facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What to Do if Your Smartphone Goes Missing

Tip of the Week: What to Do if Your Smartphone Goes Missing

Uh oh—your mobile device is missing.

If you ever find yourself in this situation, time is of the essence… particularly if you have reason to believe that your device was stolen. To help prevent things from getting messy, we’ve put together a checklist for you to run down in case you suddenly can’t find your smartphone or tablet.

0 Comments
Continue reading

Tip of the Week: What to Do Before You Lose Your Phone

Tip of the Week: What to Do Before You Lose Your Phone

It isn’t like anyone actively means to lose their smartphone, but stuff happens. After all, many of us have our device in-hand for most of our waking hours, so there’s plenty of opportunities for it to be left behind somewhere. Fortunately, there are ways that you can set up your smartphone to help track it should it be lost, whether it’s an Apple device or on the Android platform.

0 Comments
Continue reading

Tip of the Week: Keeping a Smartphone Cool

Tip of the Week: Keeping a Smartphone Cool

Smartphone users know how hot their devices can get, seemingly without reason, and how unnerving that can be. No wonder—these heat levels can damage the device itself. This means it is very important to try and control its temperature as best you can. We’ve put together some tips to help you keep your phone from overheating.

0 Comments
Continue reading

Essential Hardware for the Pandemic

Essential Hardware for the Pandemic

With the COVID-19 pandemic over a half a year old now, people have been pretty resilient and found their footing after the shock of being sent home from work early in March. Many people have actually returned to work, joining millions of essential workers that worked through the government-mandated shut down periods. There are millions of others, however, who are still working from home, as their businesses try to keep operations running smoothly with a remote workforce. 

0 Comments
Continue reading

How to Properly Manage Mobile Devices Connected to Your Business

How to Properly Manage Mobile Devices Connected to Your Business

As remote work has become more common, so have tools that assist mobility and Bring Your Own Device strategies. Considering this, businesses need the means to keep control of their data and the technology that can access it. To do so, Mobile Device Management cannot be oversold as a benefit.

0 Comments
Continue reading

Is My Smartphone Tracking COVID-19 Exposures Without My Consent?

Is My Smartphone Tracking COVID-19 Exposures Without My Consent?

Remember a few months ago when Google and Apple joined forces to come up with a system to help state and local governments establish a COVID-19 Exposure Notification system? If you didn’t, you aren’t alone. A lot has been going on lately. Just to catch you up, the two tech giants recently pushed out an update across nearly all modern smartphones so state and local governments can deploy apps to notify people when they may have been exposed to COVID-19. Let’s do a deep dive on what this means for your privacy.

0 Comments
Continue reading

Tip of the Week: Apps to Avoid on Android

Tip of the Week: Apps to Avoid on Android

It is an indisputable fact that the Google Play Store has a ridiculous number of applications for users to select from. It is also a fact that many of these applications should not be downloaded, and instead actively avoided. For this week’s tip, we’re giving a few examples of the kind of app you should steer clear of, and why.

0 Comments
Continue reading

How a Mobile Device Policy Can Benefit Your Business

How a Mobile Device Policy Can Benefit Your Business

With mobile devices being as popular as they are, so ingrained into modern culture, the fact of the matter is that your employees are going to have them in the workplace. They may even want to use them in a work capacity. This can provide a few benefits to a business, as long as it is managed properly. A carefully-crafted mobile device policy can help accomplish this.

0 Comments
Continue reading

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

0 Comments
Continue reading

The Top 5 Smartphones for the Start of 2019

The Top 5 Smartphones for the Start of 2019

The smartphone market is one of the oddest ecosystems in the world today. Divided between east and west, many of the largest manufacturers in the eastern hemisphere are relatively unknown to western consumers. The market slump that the smartphone industry is currently experiencing only makes it more important to closely examine the features and other improvements that these devices offer. Below, we examine five of the best options for a user’s consideration.

0 Comments
Continue reading

Making the Switch from Apple to Android? Be Prepared!

Making the Switch from Apple to Android? Be Prepared!

With so many options that don’t cost $800, the Android mobile OS gains more customers every day. If you were a dedicated iPhone user that is looking to switch to Android, you have to be cognizant of the things you will need to ensure that you are able to transfer the information you need, and be able to seamlessly pick up your new device without missing a beat. Here are some issues you should consider:

0 Comments
Continue reading

Tip of the Week: Moving Your Apps to Your New Phone

Tip of the Week: Moving Your Apps to Your New Phone

While it feels great to power on a new phone and marvel at its slick new interface and features, you might feel frustrated by the fact that you now have to reinstall all of the applications and data that was on your original device. This week’s tip is dedicated to helping you make this process easier and more efficient for an Android smartphone.

0 Comments
Continue reading

Have You Considered What You’re Really Losing When You Lose Your Phone?

Have You Considered What You’re Really Losing When You Lose Your Phone?

