facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Testimonial From the North Pole

A Testimonial From the North Pole

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

0 Comments
Continue reading

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

0 Comments
Continue reading

As Technology Has Evolved. So Have Our Holiday Traditions

As Technology Has Evolved. So Have Our Holiday Traditions

Merry Christmas! We know that for the small business owner, even on Christmas day, business doesn’t completely stop. Sure you can spend time with loved ones and take a couple days off from the grind, but tomorrow is another day. According to one study, people are gifting technology more than ever, so much so that new traditions that include technology, are replacing the once-held notion that technology was a distraction.

0 Comments
Continue reading

The Most Wonderful Time of the Year...for Thieves

The Most Wonderful Time of the Year...for Thieves

In terms of data loss and theft, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on either your irreverence to the issue as a whole, or to be so distracted that you make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets during the holiday.

0 Comments
Continue reading

This Halloween, Hackers are Pretending to Be You

This Halloween, Hackers are Pretending to Be You

Halloween is a great time for people of all ages to let loose and embrace their spookier, darker side--even though they aren’t. For hackers, however, every day is like Halloween, but with ill intentions. Hackers will pretend to be someone they’re not in order to scam you out of sensitive data or personal information. By identifying their tricks, you can keep hackers from getting their treats.

0 Comments
Continue reading

Tales from the Haunted Server Room

b2ap3_thumbnail_shock_n_awe_it_400.jpgIt was a dark and stormy night, as it sometimes is on Halloween. It’s a time when kids and adults alike enjoy dressing up as scary monsters and partaking in some good old-fashioned trick-or-treating. You’re pulling a late night at the office, and you hear a sound emanating from your server room; an unsavory clicking sound that echoes through the recesses of your office. What do you do?

0 Comments
Continue reading

Arguably the Most Important Computer in Star Wars

b2ap3_thumbnail_death_star_may_the_fourth_400.jpgToday is known the world over as Star Wars Day (May the 4th be with you). We want to take this opportunity to look at the technology of one of our favorite movie franchises. Given how much exciting technology there is in the fictional Star Wars universe, picking just one technology can be difficult. Since we work with computers, let’s look at one of the most important computers in the film, the X-wing targeting computer.

0 Comments
Continue reading

World Backup Day is Upon Us: How Do You Backup Your Data?

b2ap3_thumbnail_world_backup_day_2_400.jpgA quick scan of the past year’s headlines will show that a data-loss scenario resulting from a hack can unexpectedly hit any business, big or small. Your company needs to have a data backup solution in place, and it’s imperative that backups are taken regularly. Has it been awhile since you last backed up your data?

0 Comments
Continue reading

Rockin’ Around with Managed IT

b2ap3_thumbnail_rockin_around_with_managed_it_400.jpgAn IT parody song to the tune of “Rockin’ Around the Christmas Tree.”

0 Comments
Continue reading

4 Holiday Gifts for the Business Professional in Your Life

b2ap3_thumbnail_holidy_technology_gifts_400.jpgIt’s the holiday season, and everyone is scrambling to throw together the perfect gift for the technology lover. With so many spectacular consumer electronics available, it can be overwhelming just thinking about all of the possibilities. Before you get in over your head thinking up the best gifts, try checking out this list of cool and practical tech.

0 Comments
Continue reading

Competition Drives Black Friday Sales and Can Enhance Your Business Too!

b2ap3_thumbnail_friendly_competition_400.jpgFor American retailers, Black Friday is the biggest and most competitive day on the shopping calendar. Consumers reap the rewards of all of this competition by taking advantage of deep discounts on their favorite items. Competition like this is a win-win for both parties! Can your business benefit like this from an infusion of friendly competition?

0 Comments
Continue reading

Are Ghosts Haunting the Halls of Your Servers?

b2ap3_thumbnail_haunted_pc_400_20141031-133424_1.jpgThough not everyone believes them, we all know about the horror stories of the spirits of the dead that linger in this world, haunting locations where no one dares to tread. Every culture, though their beliefs vary, contains them to some degree. Their purpose is unknown, and they are thought to be caused by unfulfilled desires or regrets. But regardless of whether or not you believe in them, you better believe that your business can very well be haunted by ghost servers.

0 Comments
Continue reading

Managed IT Services: The Perfect Gift for Business Dad!

b2ap3_thumbnail_happy_fathers_day_400.jpgDo you know what to get Dad this Father's Day to show him that you appreciate all that he's done for you? If he's a business owner, we have the perfect gift for him!

That's right - Computerware's managed IT services! We don't mean buy them outright for him, but by suggesting our services to him, you can give him the greatest gift of all: peace of mind and a whole lot more cash in his pocket. Here are four good reasons to outsource Dad's IT services.

