facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Excel to Excel-lerate

Tip of the Week: Using Excel to Excel-lerate

Microsoft Excel has been around for quite some time, but it’s one of the trickier Microsoft Office solutions to master. You might know all about some of the more common Excel tricks, but do you know these power shortcuts that can help you fully take advantage of the spreadsheet software? Here are some obscure Excel shortcuts that your organization can take advantage of.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Hackers Business Management Hardware Microsoft Workplace Tips Network Security Backup Hosted Solutions Managed Service Provider Productivity Business Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration VoIP IT Support Data Backup Smartphones Quick Tips IT Support Mobile Devices communications Network Business Continuity Microsoft Office Gadgets Social Media Disaster Recovery Data Recovery Cybersecurity Android Upgrade Mobile Office Server Communication Phishing Smartphone Virtualization Miscellaneous Mobile Device Management Vendor Management Holiday Ransomware Windows Outsourced IT Tech Term Operating System Passwords Apps Windows 10 Managed IT Services Users Mobile Device Internet of Things Unified Threat Management Remote Monitoring Facebook BDR Automation Data Management Analytics Managed IT services BYOD Remote Computing Mobile Computing Apple Windows 10 WiFi The Internet of Things Training History Artificial Intelligence Marketing Cloud Computing Browser Firewall Save Money Spam Help Desk Alert Encryption Business Technology App Big data Office 365 Bandwidth Health Two-factor Authentication IT Consultant Office Information Technology Going Green Maintenance Printer Hard Drives Budget Bring Your Own Device Managed IT Antivirus Access Control Gmail Government Windows 7 Cybercrime Content Filtering Cost Management Hiring/Firing Information Virus Tech Support Healthcare Wireless Technology Computers Saving Time VPN Search Recovery Managed Service Employer-Employee Relationship Outlook Retail Windows 8 Lithium-ion Battery Best Practice Hacking Money Computing IBM Humor Project Management Document Management Augmented Reality Remote Work Customer Service Travel Phone System Education Data Security It Management Update Networking Blockchain iPhone Data Loss Downtime Data Breach SaaS Hacker Customer Relationship Management Computer Repair Running Cable Proactive IT Law Enforcement PowerPoint Voice over Internet Protocol Covid-19 Solid State Drive Compliance Administration Data storage Twitter Flexibility Intranet Wireless Applications Current Events File Sharing Storage Website Avoiding Downtime Hard Drive Conferencing Legal Risk Management Patch Management Mobility Vendor Regulations Value Save Time Password Excel Router Sports Disaster Meetings Private Cloud Management Hosted Solution Digital Comparison Tablet End of Support Company Culture Wi-Fi Robot Websites Vulnerabilities Securty Telephony User Machine Learning Social Networking Virtual Desktop Telephone Systems Software as a Service Social Black Market Cryptocurrency DDoS Laptop Business Growth Cooperation Google Maps Word Net Neutrality Business Intelligence Scam Social Engineering Fax Server Monitoring Paperless Office Cortana Digital Payment Unified Communications Settings Computing Infrastructure Hack Solutions How To Computer Accessories Evernote Virtual Assistant Professional Services Download Processors Multi-factor Authentication USB Telephone Trending IT service Start Menu Tech Terms Integration Presentation Gaming Console Mouse Mobile Technology Microchip Taxes Webcam Programming Specifications Distributed Denial of Service Safety Text Messaging Statistics Network Congestion Bluetooth Uninterrupted Power Supply Managed Services Provider Vulnerability Public Cloud Licensing Documents How To Teamwork Heating/Cooling Entertainment Bitcoin User Error Distribution Streaming Media Memory Data Protection Employee/Employer Relationship Identity Theft Co-managed IT Google Docs Managed Services Smart Devices Experience Managed IT Service Inbound Marketing Cleaning Downloads Monitors Politics Cost Virtual Reality Office Tips Pain Points Automobile Chrome Processor eWaste Emails Lifestyle Chromebook YouTube Redundancy Messenger Entrepreneur Tracking Best Practives Legislation Error VoIP User Tip Proactive Maintenance Troubleshooting IT Plan Enterprise Resource Planning Internet Service Provider Micrsooft Touchscreen News Security Cameras Threats A.I. Regulations Compliance Knowledge HIPAA Upselling email scam Addiction IT Assessment online Currency Drones Consultation Navigation Virtual Machine Rental Service Environment Accountants eCommerce Competition Cabling Technology Tips Data Analysis Employees Electronic Payment Web Server Video Surveillance Microserver Remote Working Books Saving ZTime Workers Wireless Headphones Permissions Language Audit SQL Server Business Owner Administrator Migration Connected Devices LinkedIn Fake News GDPR Managing Risk Get More Done Equifax Fleet Tracking Financial Data IP Address Network Management Electronic Health Records Data Warehousing Tech Hypervisor Supercomputer Writing Emergency Hard Drive Disposal Holidays Harddrive Application Worker Printer Server Memes Archive Music Access Fileless Malware Hybrid Cloud Human Resources Debate Device security Turn Key MSP switches Skype Modem Strategy Reading Samsung Trojan Nanotechnology Social Network Computer Care Proxy Server Azure GPS Desktop Finance Managing IT Services Upgrades Microsoft Excel Employer Employee Relationship Startup Asset Tracking Telework Point of Contact LiFi Electronic Medical Records Transportation G Suite Business Cards Organize Service Level Agreement Surveillance Google Drive Windows Server 2008 Term External Harddrive Recording Optimization Digital Signature Unified Threat Management Backup and Disaster Recovery IT Spyware Mobile Payment Directions Display Hacks Physical Security Username Remote Workers SSID Relocation Thin CLient Tablets Screen Reader Customer Resource management Work/Life Balance Electricity Printing Dark Web Free Resource Banking 3D Botnet Ebay Gamification Virtual Private Network Deep Learning Smart Phones Smart Tech FinTech Visible Light Communication Analytic Health IT Sync Piracy Upload Development Recycling Processing IT consulting Product Reviews Logistics Virtual Machines Fiber-Optic Webinar Database cache Television Wasting Time Notifications PDF CCTV HTML Data Storage Cyber security Best Available Reliable Computing Keyboard Leadership Telephone System Read WannaCry Bookmark Business Metrics Adminstration Computer Malfunction Pirating Information Mobile Security Procurement Multi-Factor Security Advertising Flash Corporate Profile Employer/Employee Relationships In Internet of Things Domains Software License Trends Video Conferencing CIO Time Management Freedom of Information Google Play Telephone Service PCI DSS Windows XP Microsoft 365 Public Speaking Fraud Tactics Communitications Device Management Staffing Google Wallet Assessment SharePoint Managing Costs Devices Medical IT Trend Micro Scalability Shortcut Content Management Society Google Calendar Browsers Motion Sickness UTM Content Supply Chain Management Business Managemenet Displays Tip of the week Capital Printers Productuvuty 3D Printing Personal Information Managing Stress Regulation CrashOverride Financial