facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Brief History of Data Backup

A Brief History of Data Backup

While data backup is a necessary component to any modern business’ success, the idea itself certainly isn’t modern. The act of protecting information dates back to before dates were even an inkling, when humanity was still writing data on cave walls to preserve it and notching animal bones to aid in primitive mathematics. Let’s review the history of data preservation, and how we’ve gotten to our current point.

0 Comments
Continue reading

Is the Internet Changing Your Business as Drastically as it is the Publishing Industry?

Is the Internet Changing Your Business as Drastically as it is the Publishing Industry?

Publishers have long provided authors with outlets to share their work. However, just like many other industries, technology has changed publishing over the years. Is this a positive change, and are there lessons that the modern business owner can learn from this shift in the way technology is handled and managed?

0 Comments
Continue reading

Arguably the Most Important Computer in Star Wars

b2ap3_thumbnail_death_star_may_the_fourth_400.jpgToday is known the world over as Star Wars Day (May the 4th be with you). We want to take this opportunity to look at the technology of one of our favorite movie franchises. Given how much exciting technology there is in the fictional Star Wars universe, picking just one technology can be difficult. Since we work with computers, let’s look at one of the most important computers in the film, the X-wing targeting computer.

0 Comments
Continue reading

Challenge: Can You Go a Single Day Without Your Phone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYou’re at an important lunch meeting when your phone goes off. Do you answer it? It might be a prospective client responding to an email, or it might be an employee needing help. Smartphones might have made every other aspect of business more mobile, including communication; but now, thanks to the power of science, we know that smartphones are indisputably bad for our personal relationships.

0 Comments
Continue reading

Watch Simon Pierro, the “Wizard of iOS,” Perform Digital Magic Miracles [VIDEO]

b2ap3_thumbnail_tricks_using_an_ipad_400.jpgWe all need a little magic in our lives now and again. For some, this means card tricks, or optical illusions that are designed to trick the eye into seeing something that isn’t there. For German magician Simon Pierro, dubbed the “Wizard of iOS,” it means taking a piece of consumer technology and turning it into a catalyst for his magic acts.

0 Comments
Continue reading

Information Technology and the Movie Making Process

b2ap3_thumbnail_it_at_the_movies_400.jpgMovies capture the imagination of the creative and project them to the masses with seamingly relative ease. Nothing could be further from the truth. It takes hundreds and sometimes thousands of people to make most movies. Simply sit through the credits next time you go to the cinema or watch a movie at home.

0 Comments
Continue reading

Blast from the Past: Prepare for Solar Flares

b2ap3_thumbnail_electrical_failure_400.jpgIn 1859, before global violence and warfare of the Twentieth century wrought havoc around the world, another pseudo-apocalyptic event took place in the form of a colossal solar storm. This solar storm, known as the Carrington Event, is the largest flare recorded to date. Did you know that there’s a chance that our planet could be struck by a solar flare of this magnitude again in the near future, and that its results could spell the end for society as we know it?

0 Comments
Continue reading

Europe’s Great Debate: The Right to Be Forgotten

b2ap3_thumbnail_do_you_have_the_right_to_be_forgotten_400.jpgOne of the hot topics in recent news is a concept in European courts about the "right to be forgotten." The ruling, passed in May 2014, suggests that search engines must consider requests for removal of content that is, according to ZDNet, "inadequate, irrelevant, or no longer relevant." In some circles, this ruling is seen as controversial.

0 Comments
Continue reading

Crowdfunding Done Right: Make Money (and Potato Salad) with Crowdfunding

b2ap3_thumbnail_kickstarter_potato_salad_400.jpgWhen trying to raise money for a big startup or product release, it can often be outside of your budget. One solution is crowdfunding, or taking your endeavors public in order to inspire others to donate money to your cause. Unfortunately (or fortunately - take your pick), not many of these campaigns succeed.

0 Comments
Continue reading

That’s Hot! A Portable Solution to Cool Off Your Office

b2ap3_thumbnail_portable_air_conditioner_400.jpgOh man, it's so hot outside! When the summer heat is at its worst, car door handles become like glowing irons removed from the fire and it feels like nature is one big oven. Summer heat is especially hard on your office building's air conditioning unit. Consequently, the heat can put your computer equipment in danger. Portable cooling to the rescue!

