This website uses cookies in order to offer you the most relevant information. Please accept cookies for the most optimal performance. 

80

Blog

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What a Software Licensing Nightmare Scenario Looks Like

b2ap3_thumbnail_licensed_software_400.jpg
What's the licensing status of your company's software look like? If you've not been intentional about this, then your business may be using several unlicensed applications. You may be thinking, "Everything works fine. No big deal." Sure, it's no big deal--until you're caught!

0 Comments
Continue reading

Europe’s Great Debate: The Right to Be Forgotten

b2ap3_thumbnail_do_you_have_the_right_to_be_forgotten_400.jpg
One of the hot topics in recent news is a concept in European courts about the "right to be forgotten." The ruling, passed in May 2014, suggests that search engines must consider requests for removal of content that is, according to ZDNet, "inadequate, irrelevant, or no longer relevant." In some circles, this ruling is seen as controversial.

0 Comments
Continue reading

The Challenges of Keeping Up with Big Data

b2ap3_thumbnail_control_big_data_400.jpg
We're living smack dab in the middle of the data age. In fact, 90% of the world's data was generated last year. New devices and systems create crazy amounts of data, and every byte must be processed, stored, and catalogued in such a way that it can be easily retrieved from any device, anywhere. The IT industry refers to this as "Big Data," and how your business manages its data will determine your success in this new age.

0 Comments
Continue reading

The Internet of Things Could Cause More Harm Than Good

b2ap3_thumbnail_connectivity_or_hype_400.jpg
Whether you like it or not, the Internet of Things is fast-approaching. Some experts have raised concerns about the phenomenon, and they feel that the world isn't ready for it. According to the Pew Research Center, the Internet of Things might bring about the violation of our most basic human rights, and who knows what else.

0 Comments
Continue reading

What is the Future for Net Neutrality?

b2ap3_thumbnail_net_neutrality_no_monopoly_400.jpg
The issue of net neutrality is a hot topic in the United States, but not many people actually know what it is and how it affects their day-to-day routine. This is certainly an important topic that shouldn't be ignored, as it might very well affect all end users.

0 Comments
Continue reading

Dogecoin Hacked! Such Loss.

b2ap3_thumbnail_docecoin_wow_400.jpg
Doge, the Internet meme of a grammatically-challenged Shiba Inu dog that prefers comic sans, is so popular that it has its own online currency called Dogecoin. The fact that Dogecoin exists may be news to you, but it's also news that Dogecoin is temporarily stopping its service after its database (the Doge Vault) was hacked.

0 Comments
Continue reading

Intranet – Did You Mean “Internet”?

b2ap3_thumbnail_intranet_400.jpg
It's hard to tell the difference between the words Internet and intranet. What difference do two letters make, anyway? You'd be surprised to find out that it means everything when trying to pinpoint your internal marketing strategies. Linguistics offers the key to understanding the differences between the two words.

0 Comments
Continue reading

Where Did Internet Spam Come From?

b2ap3_thumbnail_spammy400.jpg
Spam in your email inbox is extremely annoying. Email spam is always an eyesore, and swallows up valuable time wasted on sifting through your inbox. Have you ever wondered how email spam got its name? You may be surprised to find the answer. Here's a hint: it has something to do with Vikings, a diner, canned meat, and a British comedy.

0 Comments
Continue reading

Protect Your Critical Data with VPN

b2ap3_thumbnail_vpnet400.jpg
When getting work done on the Internet, users are faced with a slew of threats that could hack sensitive company and personal data. Integrating a VPN solution may be your best option in securing your company network and files from online attacks. What is VPN, and why should your company be using it?

0 Comments
Continue reading

Tips to Get the Most out of eBay!

b2ap3_thumbnail_bebaylogo400.jpg
You can find anything you need on eBay, and be entertained by perusing thousands of crazy items you don't need. Since 1995, eBay has been one of the most dominant forces for online shopping. You can use eBay to both make and save money, but you have to know how to work eBay for your advantage.