0 Comments
Continue reading

The Holiday Spirit in the Christmas Cloud

b2ap3_thumbnail_chtree400.jpgIn Charles Dickens' tale, A Christmas Carol, Ebenezer Scrooge learned an important lesson that most of us already know. In order to get the best out of people, you need to give the best of yourself. For those of you who don't remember the 19th-century novella, Scrooge is a business owner who only cares about money and because of this, draws the disdain of his family and his extremely patient subordinate, Bob Cratchit. On Christmas eve, he's visited by three Christmas spirits, and as he gets a look at the reality of how his actions affect those around him, he wakes up on Christmas morning with a new perspective.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices User Tips Smartphones Quick Tips Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Network Android Social Media Virtualization Data Backup Productivity Collaboration Mobile Office Server Smartphone Mobile Device Management Communication Miscellaneous Data Recovery Ransomware Upgrade Windows 10 communications Tech Term Unified Threat Management IT Support Windows Holiday Facebook Remote Monitoring Operating System Passwords Mobile Computing Phishing BYOD Vendor Management Remote Computing Cybersecurity Apps Managed IT services Users BDR WiFi Automation Marketing Mobile Device Analytics Data Management The Internet of Things History Outsourced IT Apple Firewall Browser Alert Managed IT Services Artificial Intelligence Save Money Internet of Things App Big data IT Consultant Encryption Office Cloud Computing Maintenance Printer Bring Your Own Device Antivirus Spam Health Office 365 Bandwidth Content Filtering Gmail Going Green Cybercrime Windows 10 Help Desk Wireless Technology Cost Management Tech Support Virus Search Training Hiring/Firing Hard Drives Budget Managed IT Two-factor Authentication Saving Time Business Technology Lithium-ion Battery Best Practice Information Technology Windows 8 Outlook IBM Recovery Employer-Employee Relationship Update Hacking Money Healthcare Document Management Access Control Phone System Computers Blockchain VPN Travel Education Networking Legal Augmented Reality Risk Management Humor PowerPoint Regulations Information Administration Save Time SaaS Law Enforcement Running Cable Proactive IT Compliance It Management File Sharing Customer Service Applications Hard Drive Data storage Managed Service Government Twitter Mobility Website Intranet Social Engineering Scam Fax Server Laptop Customer Relationship Management Business Growth Word Data Breach Value Project Management Password Cortana Digital Business Intelligence Websites Management Paperless Office Digital Payment Hacker Sports Computing Router Downtime Disaster Machine Learning Telephone Systems End of Support Hosted Solution Robot Comparison Tablet Avoiding Downtime User Company Culture Securty Computer Repair Current Events iPhone Social Social Networking Solid State Drive Data Security Wireless Flexibility Patch Management Black Market Google Maps DDoS Excel Cryptocurrency Data Loss Emails Lifestyle Automobile Google Docs Chromebook Streaming Media Redundancy Experience Computing Infrastructure Hack Monitors Monitoring Cleaning Retail eWaste Evernote Gaming Console How To Office Tips Download Private Cloud Net Neutrality YouTube Webcam Text Messaging Chrome Telephony Unified Communications Settings Start Menu Tech Terms Microchip Taxes Vulnerabilities Processors Mobile Technology Distributed Denial of Service USB Software as a Service Computer Accessories Presentation Uninterrupted Power Supply IT service Public Cloud Inbound Marketing Trending Cooperation Virtual Desktop Bitcoin Specifications Safety Mouse Identity Theft Co-managed IT Vendor Data Protection User Error Pain Points Bluetooth Programming Documents Statistics Heating/Cooling Network Congestion Entertainment Virtual Reality Conferencing Politics Storage Assessment SharePoint Multi-Factor Security Cost Visible Light Communication Upselling Memory Software License Trends Navigation PDF Devices Professional Services IT consulting Motion Sickness Best Available Keyboard Analytic Tip of the week Fraud Tactics Data Analysis Scalability Video Surveillance Recycling Google Calendar GDPR Saving ZTime Product Reviews Touchscreen News Messenger Tracking Domains VoIP Best Practives UTM Content Consultation Legislation Error Rental Service Advertising Meetings Flash Public Speaking Read Knowledge IT Plan Enterprise Resource Planning Tech CIO Accountants A.I. Voice over Internet Protocol Windows XP Harddrive Web Server Shortcut Virtual Assistant Microserver email scam Addiction Fileless Malware Staffing Google Wallet Cabling Debate Technology Tips Modem Wi-Fi Administrator Displays Entrepreneur Fake News Proxy Server Books Society GPS Workers Troubleshooting Device Management Audit Multi-factor Authentication Micrsooft Environment Business Managemenet Data Warehousing Wireless Headphones Telephone Electronic Medical Records Supercomputer HIPAA Content Management Get More Done Migration Connected Devices Term External Harddrive Printer Server Equifax Fleet Tracking Recording Competition Emergency Hard Drive Disposal Turn Key Network Management Directions Drones Worker Electronic Payment Access Device security MSP SSID Thin CLient Microsoft Excel Dark Web Reading 3D Samsung Ebay Business Owner online Currency Computer Care Trojan Smart Phones G Suite Google Drive Windows Server 2008 Organize Nanotechnology Social Network Health IT Permissions Employer Employee Relationship Language IP Address Desktop Finance Processing Mobile Payment Startup Asset Tracking Hacks Physical Security Application Vulnerability Business Cards Service Level Agreement Managed IT Service Licensing Human Resources LinkedIn Spyware Username Banking switches Botnet Writing Leadership Unified Threat Management Backup and Disaster Recovery Bookmark Relocation Music Adminstration Tablets Pirating Information Electricity Printing Sync Upgrades Skype Windows 7 Screen Reader Customer Resource management Archive Gamification Google Play cache Television Webinar Smart Tech Distribution Notifications LiFi CCTV Digital Signature Piracy Upload Processor HTML Medical IT Business Metrics Computer Malfunction Teamwork Point of Contact Fiber-Optic Database Browsers Reliable Computing WannaCry Downloads Security Cameras In Internet of Things Deep Learning Time Management Freedom of Information Telephone System User Tip Work/Life Balance Corporate Profile Mobile Security Regulation 3D Printing CrashOverride Printers Capital Productuvuty Managing Stress

toner1