? Here are three options.


The first option is to replace your malfunctioning hardware. This may seem like the most efficient approach, until you realize how much information your organization has. When replacing a server, you have to sort through all of your files to find out which ones are mission-critical and which ones aren’t, and you need to have a data recovery option in place that will migrate the information onto your new device. Not thinking this process through can cost your company a massive amount in new hardware costs, third-party migration and setup costs, and downtime.

The second option is to lease new hardware. If your organization can’t sustain the large capital outlays of purchasing new hardware, many vendors offer a hardware leasing program that allows you to get the technology you need at a price you can afford. Some technology companies offer Hardware as a Service (HaaS), which provides businesses with new hardware and frequent refreshes for a monthly fee. This strategy reduces support costs and often comes with proactive managed services.

The third option is to virtualize your IT infrastructure. In this way you can leverage the cloud to your business’ advantage. You won’t be able to escape the migration costs, but the large upfront costs of replacing your hardware would be eliminated. There are a few different types of cloud computing models that give your organization choices on how your data is monitored and protected. A cloud platform is typically monitored and managed by the hosting provider, eliminating management costs and minimizing support costs.

Whichever option you choose, having IT support is important to keep your organization’s hardware in good working order. Your staff may not be savvy enough with technology to fix issues, and they likely don’t have the time for it. Therefore, having around-the-clock IT support is important for the efficiency of your staff, as well as their own peace of mind if they encounter issues.

At Computerware, we provide 24/7 support via our help desk, and we go above and beyond to help organizations mitigate their hardware costs through our proactive monitoring and management service. By leaning on our RMM service, your business will have less network maintenance to deal with, and you will get more out of your hardware investments. By keeping your network running smoothly through our proactive monitoring, we can tell if your hardware is on its way out and we can advise you if it is time for a refresh. We also keep your network free of malware, resulting in less downtime and higher degrees of efficiency.

If your company is continually running into hardware problems, consider contacting one of our certified IT technicians to schedule a network and infrastructure assessment. Call us at (703) 821-8200 to learn more.

0 Comments
Continue reading

Tip of the Week: How to Get Wi-Fi in Your Car and Track its Whereabouts

Tip of the Week: How to Get Wi-Fi in Your Car and Track its Whereabouts

The Internet of Things is quickly becoming a major part of today’s consumer-based industry. One of the best examples of this is the use of smart car technology. A great example of this comes from a company called Zubie, which sells a handy device meant to provide car owners with tracking analytics, access to diagnostic systems, and even the capability to connect to Wi-Fi.

0 Comments
Continue reading

Intel’s Confusing Name Change Shows Why Researching Products is Important

Intel’s Confusing Name Change Shows Why Researching Products is Important

Renowned tech company Intel has announced their next line of laptop processors, but an unfortunate aside caused significant frustration amongst the IT market. Intel has broken from the tradition of releasing new processors each September which will be improved upon later. Instead, Intel has jumped the gun and released a new processor, rather than improve their Skylake processor from the previous year.


The processor has been named Kaby Lake, which is optimized for 4K video handling and editing and can improve battery life. However, it’s not these changes that have resulted in confusion; rather, it’s something as simple as a name change that has IT professionals up in arms. Prior to Intel’s most recent release, there were two lines of processors which were given the titles of Core i and Core M. The 'i' line of processors is the stronger of the two, while the M processors were reserved almost exclusively for tablets. The confusion came when the Core M processors were renamed to represent the 'i' series.

Keep in mind that there has been no change in the capabilities of the processors. The change is in name only. The difference can only be seen in the product numbers. What this means is that when someone is researching components for a workstation, they may accidentally purchase the wrong i7 processor (a significantly less powerful one). The only way they can really determine the change is by digging into the product’s specifications--which, if you’re not technically inclined, won’t mean anything.

This leads to our next point; while the average consumer may not notice a difference in performance, business owners want technology that meets the specific needs of their organization. Granted, this is assuming that a business owner has the time and resources available to research the available solutions. The problem here is that the average business owner probably doesn’t have this time available to them, and it takes much more than identifying the proper product number to make educated decisions about your IT infrastructure.

If your business doesn’t want to waste time sifting through product numbers and specifications, Computerware is happy to help. Our skilled technicians can help your organization procure only the best technical assets that are designed to meet your business’s specifications. To learn more, reach out to us at (703) 821-8200.

0 Comments
Continue reading

Prioritize on End-Users for a Successful IT Strategy

Prioritize on End-Users for a Successful IT Strategy

Technology grows at an incredible rate, and businesses need to take advantage of new features to get ahead of their competition. But is simply adopting new technology enough to get ahead? After all, new technology solutions mean nothing if your end-users don’t know how to use them.