Losing a smartphone can be a problem for anyone. For the modern business, it can really cause issues. Mobile devices are notorious for housing a lot of personal information, which makes them extraordinarily dangerous to lose track of. How much is at stake with mobile devices going missing; and, what kind of information is stored on these devices that makes them so dangerous to misplace?

0 Comments
Continue reading

How To Spot A SMiShing Attempt

How To Spot A SMiShing Attempt

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

0 Comments
Continue reading

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

You’ve been told that it’s a best practice to ensure that you never leave your workstation without locking it first. Yet, if you’re only stepping away for a few minutes, it might be tempting to just allow it to remain unlocked. But what happens when you step away for longer than expected? You leave your computer exposed to all manners of threats. Thankfully, a new solution allows for a fix with a device that most are never without: the smartphone.

0 Comments
Continue reading

Tip of the Week: 4 Ways Google Maps Can Enhance Your Next Trip

Tip of the Week: 4 Ways Google Maps Can Enhance Your Next Trip

Mapping the known world has long been an endeavor sought by explorers, but thanks to a relatively recent tool called Google Maps, anyone with knowledge of a smartphone can see the world at a glance. Granted, Google Maps isn’t the easiest tool to use, but if you follow these tips, you’ll feel like you have the whole world in the palm of your hand… literally.

0 Comments
Continue reading

Google Rewards Hackers Handsomely for Exposing Flaws

Google Rewards Hackers Handsomely for Exposing Flaws

Google has implemented a project to encourage assistance in collecting potential vulnerabilities for its Nexus line of mobile devices, with some considerable prizes associated with it.

0 Comments
Continue reading

Use Your Smartphone Incorrectly and Risk Going Temporarily Blind

Use Your Smartphone Incorrectly and Risk Going Temporarily Blind

It’s no secret that the screens of devices like smartphones, laptops, desktop monitors, and tablets, can contribute to eye pain and what’s called “digital eye strain.” In fact, in some extraordinary cases of prolonged screen use, smartphone use has even led to temporary blindness.

0 Comments
Continue reading

Tip of the Week: Block Telemarketers and Other Annoying Callers From Your Android Device

b2ap3_thumbnail_block_callers_400.jpgCalls from telemarketers are the worst. These unwelcomed calls are especially annoying if you’re trying to be productive, and you’re interrupted in the middle of the workday by the same number repeatedly. Thankfully, more recent models of Android smartphones have the capabilities to blacklist numbers built right into the device. Here’s how it’s done.