 

0 Comments
Continue reading

Hashtags Mean Business

b2ap3_thumbnail_tagball400.jpg
What's a #hashtag? One recent addition to popular culture is the use of hashtags. Every time you look at a flier, watch the news, or talk with a teenager, you'll be exposed to different and confusing hashtags. What are hashtags anyway? What's their function? How can they help your social media marketing efforts? #readmore

0 Comments
Continue reading

Get Rid of Virtual Zombies Once and For All

b2ap3_thumbnail_zomb400.jpg
Is your computer infected with a Distributed Denial of Service (DDOS) virus? If your workstation is infected with DDOS, then you wouldn't know about it. DDOS is a virus that compromises web servers by creating a zombie command-and-control center. This allows hackers to take control of your servers for the purpose of using your computers for malicious activities.

0 Comments
Continue reading

Should you Go with a Smartphone Protection Plan?

b2ap3_thumbnail_broken400.jpg
Upselling is a profitable marketing strategy used by virtually every for-profit business. One industry that stands out as "Masters of the Upsale" are mobile device sales organizations. One of the most popular add-ons is the smartphone protection plan, commonly referred to as "smartphone insurance." Are smartphone protection plans worth the extra expense?

0 Comments
Continue reading

Technology of Tomorrow

b2ap3_thumbnail_worldhand400.png
Take a minute to look at the computer you're using to read this. Are you using a flat screen? How large is your hard drive? What do you use to transfer your data from one place to another? Most likely your screen is indeed flat, your hard drive is no less than 300-500 gigabytes and you carry a portable hard drive on your key ring. Technology, it seems, gets better with every passing day.

0 Comments
Continue reading

Google Creates Skynet: A Network In The Sky

b2ap3_thumbnail_googleloon400.png
How do you take over the planet? First, you control it's flow of information (Google Search). You then develop and analyze a map (Google Earth), then you send in reconnaissance for a closer look (Street View Car), then you set up encrypted communications (Google Loon), you can then strike when least expected.

0 Comments
Continue reading

Train Your Users or Become a Victim

b2ap3_thumbnail_hack400.png
Have you ever got those e-mails that state that there is a problem with your bank account and that they need to verify your personal information? Or while researching material on the web, click on a site where it wants you to download something? You may know that these things pose threats to your security, but not everyone in your office does, which could mean trouble if they don't.

0 Comments
Continue reading

Hackers are Taking Advantage of Technology Improvements

b2ap3_thumbnail_PasswordSec400.jpg
Keeping your network and data safe is extremely important. We advocate to our clients that they should come up with complex and unique passwords for each of their accounts. Account hackers have improved their methods, so in order to ensure that you aren't a victim of information theft or worse, diligence in the creation of your passwords is essential.

0 Comments
Continue reading

Bitcoins: the Official Made Up Currency of the Internet

b2ap3_thumbnail_BitcoinStacks400.jpg
The Internet has often been compared to its own country. Social media websites and online games make up cyber-communities that are bigger than some of the most populated nations. Taking us one step closer to the New World Order, the Internet now has its own currency called Bitcoins. While Bitcoins may not be right for your business, it does make for a unique investment opportunity.

0 Comments
Continue reading

The History of Social Networking

b2ap3_thumbnail_SocialMedia400.jpg
The late Alaskan Senator Ted Stevens once famously stated that the "internet is not something that you can just dump something on. It's not a big truck. It's a series of tubes." This infamous statement was made at a time of exponential growth of the internet. Little did he know that only a handful of years later, the internet would develop into that big truck where virtually anything could be dumped.

0 Comments
Continue reading

Tip: Change Your Home Page on Your Web Browser

b2ap3_thumbnail_Updates400.jpg
Your home page is where your virtual heart is. Okay, maybe your home page is not that big of a deal to you, but it's nice to be greeted by your favorite website every time you log onto the Internet. Here's how you go about changing the home page on the three major Web Browsers.

0 Comments
Continue reading

News & Updates

Computerware is proud to announce the launch of our new website at ww.cwit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Computerware can do for your business.

Computerware, Inc.
8480 Tyco Road Suite I
Vienna, Virginia 22182

Copyright 2025 Computerware. All Rights Reserved.

FPS
FPS