0 Comments
Continue reading

Managing Your Computer Equipment Doesn’t Have to Be a Headache

Managing Your Computer Equipment Doesn’t Have to Be a Headache

Every business has hardware, like workstations, servers, and other devices, that are critical to its operational efficiency. However, managing your hardware can be tricky, especially if you’re a small or medium-sized business that has limited time and resources. If your business doesn’t have a process put in to place to handle hardware inventory and deployment, perhaps it’s time that you consider implementing one.

0 Comments
Continue reading

4 Ways to Responsibly Take Care of Your Old Technology

4 Ways to Responsibly Take Care of Your Old Technology

It’s a routine move for businesses to perform a “hardware refresh” and procure new technology. It’s certainly nice to get new technology, but what’s your plan for handling your old devices? Instead of just tossing it in the garbage, make sure to consider all of your options in order to properly handle your old equipment.


Priority 1: Your Old Data
First and foremost, you need to properly take care of your data. To be clear, this involves more than dragging and dropping your files into the Recycle Bin. When deleting files this way, it doesn’t actually remove the data from the hard drive, which means that your files can still be recovered. Instead, you’re going to want to wipe your old hard drive, a procedure that completely erases all data on the drive.

If you’re going to dispose of your old hard drive, you’ll actually want to physically destroy it. This can effectively be done by using a tool like a drill press, or a couple of swings with a good ol’ sledgehammer ought to do the trick. Once you toss your hard drive in the garbage, you can’t be certain where it will end up. As improbable as it sounds, there’s actually a chance that your old hard drive could end up in the hands of a trash-collecting hacker. Therefore, you shouldn’t throw away any data that has a chance of being recovered. Computerware can assist you with properly wiping and destroying your old hard drive.

Donate Your Old Technology to Charity
There are a lot of charitable organizations out there that would be happy to accept your old computer equipment. However, you’ll at least want to do them the courtesy of donating something that’s useful, instead of pawning off your technology problems onto them. For example, we recommend contacting the charity first to see if they even need your old equipment, instead of randomly showing up with a truckload of random computers.

One relatively inexpensive way to make sure that you’re donating quality-used equipment is to equip your old technology with a new hard drive before donating it. Given the fact that the average hard disk drive has a lifespan of five years, you don’t want to gift a computer that has a high chance of crashing. Plus, if you swap out the old hard drive for a new one, you’ll mitigate the risk of having your files recovered from the old drive and used for nefarious purposes.

Repurpose and Reuse Old Hardware
Your old computer may still yet have a use around the office by way of repurposing and reusing it. Consider these examples:

  • Using an old PC for a print or fax server will alleviate network traffic (though it would require reconfigurations to be made).
  • Keeping the computer on hand for spare parts.
  • Keeping a working computer on hand as a spare workstation, just in case an operational PC runs into an issue and needs to be temporarily swapped out.

Don’t Forget About Recycling
If you must dispose of your old technology, it’s preferred that you do the responsible thing and recycle it. One reason for such a move is due to the toxic metals that make up electrical components. By simply chucking an old PC into the landfill, these chemicals will leak into the environment and cause problems. Recycling your old technology doesn’t have to be a burden. Computerware will happily do it for you.

When it comes to getting rid of your old technology, it’s best to have a plan. Our knowledgeable technicians are standing by to assist with any of your company’s technology needs. To learn more, reach out to Computerware at (703) 821-8200.

0 Comments
Continue reading

Tip of the Week: Find Out the Ideal Amount of RAM Your Workstation Needs

Tip of the Week: Find Out the Ideal Amount of RAM Your Workstation Needs

If your computer is underperforming, then it may not have enough RAM to do what you’re asking it to do. When selecting a PC, how do you know if you have enough RAM?

