facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IBM’s Supercomputer Watson: Jeopardy! Winner, Customer Service Rep., and Now, Tax Professional

IBM’s Supercomputer Watson: Jeopardy! Winner, Customer Service Rep., and Now, Tax Professional

Watson, IBM’s famous question-answering supercomputer, has held many jobs over the years. After dominating the competition on the quiz show Jeopardy! In 2011, Watson moved on to help companies like Macy’s and Geico answer customer questions and improve their mobile apps. More impressively, Watson has even helped doctors diagnose cancer. Now, Watson is tackling a new occupation: Tax Professional.

0 Comments
Continue reading

What’s the Government Doing to Protect Your Tax Returns?

What’s the Government Doing to Protect Your Tax Returns?

Last year’s United States’ tax season when the Internal Revenue Service (IRS) was breached and hackers used 464,000 stolen Social Security numbers to successfully E-file 101,000 fraudulent tax returns using false PINs. This incident should cause taxpayers to ask the question, “What’s the government doing to protect my tax returns?”

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Email Managed Service Provider Hosted Solutions Productivity IT Services Efficiency Malware Saving Money Innovation Google Small Business Computer Collaboration User Tips IT Support VoIP Quick Tips Data Backup Smartphones Network IT Support Data Recovery Mobile Devices communications Microsoft Office Business Continuity Android Gadgets Disaster Recovery Smartphone Cybersecurity Phishing Communication Social Media Upgrade Mobile Office Server Mobile Device Virtualization Miscellaneous Passwords Managed IT Services Users Ransomware Mobile Device Management Windows Holiday BDR Operating System Vendor Management Outsourced IT Internet of Things Apps Tech Term Windows 10 Facebook Automation Unified Threat Management Remote Monitoring BYOD Data Management Analytics Managed IT services Remote Computing Apple Covid-19 WiFi Mobile Computing Windows 10 Training Spam The Internet of Things Help Desk Marketing History Cloud Computing Browser Artificial Intelligence Save Money Managed Service Firewall Business Technology Bandwidth Encryption Alert App Health Big data Office 365 Budget Two-factor Authentication Office Information Technology IT Consultant Bring Your Own Device Hard Drives Managed IT Information Antivirus Gmail Maintenance Printer VPN Government Access Control Networking Cybercrime Wi-Fi Windows 7 Content Filtering Going Green Blockchain Cost Management Outlook Document Management Hiring/Firing Windows 8 Wireless Technology Search Computers Saving Time Healthcare Virus Remote Work Tech Support Recovery Employer-Employee Relationship Retail Lithium-ion Battery Best Practice Conferencing IBM Data Loss Hacking Computing Augmented Reality Money Project Management Customer Service Humor Avoiding Downtime Vendor Storage Travel Education iPhone It Management Update Data Security Risk Management Patch Management Phone System Remote Current Events Save Time Customer Relationship Management SaaS Hacker Router Downtime Voice over Internet Protocol End of Support File Sharing Data Breach PowerPoint Hard Drive Law Enforcement Compliance Proactive IT Mobility Administration Solid State Drive Computer Repair Running Cable Data storage Flexibility Wireless Laptop Intranet Meetings Website Twitter Legal Applications Regulations Value Password Sports Chrome Business Intelligence Scam Digital Payment Disaster Hosted Solution Robot Monitoring Comparison Tablet Securty Company Culture User Google Maps Digital Fax Server Websites Virtual Desktop Management Social Social Engineering Employee/Employer Relationship Social Networking Vulnerabilities Black Market Cooperation Software as a Service Cryptocurrency DDoS Private Cloud Business Growth Word Telephony Machine Learning Excel Net Neutrality Employees Paperless Office Cortana Telephone Systems Time Management Unified Communications Settings User Error Cost Integration Co-managed IT Public Cloud Licensing