0 Comments
Continue reading

3 Favorite Technologies Politicians Use to Connect With Voters

b2ap3_thumbnail_campaign_it_400.jpgTechnology is everywhere. Coincidentally, that is exactly where every political candidate wants to be. With the 24/7 news cycle and social media leading the charge, technology has become one of the most important aspects of election season. The lead-up to any election is a tense time for the candidates, and for their supporters. With public arguments being had about different philosophies, ideologies, and platforms, it’s important to understand how today’s candidates handle technology while on the campaign trail.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Hosted Solutions Email Managed Service Provider Productivity IT Services Saving Money Efficiency Malware Innovation Google Small Business Computer User Tips Collaboration IT Support VoIP Data Backup Quick Tips Smartphones IT Support Network Data Recovery communications Mobile Devices Android Microsoft Office Business Continuity Disaster Recovery Gadgets Phishing Smartphone Cybersecurity Communication Social Media Upgrade Mobile Office Server Mobile Device Virtualization Miscellaneous Users Mobile Device Management Passwords Windows Ransomware Managed IT Services Holiday Operating System Vendor Management BDR Outsourced IT Internet of Things Apps Windows 10 Tech Term Remote Monitoring Automation Unified Threat Management Facebook BYOD Data Management Mobile Computing WiFi Remote Computing Apple Managed IT services Covid-19 Analytics Windows 10 Managed Service Artificial Intelligence History Training Spam The Internet of Things Browser Marketing Cloud Computing Save Money Help Desk Business Technology Firewall Alert Big data Health App Bandwidth Encryption Office Office 365 Budget IT Consultant Two-factor Authentication Information Technology Wi-Fi Printer Antivirus Access Control Windows 7 Gmail Content Filtering Information Managed IT Blockchain Government Going Green Hard Drives Cybercrime VPN Bring Your Own Device Maintenance Networking Cost Management Wireless Technology Virus Tech Support Search Hiring/Firing Best Practice Lithium-ion Battery Document Management Remote Work Outlook Healthcare Recovery Windows 8 Employer-Employee Relationship Saving Time Retail Computers Hacking Education Update Conferencing Risk Management Computing Avoiding Downtime Phone System It Management iPhone Data Security Customer Service Money Patch Management Data Loss Storage IBM Augmented Reality Vendor Humor Project Management Travel Remote Regulations Hacker Administration SaaS End of Support Save Time File Sharing Law Enforcement Router Voice over Internet Protocol Downtime Current Events Wireless Hard Drive Solid State Drive Compliance Data storage Mobility Website Proactive IT Computer Repair Running Cable Flexibility Customer Relationship Management Laptop Data Breach PowerPoint Meetings Password Intranet Legal Value Twitter Applications Websites Telephony Paperless Office Machine Learning Telephone Systems Software as a Service Sports Net Neutrality Employees Disaster Chrome Monitoring Hosted Solution User Business Intelligence Virtual Desktop Digital Payment Robot Social Securty Management Comparison Tablet Google Maps DDoS Excel Vulnerabilities Company Culture Social Engineering Black Market Scam Employee/Employer Relationship Fax Server Cryptocurrency Social Networking Word Business Growth Cooperation Cortana Private Cloud Digital Text Messaging Distribution Processor Webcam Office Tips Start Menu Tech Terms Streaming Media Processors Smart Devices Microchip Taxes YouTube Mobile Technology Unified Communications Cost Distributed Denial of Service Settings USB Solutions Video Conferencing Uninterrupted Power Supply Presentation Professional Services eCommerce Inbound Marketing Vulnerability Public Cloud Licensing Bitcoin Specifications Safety Integration Identity Theft IT service Data Protection Holidays Documents Computer Accessories User Error Notifications Co-managed IT Pain Points Multi-factor Authentication Telephone Teamwork Heating/Cooling Managed Services Provider Downloads Entertainment Virtual Reality Bluetooth Time Management Trending Display Politics Mouse Emails How To Automobile Lifestyle Chromebook Redundancy Managed Services Computing Infrastructure Hack Memory Statistics Managed IT Service Google Docs Programming Evernote eWaste Experience Network Congestion Gaming Console How To Download Cleaning Virtual Assistant Monitors Microserver GPS Smart Tech Advertising Administrator Flash Fake News Entrepreneur Virtual Private Network Managing Costs Piracy CIO Upload Books Workers Audit Troubleshooting Microsoft 365 HTML Windows XP Data Warehousing Environment Recycling Browsers Development External Harddrive Fiber-Optic Staffing Database Google Wallet Supercomputer HIPAA Medical IT Analytic FinTech Trend Micro Electronic Payment User Tip Proactive Maintenance Get More Done Society Telephone System Emergency Hard Drive Disposal Competition Security Cameras Product Reviews Data Storage Threats Mobile Security Displays Worker Access Turn Key 3D Ebay Multi-Factor Security Microsoft Excel Navigation Procurement Virtual Machine Printer Server Thin CLient Software License Trends Reading Micrsooft Samsung Computer Care Business Owner Read Reviews Devices G Suite Google Drive Windows Server 2008 Data Analysis Trojan Smart Phones Fraud Tactics Drones Employer Employee Relationship IP Address Organization Device Management Printers Human Resources Communitications SQL Server Hacks Physical Security Application GDPR PCI DSS Managing Risk Organize UTM Content Spyware Mobile Payment Adminstration Pirating Information Legislation Banking Permissions Error Botnet Language Tech Business Managemenet Supply Chain Management Hypervisor Leadership IT Plan Enterprise Resource Planning Relocation Tablets Electricity Printing Content Management Shopping Accountants A.I. Sync Fileless Malware Internet Service Provider Hybrid Cloud email scam Addiction AI Television Proxy Server online Currency IT Assessment Azure Music CCTV Digital Signature Modem Regulations Compliance Strategy switches Writing cache Transportation Gig Economy Wireless Headphones Business Metrics Computer Malfunction Term Remote Working Webinar Migration Connected Devices Reliable Computing Upgrades WannaCry Electronic Medical Records Equifax LiFi Fleet Tracking In Internet of Things Freedom of Information Directions LinkedIn Network Management Corporate Profile Recording Supply Chains Optimization Assessment SharePoint PDF Dark Web Electronic Health Records Free Resource SSID Financial Data Upselling Device security MSP Health IT Archive Memes Smartwatch Video Surveillance Nanotechnology Social Network Motion Sickness Work/Life Balance Tip of the week Best Available Keyboard Processing Skype Desktop Finance Scalability Deep Learning Google Calendar Startup Visible Light Communication Asset Tracking Touchscreen News Managing IT Services Wasting Time Saving ZTime Business Cards Service Level Agreement Messenger Tracking VoIP Domains Logistics 2FA Virtual Machines Consultation Bookmark Surveillance Best Practives Unified Threat Management Backup and Disaster Recovery Rental Service Knowledge Public Speaking Point of Contact Telework Cyber security IT consulting Username IT Employer/Employee Relationships Debate Screen Reader Customer Resource management Web Server Shortcut Google Play Remote Workers Telephone Service Harddrive Gamification Cabling Technology Tips Capital Financial Managing Stress Productuvuty Regulation CrashOverride Personal Information 3D Printing CES

toner1