This website uses cookies in order to offer you the most relevant information. Please accept cookies for the most optimal performance. 

80

Blog

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Steps to Find Your Email Message in Gmail

b2ap3_thumbnail_search_gmail_400.jpg
If your business uses Gmail as its preferred email client, then you know that it’s a great way to keep communications running smoothly. Sometimes, however, a message might fall through the cracks, and you’ll need to locate it in order to acquire certain information. Gmail has made it easy to locate lost messages with their search feature.

0 Comments
Continue reading

What it Takes to Successfully Migrate to the Cloud

b2ap3_thumbnail_cloud_computing_for_business_400.jpg
Now that the cloud has become an affordable and versatile part of the business environment, more organizations than ever are moving to take advantage of it as much as possible. However, for the folks who are new to cloud computing, you might want to hold your horses and take a look at how you can prepare to move your business to the cloud. Doing so can alleviate some of the challenges that come from overhauling your IT infrastructure.

0 Comments
Continue reading

YouTube Now Offers a Premium Paid Service, Is It Worth the Money?

b2ap3_thumbnail_youtube_red_streaming_400.jpg
YouTube has been a monstrous hit for Internet video enthusiasts ever since its creation, but just recently, it was announced that YouTube now has a premium service called YouTube Red. Now you can watch viral videos and other great entertainment flicks in a whole new way. Still, this change has some people concerned over what it means for their current YouTube watching habits. What do you get with a YouTube Red subscription, anyway?

0 Comments
Continue reading

Tip of the Week: Here’s the Easiest Way We’ve Found to Merge 2 Email Accounts

b2ap3_thumbnail_email_merge_400.jpg
If you’ve been a computer user for some time, there is a distinct possibility that you have more than one email account. At the very least you have your home address, and it’s increasingly likely that your college, your place of employment, your ISP, or some other organization has issued some sort of email address. There is now a way to combine these accounts into a single email address of your choice.

0 Comments
Continue reading

Is Windows 10 Living Up to the Expectations of Microsoft?

b2ap3_thumbnail_windows_10_400.jpg
The hype train keeps chugging along for Windows 10, and it’s obvious why. It’s a great operating system that’s changing the way that businesses handle their daily tasks. But is Windows 10 doing as well as it lets on? According to desktop operating system usage statistics from NetMarketShare, Windows 10’s adoption rate has significantly slowed down in recent months, while more people continue to take advantage of Windows 7 and 8.x. Why?

0 Comments
Continue reading

3 Favorite Technologies Politicians Use to Connect With Voters

b2ap3_thumbnail_campaign_it_400.jpg
Technology is everywhere. Coincidentally, that is exactly where every political candidate wants to be. With the 24/7 news cycle and social media leading the charge, technology has become one of the most important aspects of election season. The lead-up to any election is a tense time for the candidates, and for their supporters. With public arguments being had about different philosophies, ideologies, and platforms, it’s important to understand how today’s candidates handle technology while on the campaign trail.

0 Comments
Continue reading

Tip of the Week: Find Success By Building a Professional Network On Facebook

b2ap3_thumbnail_facebook_networking_for_your_business_400.jpg
It’s a known fact that social media is a great asset for the modern business owner to leverage, but you wouldn’t believe how often it’s misconstrued as a waste of time. In fact, social media outlets like Facebook, Twitter, LinkedIn, and even YouTube, are so commonplace nowadays in the business world that your organization could fall behind others that properly utilize them. Facebook, in particular, is a powerful tool that can be used for online networking purposes.

0 Comments
Continue reading

1 Million Websites Soon to Be at Risk Due to Change in Encryption Protocol

b2ap3_thumbnail_SHA1_encryption_400.jpg
Eventually, one technology gets replaced by another and users of the older technology must upgrade, or else risk running an inefficient operation. This upgrade-or-be-obsolete scenario plays out most often with software, like with SHA1, the Internet’s most popular encryption protocol, slated to have its SSL certificates expire on January 1, 2017.

0 Comments
Continue reading

Cloud Computing Isn’t 100% Perfect, Be Sure to Account For These 3 Risks

b2ap3_thumbnail_more_security_400.jpg
Organizations are taking to the skies with cloud computing solutions in the workplace, and it’s proving to be a valuable investment. However, such unprecedented growth doesn’t come without its fair share of risks. How does the cloud affect your business’s ability to function without unknowingly compromising your data infrastructure, or risking heavy downtime?

