facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

0 Comments
Continue reading

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

0 Comments
Continue reading

Tip of the Week: 3 Easy Ways to Max Out Your iPhone’s Battery Power

b2ap3_thumbnail_iphone_data_400.jpgSome business owners rely on their iPhone for a lot more than just work-related functions. With so many applications and whatnot consuming your phone’s processing power, your iPhone’s battery can quickly get drained. This, in turn, drains your productivity. If your phone is always dead, you can’t get much done with it. Shouldn’t there be a way to boost your battery’s efficiency?

0 Comments
Continue reading

Alert: Siri’s Leaking Secrets - iPhone Lock Screen Vulnerability

b2ap3_thumbnail_ios_vuln_400.jpgApple's iOS 7.1.1. operating system has been affected by a series of bugs throughout this month. The first bug was emails being sent unencrypted, but now a new threat lurks in the shadows - a lock screen flaw that allows hackers to access your contacts list without unlocking the phone.

0 Comments
Continue reading

Liven Up Your Office Routine with the New iPhone 5c and 5s

b2ap3_thumbnail_iphone5c400.jpgLast week, as Apple Inc. fans waited in anticipation for the new iPhone announcement, Apple delivered two different exciting models; the iPhone 5c and iPhone 5s. These products promise to introduce some great features and style to users this Fall. Let's take a look at how these new devices can liven your everyday office routine.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Data Hackers Hardware Microsoft Workplace Tips Backup Network Security Managed Service Provider Business Productivity Hosted Solutions Email Malware IT Services Saving Money Efficiency Computer Productivity Google User Tips IT Support Innovation Small Business Smartphones Mobile Devices Data Backup IT Support Quick Tips Network VoIP Business Continuity Gadgets Collaboration communications Microsoft Office Upgrade Data Recovery Social Media Android Server Disaster Recovery Mobile Office Cybersecurity Virtualization Communication Smartphone Miscellaneous Mobile Device Management Phishing Holiday Ransomware Windows Passwords Tech Term Operating System Vendor Management Windows 10 Apps Facebook Outsourced IT Internet of Things Managed IT Services Unified Threat Management Remote Monitoring BDR Mobile Device Automation Data Management Analytics Users BYOD Remote Computing Managed IT services Apple Mobile Computing WiFi Windows 10 The Internet of Things Marketing History Artificial Intelligence Firewall Browser Cloud Computing Save Money Help Desk Alert App Big data Spam Office 365 Training Two-factor Authentication Bandwidth Business Technology Encryption IT Consultant Going Green Hard Drives Bring Your Own Device Access Control Maintenance Printer Antivirus Gmail Office Managed IT Government Health Cybercrime Content Filtering Information Technology Cost Management Information Outlook Windows 8 Hiring/Firing Healthcare Budget Wireless Technology Saving Time Computers Windows 7 Virus Search Tech Support VPN Managed Service Recovery Employer-Employee Relationship Retail Lithium-ion Battery Best Practice Networking Hacking Project Management IBM Money Document Management Humor Customer Service It Management Travel Blockchain Education Data Loss Update Phone System iPhone Legal Save Time Hacker Downtime Customer Relationship Management Regulations Augmented Reality PowerPoint SaaS Computing Running Cable Proactive IT File Sharing Administration Applications Hard Drive Wireless Law Enforcement Twitter Intranet Compliance Mobility Website Patch Management Solid State Drive Avoiding Downtime Conferencing Data storage Risk Management Data Breach Current Events Value Password Digital Digital Payment Wi-Fi Excel Telephony Websites Router Management Machine Learning Fax Server Comparison Tablet Paperless Office Vulnerabilities Telephone Systems Sports Cooperation Software as a Service Company Culture User Computer Repair Vendor Disaster End of Support Social Networking Hosted Solution Virtual Desktop Robot Social Data Security Securty Google Maps DDoS Storage Social Engineering Flexibility Scam Black Market Voice over Internet Protocol Cryptocurrency Word Monitoring Laptop Business Intelligence Private Cloud Cortana Business Growth Monitors Virtual Assistant Cleaning Multi-factor Authentication Office Tips Microchip Taxes Telephone Processors Start Menu Tech Terms Computer Accessories Managed IT Service Mobile Technology YouTube Lifestyle Distributed Denial of Service USB Trending Presentation Gaming Console Unified Communications Settings Public Cloud Licensing Uninterrupted Power Supply Mouse Webcam Processor Specifications Safety Text Messaging Vulnerability Statistics Bitcoin Programming Identity Theft IT service Network Congestion Documents Data Protection Teamwork Heating/Cooling Distribution Entertainment Downloads Politics Professional Services Virtual Reality Emails Bluetooth Streaming Media Automobile Inbound Marketing Integration Chromebook Redundancy Smart Devices Computing Infrastructure Hack Net Neutrality Meetings Pain Points Memory How To eWaste Google Docs Managed Services Provider Evernote User Error Experience Co-managed IT Chrome Download Display Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Optimization Webinar Content Management Communitications email scam Addiction Administrator Entrepreneur Directions Supercomputer HIPAA Upselling SSID How To Fake News Advertising Flash Environment Dark Web Free Resource Audit CIO Competition Processing Managed Services Data Warehousing Windows XP Wireless Headphones Worker Electronic Payment Health IT Employee/Employer Relationship Video Surveillance Staffing Google Wallet online Currency Migration Connected Devices Saving ZTime Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal Society IT Assessment Network Management Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel G Suite Bookmark Computer Care Finance Hacks Physical Security Application Harddrive Google Play Telephone Service Google Drive Windows Server 2008 Best Practives Nanotechnology Social Network Human Resources Employer/Employee Relationships Debate Drones Desktop Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets GPS Microsoft 365 Archive Electronic Health Records Business Cards Service Level Agreement Banking Botnet Microserver Username Medical IT Trend Micro Permissions Language Memes Unified Threat Management Backup and Disaster Recovery Sync External Harddrive Browsers Electricity Printing Gamification Notifications CCTV Digital Signature Security Cameras Threats Point of Contact Screen Reader Customer Resource management User Tip Proactive Maintenance Navigation Thin CLient Virtual Machine cache Television switches Get More Done Writing Smart Tech Reliable Computing 3D Solutions Ebay Music Surveillance Piracy Upload Business Metrics Computer Malfunction Upgrades Turn Key HTML eCommerce Printer Server IT Fiber-Optic Database In Internet of Things Smart Phones Data Analysis Employees WannaCry Mobile Security GDPR Managing Risk Time Management Freedom of Information LiFi Trojan Analytic Telephone System PDF SQL Server Corporate Profile Recycling Best Available Keyboard Tech Leadership Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Adminstration Pirating Information Organize Development Software License Trends Motion Sickness Google Calendar Deep Learning Devices Messenger Tracking Domains Holidays Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Hybrid Cloud UTM Content Rental Service Public Speaking Modem Strategy Touchscreen News Visible Light Communication Proxy Server Azure VoIP Web Server Shortcut Term Consultation IT consulting Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management IT Plan Enterprise Resource Planning Capital Personal Information Productuvuty Financial Managing Stress Printers CrashOverride Regulation 3D Printing

toner1