Holidays Redundancy Smart Devices Processors USB Computer Accessories Gaming Console Identity Theft Notifications IT service Presentation Video Conferencing Managed Services Provider Evernote Webcam Virtual Assistant Trending Text Messaging Display Lifestyle How To Mouse Politics Specifications Safety Multi-factor Authentication Virtual Reality Telephone Emails Start Menu Tech Terms Bluetooth Automobile Managed Services Chromebook Programming Statistics Managed IT Service Mobile Technology Documents Teamwork Heating/Cooling Entertainment Computing Infrastructure Hack Network Congestion Google Docs Uninterrupted Power Supply Memory How To Inbound Marketing Download Vulnerability Processor Experience Bitcoin Monitors Cleaning Streaming Media Office Tips Pain Points Data Protection Distribution Microchip Taxes Solutions eWaste Professional Services eCommerce YouTube Downloads Distributed Denial of Service Freedom of Information Micrsooft Entrepreneur Telephone System Device Management Employer Employee Relationship Upselling Printers SQL Server Corporate Profile Troubleshooting Virtual Private Network Mobile Security G Suite GDPR Managing Risk Multi-Factor Security Hacks Content Management Physical Security HIPAA Development Software License Trends Business Managemenet Video Surveillance Tech Hypervisor Assessment SharePoint Drones Environment FinTech Botnet Saving ZTime Tip of the week Competition Webinar Fraud Tactics Relocation Tablets Fileless Malware Hybrid Cloud Google Calendar Electronic Payment Data Storage Devices Banking Strategy Touchscreen News Reviews online Currency Proxy Server Azure VoIP Permissions Language Business Owner Procurement UTM Content Sync Modem Organization Legislation Error CCTV Harddrive Electronic Medical Records Transportation Knowledge IP Address IT Plan Enterprise Resource Planning Debate Term Consultation Business Metrics Computer Malfunction Recording Optimization switches Writing Communitications Application email scam Addiction Reliable Computing LinkedIn GPS Directions Technology Tips Music PCI DSS Human Resources Accountants A.I. SSID Fake News Upgrades Shopping Dark Web Free Resource Audit Supply Chain Management In Internet of Things External Harddrive AI Best Practives Wireless Headphones Archive Health IT LiFi Internet Service Provider Migration Connected Devices Skype Processing Data Warehousing Fleet Tracking Motion Sickness Thin CLient Logistics Virtual Machines Emergency Hard Drive Disposal Digital Signature IT Assessment Network Management Scalability 3D Ebay Wasting Time Access Regulations Compliance Equifax Cyber security Microsoft Excel Deep Learning Gig Economy Messenger Tracking Bookmark Computer Care Work/Life Balance Remote Working Microserver Device security MSP Point of Contact Smart Phones Windows Server 2008 Supply Chains Nanotechnology Social Network Rental Service Employer/Employee Relationships Visible Light Communication Desktop Finance Google Play Telephone Service Google Drive Startup Asset Tracking Web Server Leadership Microsoft 365 IT consulting Electronic Health Records Business Cards Service Level Agreement Cabling Adminstration Pirating Information Managing Costs Spyware Mobile Payment PDF Financial Data Get More Done Medical IT Trend Micro Best Available Memes Keyboard Smartwatch Printer Server Unified Threat Management Backup and Disaster Recovery Recycling Books Workers Browsers Electricity Printing Turn Key Username Administrator Analytic CIO 2FA Trojan Screen Reader Customer Resource management Supercomputer User Tip Proactive Maintenance Advertising Flash Managing IT Services Domains Gamification Product Reviews Security Cameras Threats Smart Tech Read Windows XP Surveillance Public Speaking Organize Piracy Upload Worker Navigation Virtual Machine cache Television Staffing Google Wallet Telework Displays IT Shortcut Fiber-Optic Database Reading Samsung Data Analysis WannaCry Society Remote Workers HTML Managing Stress CrashOverride Regulation Capital Personal Information Productuvuty 3D Printing Financial

toner1