facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Testimonial From the North Pole

A Testimonial From the North Pole

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

0 Comments
Continue reading

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

0 Comments
Continue reading

As Technology Has Evolved. So Have Our Holiday Traditions

As Technology Has Evolved. So Have Our Holiday Traditions

Merry Christmas! We know that for the small business owner, even on Christmas day, business doesn’t completely stop. Sure you can spend time with loved ones and take a couple days off from the grind, but tomorrow is another day. According to one study, people are gifting technology more than ever, so much so that new traditions that include technology, are replacing the once-held notion that technology was a distraction.

0 Comments
Continue reading

The Most Wonderful Time of the Year...for Thieves

The Most Wonderful Time of the Year...for Thieves

In terms of data loss and theft, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on either your irreverence to the issue as a whole, or to be so distracted that you make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets during the holiday.

0 Comments
Continue reading

This Halloween, Hackers are Pretending to Be You

This Halloween, Hackers are Pretending to Be You

Halloween is a great time for people of all ages to let loose and embrace their spookier, darker side--even though they aren’t. For hackers, however, every day is like Halloween, but with ill intentions. Hackers will pretend to be someone they’re not in order to scam you out of sensitive data or personal information. By identifying their tricks, you can keep hackers from getting their treats.

0 Comments
Continue reading

Tales from the Haunted Server Room

b2ap3_thumbnail_shock_n_awe_it_400.jpgIt was a dark and stormy night, as it sometimes is on Halloween. It’s a time when kids and adults alike enjoy dressing up as scary monsters and partaking in some good old-fashioned trick-or-treating. You’re pulling a late night at the office, and you hear a sound emanating from your server room; an unsavory clicking sound that echoes through the recesses of your office. What do you do?

0 Comments
Continue reading

Arguably the Most Important Computer in Star Wars

b2ap3_thumbnail_death_star_may_the_fourth_400.jpgToday is known the world over as Star Wars Day (May the 4th be with you). We want to take this opportunity to look at the technology of one of our favorite movie franchises. Given how much exciting technology there is in the fictional Star Wars universe, picking just one technology can be difficult. Since we work with computers, let’s look at one of the most important computers in the film, the X-wing targeting computer.

0 Comments
Continue reading

World Backup Day is Upon Us: How Do You Backup Your Data?

b2ap3_thumbnail_world_backup_day_2_400.jpgA quick scan of the past year’s headlines will show that a data-loss scenario resulting from a hack can unexpectedly hit any business, big or small. Your company needs to have a data backup solution in place, and it’s imperative that backups are taken regularly. Has it been awhile since you last backed up your data?

0 Comments
Continue reading

Rockin’ Around with Managed IT

b2ap3_thumbnail_rockin_around_with_managed_it_400.jpgAn IT parody song to the tune of “Rockin’ Around the Christmas Tree.”

0 Comments
Continue reading

4 Holiday Gifts for the Business Professional in Your Life

b2ap3_thumbnail_holidy_technology_gifts_400.jpgIt’s the holiday season, and everyone is scrambling to throw together the perfect gift for the technology lover. With so many spectacular consumer electronics available, it can be overwhelming just thinking about all of the possibilities. Before you get in over your head thinking up the best gifts, try checking out this list of cool and practical tech.

0 Comments
Continue reading

Competition Drives Black Friday Sales and Can Enhance Your Business Too!

b2ap3_thumbnail_friendly_competition_400.jpgFor American retailers, Black Friday is the biggest and most competitive day on the shopping calendar. Consumers reap the rewards of all of this competition by taking advantage of deep discounts on their favorite items. Competition like this is a win-win for both parties! Can your business benefit like this from an infusion of friendly competition?

0 Comments
Continue reading

Are Ghosts Haunting the Halls of Your Servers?

b2ap3_thumbnail_haunted_pc_400_20141031-133424_1.jpgThough not everyone believes them, we all know about the horror stories of the spirits of the dead that linger in this world, haunting locations where no one dares to tread. Every culture, though their beliefs vary, contains them to some degree. Their purpose is unknown, and they are thought to be caused by unfulfilled desires or regrets. But regardless of whether or not you believe in them, you better believe that your business can very well be haunted by ghost servers.

0 Comments
Continue reading

Managed IT Services: The Perfect Gift for Business Dad!

b2ap3_thumbnail_happy_fathers_day_400.jpgDo you know what to get Dad this Father's Day to show him that you appreciate all that he's done for you? If he's a business owner, we have the perfect gift for him!

That's right - Computerware's managed IT services! We don't mean buy them outright for him, but by suggesting our services to him, you can give him the greatest gift of all: peace of mind and a whole lot more cash in his pocket. Here are four good reasons to outsource Dad's IT services.