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Business Computing Cloud Software Business Management Hackers Data Microsoft Backup Workplace Tips Hardware Managed Service Provider Productivity Network Security Email Business Hosted Solutions Malware Saving Money IT Services Efficiency IT Support Google User Tips Small Business Computer Innovation Productivity Smartphones Mobile Devices Quick Tips Business Continuity Gadgets VoIP Social Media Microsoft Office Data Backup Network Android Collaboration Data Recovery Disaster Recovery Mobile Office Server Upgrade Communication communications Virtualization IT Support Smartphone Mobile Device Management Miscellaneous Windows Phishing Cybersecurity Tech Term Ransomware Windows 10 Facebook Operating System Unified Threat Management Passwords Apps Holiday Vendor Management Remote Monitoring Analytics Automation Users BYOD Remote Computing Managed IT services Mobile Computing BDR Mobile Device Internet of Things WiFi The Internet of Things Data Management Marketing Outsourced IT Apple Firewall History Managed IT Services Artificial Intelligence Browser Alert App Save Money Spam Two-factor Authentication Cloud Computing IT Consultant Encryption Big data Windows 10 Going Green Office 365 Bring Your Own Device Help Desk Maintenance Antivirus Printer Bandwidth Gmail Business Technology Office Health Content Filtering Best Practice Information Technology Lithium-ion Battery Cost Management Windows 8 Outlook Hiring/Firing Hard Drives Training Budget Wireless Technology Computers Saving Time Tech Support Search VPN Virus Managed IT Government Employer-Employee Relationship Cybercrime Hacking Networking IBM Information Money Document Management Healthcare Access Control Customer Service It Management Travel Blockchain Education Managed Service Recovery Update Phone System Password Legal Save Time Downtime Regulations Augmented Reality PowerPoint SaaS Running Cable Proactive IT Humor File Sharing Administration Hard Drive Law Enforcement Applications Twitter Intranet Mobility Website Compliance Avoiding Downtime Data Loss Data storage iPhone Risk Management Business Intelligence Private Cloud Cortana Business Growth Value Project Management Excel Digital Digital Payment Hacker Websites Router Management Telephony Machine Learning Customer Relationship Management Paperless Office Vulnerabilities Fax Server Telephone Systems Comparison Tablet Company Culture Sports Computing Computer Repair Disaster User Social Networking Hosted Solution End of Support Social Robot Windows 7 Wireless Data Security Securty Google Maps DDoS Patch Management Solid State Drive Social Engineering Flexibility Scam Black Market Retail Cryptocurrency Word Current Events Data Breach Laptop Co-managed IT Experience Chrome User Error Download Evernote Virtual Assistant Cleaning Monitors Office Tips Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Lifestyle Distributed Denial of Service USB Mobile Technology YouTube Presentation Gaming Console Cooperation Software as a Service Unified Communications Settings Trending Public Cloud Vendor Uninterrupted Power Supply Mouse Specifications Safety Text Messaging Vulnerability Virtual Desktop Webcam Bitcoin Programming Identity Theft Statistics IT service Network Congestion Documents Data Protection Distribution Entertainment Teamwork Heating/Cooling Politics Storage Virtual Reality Downloads Bluetooth Streaming Media Conferencing Automobile Inbound Marketing Emails Chromebook Voice over Internet Protocol Redundancy Computing Infrastructure Hack Pain Points Monitoring How To eWaste Google Docs Net Neutrality IT consulting Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Shortcut Term Consultation Accountants Webinar A.I. Books Workers Troubleshooting Recording Content Management email scam Addiction Wi-Fi Administrator Entrepreneur Directions Technology Tips Business Managemenet HIPAA Upselling SSID Fake News Advertising Flash Environment Dark Web Free Resource Audit CIO Multi-factor Authentication Supercomputer Data Warehousing Windows XP Wireless Headphones Telephone Worker Electronic Payment Health IT Employee/Employer Relationship Video Surveillance Staffing Google Wallet online Currency Migration Connected Devices Competition Processing Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Network Management Managed IT Service Saving ZTime Access Displays IP Address Microsoft Excel G Suite Bookmark Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship Google Drive Windows Server 2008 Nanotechnology Social Network Licensing Human Resources Employer/Employee Relationships Debate Drones Desktop Best Practives Finance Hacks Physical Security Application Harddrive Google Play Skype Startup Asset Tracking Relocation Tablets GPS Microsoft 365 Archive Business Cards Service Level Agreement Banking Botnet Processor Spyware Mobile Payment Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Microserver Sync External Harddrive Browsers Electricity Printing Username Point of Contact Screen Reader Customer Resource management User Tip Proactive Maintenance Gamification Notifications CCTV Digital Signature Security Cameras Smart Tech Reliable Computing 3D Solutions Ebay Music Piracy Get More Done Upload Business Metrics Computer Malfunction Navigation Thin CLient cache Television switches Writing Professional Services Fiber-Optic Database Turn Key In Internet of Things Smart Phones Data Analysis WannaCry Upgrades HTML Printer Server GDPR Time Management Freedom of Information LiFi Analytic Telephone System PDF SQL Server Corporate Profile Recycling Mobile Security Trojan Product Reviews Multi-Factor Security Organize Cost Scalability Adminstration Integration Pirating Information Software License Trends Motion Sickness Best Available Keyboard Tech Leadership Assessment SharePoint Messenger Tracking Domains Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Google Calendar Deep Learning Devices Modem Touchscreen News Visible Light Communication Memory Proxy Server Azure VoIP UTM Content Rental Service Meetings Public Speaking 3D Printing Capital Productuvuty Printers Managing Stress Regulation CrashOverride

toner1