facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

0 Comments
Continue reading

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

0 Comments
Continue reading

Tip of the Week: 3 Easy Ways to Max Out Your iPhone’s Battery Power

b2ap3_thumbnail_iphone_data_400.jpgSome business owners rely on their iPhone for a lot more than just work-related functions. With so many applications and whatnot consuming your phone’s processing power, your iPhone’s battery can quickly get drained. This, in turn, drains your productivity. If your phone is always dead, you can’t get much done with it. Shouldn’t there be a way to boost your battery’s efficiency?

0 Comments
Continue reading

Alert: Siri’s Leaking Secrets - iPhone Lock Screen Vulnerability

b2ap3_thumbnail_ios_vuln_400.jpgApple's iOS 7.1.1. operating system has been affected by a series of bugs throughout this month. The first bug was emails being sent unencrypted, but now a new threat lurks in the shadows - a lock screen flaw that allows hackers to access your contacts list without unlocking the phone.

0 Comments
Continue reading

Liven Up Your Office Routine with the New iPhone 5c and 5s

b2ap3_thumbnail_iphone5c400.jpgLast week, as Apple Inc. fans waited in anticipation for the new iPhone announcement, Apple delivered two different exciting models; the iPhone 5c and iPhone 5s. These products promise to introduce some great features and style to users this Fall. Let's take a look at how these new devices can liven your everyday office routine.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Hosted Solutions Productivity Business Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration VoIP IT Support Smartphones Data Backup IT Support Quick Tips Mobile Devices Network communications Business Continuity Gadgets Microsoft Office Android Data Recovery Disaster Recovery Social Media Cybersecurity Upgrade Communication Mobile Office Server Smartphone Virtualization Phishing Miscellaneous Mobile Device Management Ransomware Vendor Management Holiday Passwords Managed IT Services Windows Windows 10 Outsourced IT Tech Term Operating System Apps Remote Monitoring Mobile Device Facebook Users Internet of Things Unified Threat Management BDR Automation Mobile Computing Analytics Data Management BYOD Remote Computing Managed IT services Apple Windows 10 WiFi Cloud Computing Marketing The Internet of Things History Training Artificial Intelligence Browser Firewall Save Money Big data Business Technology Spam Help Desk App Alert Encryption Information Technology Office 365 Bandwidth Health Two-factor Authentication IT Consultant Office Going Green Cybercrime Windows 7 Bring Your Own Device Maintenance Printer Antivirus Hard Drives Budget Managed IT Gmail Government Access Control Content Filtering Lithium-ion Battery Recovery Best Practice Employer-Employee Relationship Outlook Retail Windows 8 Information Cost Management Healthcare Wireless Technology Hiring/Firing Tech Support Virus Search Computers Saving Time Managed Service VPN Update Networking IBM It Management Blockchain Remote Work Augmented Reality Data Loss Hacking Computing Money Humor Document Management Project Management Customer Service Travel Phone System iPhone Education Mobility Legal Risk Management Data Security Customer Relationship Management Vendor Regulations Patch Management Value Save Time Password PowerPoint Downtime Hacker Covid-19 SaaS Data Breach Administration Computer Repair Running Cable Law Enforcement Proactive IT Applications Solid State Drive Compliance Voice over Internet Protocol Data storage Avoiding Downtime Wireless Intranet Conferencing Flexibility File Sharing Twitter Current Events Hard Drive Storage Website Business Growth Monitoring Excel Social Engineering Word Cooperation Net Neutrality Business Intelligence Fax Server Management Paperless Office Digital Payment Meetings Cortana Vulnerabilities Private Cloud Router Sports Scam Disaster Wi-Fi Hosted Solution End of Support Telephony Comparison Tablet Machine Learning Company Culture Robot Securty Telephone Systems User Digital Social Networking Websites Virtual Desktop Social Black Market Software as a Service