facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Business Resolutions for a Successful 2020

Tip of the Week: Business Resolutions for a Successful 2020

Happy New Year! As tradition dictates that we all select a resolution to improve ourselves for the coming year, why not do the same for your business and its operations? For our first tip of the year, we’re sharing how to come up with resolutions that could help you start off this year on the right footing.

0 Comments
Continue reading

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

0 Comments
Continue reading

Cybersecurity Awareness in Retail

Cybersecurity Awareness in Retail

Cybercrime is at a record high and today’s businesses are the ones that take the brunt of the issues. For the retail business, cybersecurity has a couple of different faces. For Cybersecurity Awareness Month, we thought we’d talk a little bit about the retail space and how businesses are securing their customers’ information. 

0 Comments
Continue reading

A Testimonial From the North Pole

A Testimonial From the North Pole

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

0 Comments
Continue reading

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

0 Comments
Continue reading

As Technology Has Evolved. So Have Our Holiday Traditions

As Technology Has Evolved. So Have Our Holiday Traditions

Merry Christmas! We know that for the small business owner, even on Christmas day, business doesn’t completely stop. Sure you can spend time with loved ones and take a couple days off from the grind, but tomorrow is another day. According to one study, people are gifting technology more than ever, so much so that new traditions that include technology, are replacing the once-held notion that technology was a distraction.

0 Comments
Continue reading

The Most Wonderful Time of the Year...for Thieves

The Most Wonderful Time of the Year...for Thieves

In terms of data loss and theft, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on either your irreverence to the issue as a whole, or to be so distracted that you make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets during the holiday.

0 Comments
Continue reading

This Halloween, Hackers are Pretending to Be You

This Halloween, Hackers are Pretending to Be You

Halloween is a great time for people of all ages to let loose and embrace their spookier, darker side--even though they aren’t. For hackers, however, every day is like Halloween, but with ill intentions. Hackers will pretend to be someone they’re not in order to scam you out of sensitive data or personal information. By identifying their tricks, you can keep hackers from getting their treats.

0 Comments
Continue reading

Tales from the Haunted Server Room

b2ap3_thumbnail_shock_n_awe_it_400.jpgIt was a dark and stormy night, as it sometimes is on Halloween. It’s a time when kids and adults alike enjoy dressing up as scary monsters and partaking in some good old-fashioned trick-or-treating. You’re pulling a late night at the office, and you hear a sound emanating from your server room; an unsavory clicking sound that echoes through the recesses of your office. What do you do?

0 Comments
Continue reading

Arguably the Most Important Computer in Star Wars

b2ap3_thumbnail_death_star_may_the_fourth_400.jpgToday is known the world over as Star Wars Day (May the 4th be with you). We want to take this opportunity to look at the technology of one of our favorite movie franchises. Given how much exciting technology there is in the fictional Star Wars universe, picking just one technology can be difficult. Since we work with computers, let’s look at one of the most important computers in the film, the X-wing targeting computer.

0 Comments
Continue reading

World Backup Day is Upon Us: How Do You Backup Your Data?

b2ap3_thumbnail_world_backup_day_2_400.jpgA quick scan of the past year’s headlines will show that a data-loss scenario resulting from a hack can unexpectedly hit any business, big or small. Your company needs to have a data backup solution in place, and it’s imperative that backups are taken regularly. Has it been awhile since you last backed up your data?

0 Comments
Continue reading

Rockin’ Around with Managed IT

b2ap3_thumbnail_rockin_around_with_managed_it_400.jpgAn IT parody song to the tune of “Rockin’ Around the Christmas Tree.”

0 Comments
Continue reading

4 Holiday Gifts for the Business Professional in Your Life

b2ap3_thumbnail_holidy_technology_gifts_400.jpgIt’s the holiday season, and everyone is scrambling to throw together the perfect gift for the technology lover. With so many spectacular consumer electronics available, it can be overwhelming just thinking about all of the possibilities. Before you get in over your head thinking up the best gifts, try checking out this list of cool and practical tech.

0 Comments
Continue reading

Competition Drives Black Friday Sales and Can Enhance Your Business Too!

b2ap3_thumbnail_friendly_competition_400.jpgFor American retailers, Black Friday is the biggest and most competitive day on the shopping calendar. Consumers reap the rewards of all of this competition by taking advantage of deep discounts on their favorite items. Competition like this is a win-win for both parties! Can your business benefit like this from an infusion of friendly competition?