0 Comments
Continue reading

Do Pets at Work Improve Productivity?

b2ap3_thumbnail_kitties_and_puppies_at_work_400.jpgDo you have pets at home? You might find it painful to leave them behind when you head to the office. You might find yourself wishing that you could bring them to your workplace with you. Well, why not? We're hearing about more companies that have implemented a pet policy that lets them bring their furry friends to the office with them.

0 Comments
Continue reading

A Game of Words: George R. R. Martin Finds Use For Old Technology

b2ap3_thumbnail_grrmartin_400.jpgThe latest technology can provide your business with increased productivity. However, not everyone sees it that way. George R. R. Martin, one of the most well-known authors of our time, would disagree. He prefers to work in the ancient realm of 1970s word processing.

0 Comments
Continue reading

Dogecoin Hacked! Such Loss.

b2ap3_thumbnail_docecoin_wow_400.jpgDoge, the Internet meme of a grammatically-challenged Shiba Inu dog that prefers comic sans, is so popular that it has its own online currency called Dogecoin. The fact that Dogecoin exists may be news to you, but it's also news that Dogecoin is temporarily stopping its service after its database (the Doge Vault) was hacked.

0 Comments
Continue reading

Technology Repair… In Space!

b2ap3_thumbnail_millennium_falcon_400.jpgDue to the overwhelming success of George Lucas's science-fiction film franchise Star Wars, fans all over the world will be celebrating May 4th as a holiday (May the Fourth be with you). Star Wars wouldn't have been nearly as successful if it weren't for its fascinating space technology, something that was previously only imagined by the most creative of minds. X-wings, blasters, and hyperdrives seem really neat, but they can break down just as easily as present-day space technology. There's something about the unknown void that is space which draws our attention, even if it's "a long time ago in a galaxy far, far away..."

0 Comments
Continue reading

Your Technology Hates the Cold Too

b2ap3_thumbnail_technology_in_the_cold_400.jpgIn the midst of one of the coldest and most grueling winters the U.S. has experienced in years, millions of Americans are growing impatient for the arrival of spring. As subzero temperatures spread across the country, the cold weather and snow has become a hazard not only to humans, but to their technology. How cold is too cold for your gadgets?

0 Comments
Continue reading

Downtime, Nobody’s Waiting for You

b2ap3_thumbnail_uptime400.jpgVisiting downtown is a fun and magical experience. Having your computer break down and then experiencing downtime are completely opposite. The only thing downtown and downtime have in common is that each cost you money, and they both make for one catchy song. The best way to prevent downtime is to have your technology professionally managed, here's how it works.