Cryptocurrency DDoS Google Maps Laptop Politics Vulnerability Experience Managed Services Virtual Reality Employee/Employer Relationship Bitcoin Managed IT Service Cleaning Automobile Monitors Emails Data Protection Office Tips Chromebook eWaste Lifestyle Multi-factor Authentication Computing Infrastructure Hack Chrome Processor How To Downloads Telephone YouTube Unified Communications Settings Gaming Console Download Computer Accessories Redundancy Webcam Solutions Text Messaging Processors USB Professional Services Microchip Trending Taxes IT service Mouse Distributed Denial of Service Presentation Evernote Virtual Assistant Integration Public Cloud Licensing Programming Distribution Statistics Specifications Safety Bluetooth Inbound Marketing Network Congestion Smart Devices Start Menu Tech Terms Managed Services Provider Identity Theft Mobile Technology Documents Teamwork Heating/Cooling Cost Entertainment Memory Streaming Media Uninterrupted Power Supply User Error Google Docs How To Pain Points Co-managed IT PDF Product Reviews UTM Content Processing In Internet of Things Supply Chain Management Spyware Mobile Payment Webinar Health IT IT consulting IT Plan Enterprise Resource Planning Wasting Time Best Available Keyboard Read Internet Service Provider Electricity Printing Legislation Error Logistics Virtual Machines email scam Addiction Bookmark Advertising Flash Scalability IT Assessment Accountants A.I. CIO Cyber security Upselling Motion Sickness Domains Regulations Compliance Messenger Video Surveillance Tracking Staffing Google Play Google Wallet Telephone Service Device Management Public Speaking Remote Working cache Television Windows XP Employer/Employee Relationships Migration Connected Devices Society Managing Costs Saving ZTime Content Management Shortcut WannaCry Wireless Headphones Microsoft 365 Displays Rental Service Business Managemenet Network Management Browsers Cabling Entrepreneur Electronic Health Records Corporate Profile Best Practives Equifax Fleet Tracking Medical IT Micrsooft Trend Micro Web Server Troubleshooting Financial Data Time Management Freedom of Information Proactive Maintenance Books Debate Workers Environment Memes Device security MSP Security Cameras Drones Threats Harddrive Administrator HIPAA online Currency Assessment SharePoint User Tip Tip of the week Microserver Desktop Finance Navigation Virtual Machine Competition Managing IT Services Google Calendar Nanotechnology Social Network GPS Supercomputer Electronic Payment News Business Cards Service Level Agreement Data Analysis Permissions Employees Language External Harddrive Worker Surveillance VoIP Startup Asset Tracking eCommerce Business Owner LinkedIn Telework Touchscreen SQL Server Reading Samsung IT Knowledge Get More Done Username GDPR Managing Risk IP Address Remote Workers Consultation Unified Threat Management Backup and Disaster Recovery Turn Key Gamification Tech Music Hypervisor Thin CLient G Suite Archive Application Virtual Private Network Technology Tips Printer Server Screen Reader Customer Resource management switches Writing 3D Ebay Employer Employee Relationship Skype Human Resources Fake News Piracy Upload Fileless Malware Hybrid Cloud Smart Phones Development Audit Trojan Smart Tech Upgrades Holidays Hacks Physical Security Database Proxy Server LiFi Azure Relocation Point of Contact Tablets HTML Modem Strategy Banking Botnet Data Storage Data Warehousing Organize Fiber-Optic Emergency Hard Drive Disposal Mobile Security Term Leadership Sync Digital Signature Procurement Access Telephone System Electronic Medical Records Transportation Adminstration Pirating Information Microsoft Excel Software License Trends Directions Display Work/Life Balance Video Conferencing Computer Care Multi-Factor Security Recording Deep Learning Optimization Notifications CCTV Fraud Tactics Dark Web Visible Light Communication Free Resource Reliable Computing Analytic Communitications Devices SSID Business Metrics Recycling Computer Malfunction PCI DSS Google Drive Windows Server 2008 3D Printing Personal Information Financial CrashOverride Printers Capital FinTech Managing Stress Productuvuty Regulation

toner1