0 Comments
Continue reading

The Holiday Spirit in the Christmas Cloud

b2ap3_thumbnail_chtree400.jpgIn Charles Dickens' tale, A Christmas Carol, Ebenezer Scrooge learned an important lesson that most of us already know. In order to get the best out of people, you need to give the best of yourself. For those of you who don't remember the 19th-century novella, Scrooge is a business owner who only cares about money and because of this, draws the disdain of his family and his extremely patient subordinate, Bob Cratchit. On Christmas eve, he's visited by three Christmas spirits, and as he gets a look at the reality of how his actions affect those around him, he wakes up on Christmas morning with a new perspective.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Malware Hosted Solutions Saving Money IT Services Efficiency IT Support Google Small Business User Tips Computer Smartphones Innovation Mobile Devices Quick Tips Business Continuity Gadgets Disaster Recovery Network VoIP Microsoft Office Android Social Media Productivity Data Backup Mobile Office Virtualization Collaboration Communication Server Smartphone Data Recovery Upgrade Mobile Device Management communications Miscellaneous Tech Term Cybersecurity IT Support Ransomware Windows 10 Phishing Unified Threat Management Windows Passwords Facebook Operating System Holiday Remote Monitoring Vendor Management Analytics Apps Automation BYOD Remote Computing Managed IT services Mobile Computing Users WiFi BDR Outsourced IT Internet of Things Marketing Apple Mobile Device Data Management The Internet of Things Firewall History Artificial Intelligence Alert Managed IT Services Browser App Save Money Cloud Computing Encryption Big data IT Consultant Bring Your Own Device Antivirus Two-factor Authentication Gmail Bandwidth Office Maintenance Printer Content Filtering Windows 10 Going Green Health Spam Office 365 Hard Drives Training Budget Help Desk Wireless Technology Outlook Saving Time Windows 8 Search Business Technology Managed IT Cybercrime Virus Tech Support Best Practice Information Technology Lithium-ion Battery Cost Management Hiring/Firing Healthcare Access Control Computers VPN It Management Travel Blockchain Education Recovery Employer-Employee Relationship Update Hacking IBM Phone System Money Document Management PowerPoint Running Cable Proactive IT SaaS File Sharing Customer Service Administration Hard Drive Law Enforcement Applications Intranet Twitter Government Compliance Managed Service Mobility Website Humor Data storage iPhone Risk Management Legal Save Time Networking Information Regulations Augmented Reality Company Culture Sports Computer Repair Disaster User Computing Hosted Solution End of Support Social Networking Social Robot Fax Server Wireless Data Security Securty Google Maps DDoS Patch Management Solid State Drive Data Loss Social Engineering Avoiding Downtime Scam Black Market Flexibility Cryptocurrency Word Retail Data Breach Laptop Password Cortana Business Growth Value Business Intelligence Project Management Excel Digital Digital Payment Websites Router Downtime Management Telephony Hacker Machine Learning Customer Relationship Management Current Events Paperless Office Vulnerabilities Telephone Systems Comparison Tablet Software as a Service Unified Communications Settings User Error Trending Co-managed IT Presentation Gaming Console Cooperation Public Cloud Vendor Uninterrupted Power Supply Mouse Specifications Safety Text Messaging Vulnerability Virtual Desktop Webcam Bitcoin Programming Identity Theft Statistics Network Congestion Lifestyle Documents Data Protection Windows 7 IT service Entertainment Heating/Cooling Distribution Virtual Reality Politics Storage Bluetooth Streaming Media Conferencing Automobile Inbound Marketing Emails Chromebook Voice over Internet Protocol Redundancy Computing Infrastructure Hack Monitoring How To eWaste Google Docs Net Neutrality Pain Points Private Cloud Experience Chrome Download Evernote Virtual Assistant Cleaning Monitors Office Tips Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Distributed Denial of Service USB Mobile Technology YouTube Microsoft Excel G Suite Bookmark Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Nanotechnology Social Network Licensing Human Resources Debate Drones Desktop Finance Hacks Physical Security Webinar Application Harddrive Google Play Google Drive Windows Server 2008 Relocation Tablets GPS Microsoft 365 Archive Business Cards Service Level Agreement Banking Botnet Processor Spyware Mobile Payment Skype Startup Asset Tracking Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Sync External Harddrive Browsers Electricity Printing Username Point of Contact Screen Reader Customer Resource management User Tip Gamification Notifications CCTV Digital Signature Security Cameras Reliable Computing 3D Solutions Ebay Music Piracy Upload Business Metrics Computer Malfunction Teamwork Navigation Thin CLient cache Television switches Writing Smart Tech Professional Services Fiber-Optic Database In Internet of Things Best Practives Smart Phones Data Analysis WannaCry Downloads Upgrades HTML LiFi Analytic Telephone System PDF Corporate Profile Recycling Mobile Security GDPR Time Management Freedom of Information Multi-Factor Security Cost Scalability Microserver Adminstration Integration Pirating Information Software License Trends Motion Sickness Best Available Keyboard Tech Leadership Assessment SharePoint Product Reviews Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Google Calendar Deep Learning Devices Messenger Tracking Domains Visible Light Communication Memory Get More Done Proxy Server VoIP UTM Content Rental Service Meetings Public Speaking Modem Touchscreen News Legislation Error Cabling Turn Key Electronic Medical Records Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Printer Server Shortcut Term Consultation IT consulting Troubleshooting Recording Content Management email scam Addiction Wi-Fi Administrator Trojan Entrepreneur Directions Technology Tips Business Managemenet Accountants A.I. Books Workers Fake News Advertising Flash Environment Dark Web Audit CIO Multi-factor Authentication Supercomputer Organize HIPAA Upselling SSID Wireless Headphones Telephone Worker Electronic Payment Health IT Video Surveillance Staffing Google Wallet online Currency Migration Connected Devices Competition Processing Data Warehousing Windows XP Business Owner Logistics Emergency Hard Drive Disposal Society Network Management Managed IT Service Saving ZTime Access Displays Equifax Fleet Tracking Reading Samsung Productuvuty Printers Managing Stress CrashOverride Regulation Transportation 3D Printing Capital

toner1