0 Comments
Continue reading

Sleep Better To a Rhythm

b2ap3_thumbnail_zzzz400.jpgDo you have trouble sleeping at night? While there may be many sleep solutions available out there such as ergonomic pillows, medications, or sleep apnea mask that help you breathe, a new study has found that your brain may be the culprit. The University of Tubingen, in Germany, found that syncing sounds, while you sleep, to the rhythmic pulse of brainwaves helps people sleep.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices User Tips Smartphones Innovation Gadgets Business Continuity Microsoft Office Disaster Recovery VoIP Android Network Social Media Mobile Office Virtualization Productivity Data Backup Collaboration Server Smartphone Mobile Device Management Communication Miscellaneous Data Recovery Ransomware Windows 10 Upgrade communications Tech Term Windows Unified Threat Management IT Support Holiday Passwords Remote Monitoring Facebook Operating System Managed IT services Apps Mobile Computing BYOD Phishing Remote Computing Cybersecurity Vendor Management BDR Users WiFi Automation Mobile Device Analytics Marketing Data Management The Internet of Things Firewall History Outsourced IT Apple Alert Artificial Intelligence Browser Managed IT Services Save Money App Internet of Things Encryption Big data IT Consultant Office Going Green Cloud Computing Bring Your Own Device Spam Antivirus Maintenance Office 365 Printer Health Gmail Bandwidth Content Filtering Business Technology Managed IT Cybercrime Outlook Windows 8 Help Desk Windows 10 Wireless Technology Cost Management Search Hiring/Firing Tech Support Training Virus Hard Drives Budget Saving Time Two-factor Authentication Best Practice Information Technology Lithium-ion Battery Recovery Blockchain IBM Employer-Employee Relationship Update Hacking Money Document Management Healthcare Access Control Computers VPN Phone System Travel Compliance Mobility Website Education Government Data storage Managed Service Augmented Reality Risk Management PowerPoint Networking Legal Save Time Administration Information Humor Regulations Proactive IT SaaS Running Cable File Sharing Customer Service Hard Drive Law Enforcement It Management Twitter Intranet Applications Current Events Excel Solid State Drive Social Engineering Patch Management Flexibility Data Loss Customer Relationship Management Black Market Scam Cryptocurrency Word Laptop Value Fax Server Business Intelligence Password Cortana Data Breach Business Growth Digital Payment Hacker Project Management Router Downtime Digital Websites Management Machine Learning Comparison Tablet Paperless Office Telephone Systems Sports Company Culture User Computing Computer Repair Avoiding Downtime Disaster End of Support Social Networking Hosted Solution Robot iPhone Social Wireless Securty Google Maps DDoS Data Security Politics Storage Virtual Reality Emails User Error Bluetooth Streaming Media Automobile Co-managed IT Chromebook Conferencing Retail Computing Infrastructure Hack Google Docs Net Neutrality Redundancy How To eWaste Gaming Console Download Lifestyle Monitoring Private Cloud Experience Chrome Evernote Text Messaging Monitors Webcam Cleaning Office Tips Telephony Microchip Taxes Processors Computer Accessories USB YouTube Start Menu Tech Terms Distributed Denial of Service Mobile Technology Trending Presentation Unified Communications Settings Vulnerabilities Cooperation Software as a Service Inbound Marketing Public Cloud Mouse Virtual Desktop Specifications Safety Vendor Uninterrupted Power Supply Statistics Programming Identity Theft Bitcoin IT service Network Congestion Documents Pain Points Heating/Cooling Entertainment Data Protection Navigation cache Television Upgrades Smart Tech Distribution Piracy Upload In Internet of Things Recycling HTML Professional Services LiFi Analytic Fiber-Optic Database PDF Data Analysis WannaCry Upselling Downloads Motion Sickness Best Available Keyboard GDPR Time Management Freedom of Information Video Surveillance Product Reviews Telephone System Scalability Corporate Profile Webinar Mobile Security Tech Assessment SharePoint Deep Learning Multi-Factor Security Cost Messenger Tracking Domains Saving ZTime Work/Life Balance Read Software License Trends Devices Rental Service Meetings Public Speaking Voice over Internet Protocol Tip of the week Visible Light Communication Memory Fraud Tactics Fileless Malware Google Calendar UTM Content Web Server Shortcut Modem Touchscreen News Debate IT consulting Cabling Proxy Server VoIP Harddrive Device Management Entrepreneur Term Consultation GPS Business Managemenet Legislation Error Books Workers Troubleshooting Electronic Medical Records Knowledge Content Management IT Plan Enterprise Resource Planning Wi-Fi Administrator Technology Tips CIO Accountants A.I. Supercomputer HIPAA Recording External Harddrive Best Practives Virtual Assistant Advertising Flash email scam Addiction Environment Directions Multi-factor Authentication Competition SSID Fake News Windows XP Worker Electronic Payment Dark Web Audit Staffing Google Wallet online Currency Processing 3D Data Warehousing Ebay Microserver Displays Wireless Headphones Telephone Reading Samsung Business Owner Health IT Thin CLient Society Migration Connected Devices Access Micrsooft LinkedIn Equifax Fleet Tracking Employer Employee Relationship IP Address Smart Phones Emergency Hard Drive Disposal Network Management G Suite Managed IT Service Device security MSP Hacks Physical Security Application Get More Done Microsoft Excel Licensing Human Resources Bookmark Computer Care Drones Botnet Google Play Google Drive Adminstration Windows Server 2008 Pirating Information Turn Key Skype Nanotechnology Social Network Relocation Tablets Leadership Printer Server Archive Desktop Finance Banking Spyware Mobile Payment Startup Asset Tracking Vulnerability Trojan Permissions Language Business Cards Service Level Agreement Sync Processor Username Notifications CCTV Digital Signature Medical IT Point of Contact Unified Threat Management Backup and Disaster Recovery Browsers Electricity Printing Organize Business Metrics Computer Malfunction Teamwork Security Cameras Windows 7 switches Writing Screen Reader Customer Resource management Reliable Computing User Tip Music Gamification Managing Stress Printers Regulation CrashOverride 3D Printing Capital Productuvuty

toner1