facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Find a New Home for Your Old PC

b2ap3_thumbnail_recyclepc400.jpgWe all love getting a new computer that's faster and more powerful than our old one, but just because you have a shiny new toy sitting on your desk, doesn't necessarily mean you have to discard your old machine. If you're old PC is in good working order, then there may be another user out there that will treasure your trash.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices User Tips Smartphones Quick Tips Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Network Android Social Media Collaboration Mobile Office Productivity Virtualization Data Backup Server Mobile Device Management Communication Smartphone Miscellaneous Data Recovery Tech Term Ransomware Windows 10 Upgrade communications Unified Threat Management Windows IT Support Passwords Facebook Holiday Remote Monitoring Operating System Apps Managed IT services Cybersecurity Mobile Computing Phishing Vendor Management BYOD Remote Computing Users WiFi BDR Automation Apple Marketing Mobile Device Analytics Data Management The Internet of Things Firewall History Outsourced IT App Browser Save Money Alert Artificial Intelligence Managed IT Services Internet of Things Encryption Big data IT Consultant Gmail Bandwidth Content Filtering Going Green Maintenance Office Printer Bring Your Own Device Antivirus Office 365 Health Spam Cloud Computing Hiring/Firing Hard Drives Managed IT Windows 10 Information Technology Outlook Lithium-ion Battery Windows 8 Best Practice Cybercrime Saving Time Training Cost Management Virus Help Desk Tech Support Wireless Technology Search Business Technology Budget Two-factor Authentication Document Management Recovery Computers Employer-Employee Relationship VPN IBM Travel Access Control Hacking Update Blockchain Healthcare Phone System Money Law Enforcement iPhone Government Applications Proactive IT Compliance Website Running Cable Data storage Managed Service Intranet Twitter Humor Education Augmented Reality Legal PowerPoint Networking Risk Management Regulations File Sharing It Management Hard Drive Information Administration Mobility Save Time SaaS Customer Service Wireless Securty Comparison Tablet Company Culture Data Breach DDoS Solid State Drive Computer Repair Project Management Social Networking Digital Fax Server Websites Black Market Excel Flexibility Cryptocurrency Machine Learning Word Retail Laptop Customer Relationship Management Telephone Systems Password Cortana Business Growth Value Hacker Management Paperless Office Data Security Google Maps Sports Business Intelligence Patch Management Disaster User Digital Payment Computing Router Downtime Hosted Solution Data Loss End of Support Social Engineering Social Scam Robot Avoiding Downtime Current Events Documents User Error Redundancy Computing Infrastructure Hack Co-managed IT IT service How To Heating/Cooling Trending Entertainment Private Cloud Mouse Pain Points Download Storage Evernote Bluetooth Programming Statistics Telephony Lifestyle Start Menu Tech Terms Microchip Taxes Conferencing Network Congestion eWaste Google Docs Distributed Denial of Service Mobile Technology Software as a Service Experience Streaming Media Monitoring Cleaning Public Cloud Uninterrupted Power Supply Monitors Gaming Console Vulnerability Office Tips Processors Bitcoin Webcam Identity Theft Text Messaging USB Data Protection Net Neutrality YouTube Chrome Presentation Unified Communications Settings Politics Vulnerabilities Virtual Reality Automobile Virtual Desktop Cooperation Emails Specifications Safety Inbound Marketing Vendor Computer Accessories Chromebook Messenger Tracking Business Cards Service Level Agreement Tip of the week Leadership Processor Digital Signature Startup Asset Tracking Google Calendar Adminstration Pirating Information Unified Threat Management Backup and Disaster Recovery Touchscreen News Music Browsers Teamwork Webinar VoIP LinkedIn Username switches Writing Medical IT Rental Service Meetings User Tip Cabling Gamification Knowledge Upgrades Security Cameras Web Server Screen Reader Consultation Customer Resource management Books Workers PDF Piracy Archive Upload Virtual Assistant Navigation Wi-Fi Administrator Smart Tech Skype Distribution Technology Tips LiFi Fiber-Optic Database Fake News Data Analysis Best Available Keyboard HTML Audit Professional Services Supercomputer Telephone System Data Warehousing Work/Life Balance Worker Mobile Security Deep Learning Upselling GDPR Domains Point of Contact Video Surveillance Reading Samsung Best Practives Software License Trends Emergency Hard Drive Disposal Tech Public Speaking Multi-Factor Security Access Cost Visible Light Communication Memory Fraud Tactics Microsoft Excel Saving ZTime Fileless Malware G Suite Shortcut Devices Computer Care IT consulting Voice over Internet Protocol Employer Employee Relationship Google Drive Analytic Windows Server 2008 Proxy Server Licensing Entrepreneur Recycling UTM Content Modem Hacks Physical Security Troubleshooting Microserver Debate Electronic Medical Records Relocation Tablets Environment IT Plan Enterprise Resource Planning CIO Harddrive Term Banking Botnet HIPAA Legislation Spyware Product Reviews Error Mobile Payment Advertising Flash Electronic Payment Get More Done email scam Addiction Read Staffing Google Wallet Directions Sync Competition Accountants Electricity A.I. Printing Windows XP GPS Recording Windows 7 Society External Harddrive Dark Web Printer Server Multi-factor Authentication Displays SSID Notifications CCTV Business Owner Turn Key Health IT Reliable Computing Trojan Device Management Migration Connected Devices Micrsooft Processing Business Metrics Computer Malfunction IP Address Wireless Headphones cache Telephone Television Human Resources Content Management Network Management Drones Thin CLient Managed IT Service In Internet of Things Application Organize Equifax WannaCry Business Managemenet Fleet Tracking Downloads 3D Ebay Time Management Freedom of Information Smart Phones Bookmark Device security Corporate Profile MSP Language Scalability Desktop online Currency Finance Google Play Motion Sickness Nanotechnology Assessment Social Network SharePoint Permissions CrashOverride Capital Printers Managing Stress Productuvuty Regulation 3D Printing