0 Comments
Continue reading

Are Ghosts Haunting the Halls of Your Servers?

b2ap3_thumbnail_haunted_pc_400_20141031-133424_1.jpgThough not everyone believes them, we all know about the horror stories of the spirits of the dead that linger in this world, haunting locations where no one dares to tread. Every culture, though their beliefs vary, contains them to some degree. Their purpose is unknown, and they are thought to be caused by unfulfilled desires or regrets. But regardless of whether or not you believe in them, you better believe that your business can very well be haunted by ghost servers.

0 Comments
Continue reading

Managed IT Services: The Perfect Gift for Business Dad!

b2ap3_thumbnail_happy_fathers_day_400.jpgDo you know what to get Dad this Father's Day to show him that you appreciate all that he's done for you? If he's a business owner, we have the perfect gift for him!

That's right - Computerware's managed IT services! We don't mean buy them outright for him, but by suggesting our services to him, you can give him the greatest gift of all: peace of mind and a whole lot more cash in his pocket. Here are four good reasons to outsource Dad's IT services.

0 Comments
Continue reading

The Holiday Spirit in the Christmas Cloud

b2ap3_thumbnail_chtree400.jpgIn Charles Dickens' tale, A Christmas Carol, Ebenezer Scrooge learned an important lesson that most of us already know. In order to get the best out of people, you need to give the best of yourself. For those of you who don't remember the 19th-century novella, Scrooge is a business owner who only cares about money and because of this, draws the disdain of his family and his extremely patient subordinate, Bob Cratchit. On Christmas eve, he's visited by three Christmas spirits, and as he gets a look at the reality of how his actions affect those around him, he wakes up on Christmas morning with a new perspective.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Productivity Business Productivity Email Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation Collaboration VoIP IT Support Quick Tips Data Backup IT Support Smartphones Mobile Devices Network communications Business Continuity Microsoft Office Gadgets Cybersecurity Disaster Recovery Data Recovery Social Media Android Upgrade Communication Mobile Office Server Smartphone Virtualization Phishing Mobile Device Management Miscellaneous Ransomware Vendor Management Holiday Tech Term Windows 10 Windows Passwords Apps Outsourced IT Managed IT Services Operating System Unified Threat Management Remote Monitoring Mobile Device Internet of Things Facebook Users BDR Automation Apple Mobile Computing Data Management Analytics Managed IT services BYOD Remote Computing Windows 10 WiFi The Internet of Things Training Marketing History Artificial Intelligence Cloud Computing Browser Save Money Firewall App Big data Spam Help Desk Alert Encryption Business Technology IT Consultant Information Technology Office 365 Bandwidth Two-factor Authentication Office Health Cybercrime Content Filtering Going Green Hard Drives Bring Your Own Device Budget Access Control Maintenance Managed IT Printer Antivirus Windows 7 Gmail Government Healthcare Recovery Employer-Employee Relationship Retail Lithium-ion Battery Best Practice Cost Management Windows 8 Hiring/Firing Managed Service Outlook Wireless Technology Saving Time Computers VPN Tech Support Virus Search Information Data Loss iPhone Phone System Networking IBM Project Management Money Hacking Document Management Computing Augmented Reality Humor Travel Customer Service It Management Data Security Education Update Blockchain Remote Work Risk Management Covid-19 Legal Current Events Regulations Data Breach Save Time Password Value Downtime Applications Vendor Customer Relationship Management Hacker SaaS Conferencing Proactive IT Computer Repair Running Cable PowerPoint File Sharing Law Enforcement Hard Drive Solid State Drive Administration Compliance Intranet Mobility Data storage Twitter Wireless Flexibility Voice over Internet Protocol Avoiding Downtime Patch Management Storage Website Meetings Business Growth Net Neutrality Private Cloud Scam Word Business Intelligence Wi-Fi Telephony Digital Payment Cortana Excel Paperless Office Machine Learning Cooperation Router Telephone Systems Digital Sports Disaster Websites Comparison Tablet Hosted Solution