Computerware Blog
Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
0 Comments
One of the hot topics in recent news is a concept in European courts about the "right to be forgotten." The ruling, passed in May 2014, suggests that search engines must consider requests for removal of content that is, according to ZDNet, "inadequate, irrelevant, or no longer relevant." In some circles, this ruling is seen as controversial.
We're living smack dab in the middle of the data age. In fact, 90% of the world's data was generated last year. New devices and systems create crazy amounts of data, and every byte must be processed, stored, and catalogued in such a way that it can be easily retrieved from any device, anywhere. The IT industry refers to this as "Big Data," and how your business manages its data will determine your success in this new age.
Whether you like it or not, the Internet of Things is fast-approaching. Some experts have raised concerns about the phenomenon, and they feel that the world isn't ready for it. According to the Pew Research Center, the Internet of Things might bring about the violation of our most basic human rights, and who knows what else.
Doge, the Internet meme of a grammatically-challenged Shiba Inu dog that prefers comic sans, is so popular that it has its own online currency called Dogecoin. The fact that Dogecoin exists may be news to you, but it's also news that Dogecoin is temporarily stopping its service after its database (the Doge Vault) was hacked.
It's hard to tell the difference between the words Internet and intranet. What difference do two letters make, anyway? You'd be surprised to find out that it means everything when trying to pinpoint your internal marketing strategies. Linguistics offers the key to understanding the differences between the two words.
Spam in your email inbox is extremely annoying. Email spam is always an eyesore, and swallows up valuable time wasted on sifting through your inbox. Have you ever wondered how email spam got its name? You may be surprised to find the answer. Here's a hint: it has something to do with Vikings, a diner, canned meat, and a British comedy.
When getting work done on the Internet, users are faced with a slew of threats that could hack sensitive company and personal data. Integrating a VPN solution may be your best option in securing your company network and files from online attacks. What is VPN, and why should your company be using it?
What's a #hashtag? One recent addition to popular culture is the use of hashtags. Every time you look at a flier, watch the news, or talk with a teenager, you'll be exposed to different and confusing hashtags. What are hashtags anyway? What's their function? How can they help your social media marketing efforts? #readmore
Is your computer infected with a Distributed Denial of Service (DDOS) virus? If your workstation is infected with DDOS, then you wouldn't know about it. DDOS is a virus that compromises web servers by creating a zombie command-and-control center. This allows hackers to take control of your servers for the purpose of using your computers for malicious activities.
Upselling is a profitable marketing strategy used by virtually every for-profit business. One industry that stands out as "Masters of the Upsale" are mobile device sales organizations. One of the most popular add-ons is the smartphone protection plan, commonly referred to as "smartphone insurance." Are smartphone protection plans worth the extra expense?
Take a minute to look at the computer you're using to read this. Are you using a flat screen? How large is your hard drive? What do you use to transfer your data from one place to another? Most likely your screen is indeed flat, your hard drive is no less than 300-500 gigabytes and you carry a portable hard drive on your key ring. Technology, it seems, gets better with every passing day.
How do you take over the planet? First, you control it's flow of information (Google Search). You then develop and analyze a map (Google Earth), then you send in reconnaissance for a closer look (Street View Car), then you set up encrypted communications (Google Loon), you can then strike when least expected.
Have you ever got those e-mails that state that there is a problem with your bank account and that they need to verify your personal information? Or while researching material on the web, click on a site where it wants you to download something? You may know that these things pose threats to your security, but not everyone in your office does, which could mean trouble if they don't.
Keeping your network and data safe is extremely important. We advocate to our clients that they should come up with complex and unique passwords for each of their accounts. Account hackers have improved their methods, so in order to ensure that you aren't a victim of information theft or worse, diligence in the creation of your passwords is essential.
The Internet has often been compared to its own country. Social media websites and online games make up cyber-communities that are bigger than some of the most populated nations. Taking us one step closer to the New World Order, the Internet now has its own currency called Bitcoins. While Bitcoins may not be right for your business, it does make for a unique investment opportunity.
The late Alaskan Senator Ted Stevens once famously stated that the "internet is not something that you can just dump something on. It's not a big truck. It's a series of tubes." This infamous statement was made at a time of exponential growth of the internet. Little did he know that only a handful of years later, the internet would develop into that big truck where virtually anything could be dumped.