Fax Server End of Support Company Culture Robot Securty Software as a Service Social Networking Monitoring User Virtual Desktop Google Maps Social Social Engineering Black Market Management Cryptocurrency DDoS Laptop Vulnerabilities Experience How To Download Cleaning Monitors How To Employee/Employer Relationship Chrome Pain Points Office Tips Managed Services Redundancy eWaste Managed IT Service User Error Co-managed IT Microchip Taxes Evernote YouTube Distributed Denial of Service Unified Communications Settings Computer Accessories Distribution Virtual Assistant Processor Processors Trending Lifestyle Smart Devices Public Cloud Licensing Start Menu Tech Terms Mobile Technology Mouse Cost USB Gaming Console Presentation Identity Theft Solutions IT service Webcam Statistics Text Messaging Professional Services Uninterrupted Power Supply Programming Vulnerability Network Congestion Specifications Safety Politics Bitcoin Virtual Reality Integration Bluetooth Documents Emails Automobile Data Protection Multi-factor Authentication Chromebook Telephone Teamwork Heating/Cooling Streaming Media Entertainment Downloads Google Docs Managed Services Provider Inbound Marketing Computing Infrastructure Hack Memory Device security MSP PDF Financial Data Leadership Rental Service Directions Display Time Management Freedom of Information Electronic Health Records Adminstration Pirating Information IT consulting Recording Optimization Corporate Profile Organize Read Dark Web Web Server Free Resource Assessment SharePoint Nanotechnology Social Network Best Available Keyboard Memes SSID Cabling Desktop Finance Advertising Flash Google Calendar Device Management Startup Asset Tracking Books CIO Processing Workers Tip of the week Business Cards Service Level Agreement Domains Managing IT Services Health IT Administrator Username Telework Staffing Supercomputer Google Wallet Wasting Time Touchscreen News Business Managemenet Unified Threat Management Backup and Disaster Recovery Public Speaking Surveillance Windows XP Logistics Virtual Machines VoIP Content Management Remote Workers Bookmark Society Consultation Screen Reader Customer Resource management Shortcut IT Worker Displays Cyber security Knowledge Webinar Gamification Employer/Employee Relationships Technology Tips online Currency Smart Tech Entrepreneur Upselling Reading Google Play Samsung Micrsooft Telephone Service Piracy Upload Troubleshooting Virtual Private Network HTML Environment FinTech Employer Employee Relationship Drones Managing Costs Fake News Fiber-Optic Database HIPAA Development Video Surveillance G Suite Microsoft 365 Audit Electronic Payment Data Storage Saving ZTime Hacks Browsers Physical Security Data Warehousing LinkedIn Telephone System Competition Medical IT Trend Micro Mobile Security Banking User Tip Botnet Permissions Proactive Maintenance Language Access Multi-Factor Security Relocation Security Cameras Tablets Threats Emergency Hard Drive Disposal Software License Trends Business Owner Procurement Archive Devices Harddrive Navigation Virtual Machine Microsoft Excel Best Practives Skype Fraud Tactics IP Address Video Conferencing Debate Sync Computer Care Human Resources PCI DSS Notifications Data Analysis CCTV Music Employees Google Drive Windows Server 2008 Application Communitications GPS switches Writing eCommerce UTM Content Business Metrics Computer Malfunction SQL Server Spyware Mobile Payment Microserver Legislation Error Reliable Computing GDPR Upgrades Managing Risk Point of Contact IT Plan Enterprise Resource Planning Supply Chain Management External Harddrive Printing Accountants A.I. Tech Hypervisor email scam Addiction Internet Service Provider In Internet of Things LiFi Electricity Regulations Compliance Thin CLient Fileless Malware Hybrid Cloud Get More Done Digital Signature IT Assessment 3D Ebay Holidays Proxy Server Motion Sickness Azure Work/Life Balance cache Television Recycling Turn Key Wireless Headphones Scalability Modem Deep Learning Strategy Printer Server Analytic Migration Connected Devices Remote Working Smart Phones WannaCry Equifax Fleet Tracking Messenger Term Tracking Trojan Product Reviews Network Management Electronic Medical Records Visible Light Communication Transportation 3D Printing CrashOverride Personal Information Capital Financial Managing Stress Regulation Productuvuty Printers

toner1