0 Comments
Continue reading

Tip of the Week: Adjust Camera Settings and Resize Pictures to Better Store/Share Your Digital Photos

b2ap3_thumbnail_images_resize_400.jpg
Thanks to so many people carrying camera-equipped smartphones, our society is inundated with photos like never before. For many of us, sharing and posting pictures has become second nature. Although, not everyone is aware of just how large the file size of pictures can potentially be, and why large photos can be problematic.

0 Comments
Continue reading

Professional Athletes Now Connected to The Internet of Things

b2ap3_thumbnail_nfl_internet_of_things_400.jpg
Professional sports have a unique relationship with technology. On one hand, the games are steeped in tradition and one doesn’t make a change to the rules without risking a fan uproar. However, the latest technology has always been a part of the sporting world, enhancing the fan experience and changing things for the better. The National Football League provides us with a great example of this dynamic.

0 Comments
Continue reading

Beyond Jargon: What Does “Enterprise-Level” Mean?

b2ap3_thumbnail_what_is_enterprise_400.jpg
When you’re shopping around for new technology for your business, you’ll encounter all kinds of solutions that are designed for different business models. As a small business owner, you probably wonder why some vendors label their solutions as “enterprise-level.” Well, we’re here to explain that.

0 Comments
Continue reading

Tip of the Week: 5 Giveaways that You’re Being Baited With a Phishing Scam

b2ap3_thumbnail_phishing_scams_400.jpg
Phishing attacks grow more common every day, particularly because it’s so challenging to know who’s for real and who’s a fake on the Internet. The anonymity of the Internet has fostered an environment where hackers can extort money with little fear of getting caught, under the right circumstances. How can you protect yourself and your business from being targeted by phishing attacks?

0 Comments
Continue reading

Alert: Hackers Targeting ATMs to Get At Your Cash

b2ap3_thumbnail_atm_malware_400.jpg
ATMs are probably everyone’s favorite kind of computer. You swipe your card, enter in your PIN, and withdraw cash immediately. Many people forget that an ATM is simply a computer in disguise, though; one that can be infected with malware just as easily as any old PC can. A new type of ATM malware, GreenDispenser, is making its rounds in Mexico, and could potentially make its way to other countries if left unchecked.

0 Comments
Continue reading

Tales from the Haunted Server Room

b2ap3_thumbnail_shock_n_awe_it_400.jpg
It was a dark and stormy night, as it sometimes is on Halloween. It’s a time when kids and adults alike enjoy dressing up as scary monsters and partaking in some good old-fashioned trick-or-treating. You’re pulling a late night at the office, and you hear a sound emanating from your server room; an unsavory clicking sound that echoes through the recesses of your office. What do you do?

0 Comments
Continue reading

Tip of the Week: 3 Basic PC Tips That Every User Should Know

b2ap3_thumbnail_basic_pc_tips_400.jpg
For this week’s tip, we’re getting back to the basics by highlighting three PC tips that every user should know. If you aren’t familiar with these common tips, then don’t feel bad. This article is for you and you’ll be a more proficient computer user because of it!

0 Comments
Continue reading

3 Reasons Why Your Small Business May Be In a Hacker’s Crosshairs

b2ap3_thumbnail_comprehensive_cynersecurity_400.jpg
Here’s a surprising fact for October’s Cyber Security Month: small businesses are at a greater risk of a hacking attack. Many small organizations feel that they’re not a target for hackers due to their size, but this is what hackers want you to think so you’ll focus less on securing your network.

0 Comments
Continue reading

Microsoft Expands Hardware Offerings with Surface Book [Video]

b2ap3_thumbnail_the_surface_book_400.jpg
Microsoft and Apple have been going at it for decades. Not only have these two tech monsters been at it in the lab, they’ve been each other’s prime competition throughout the advents of the personal computer, the graphic user interface, and the smartphone. Today they continue to make devices that deliberately (or not) seem more like counterpunches to the other than pure innovation.

0 Comments
Continue reading

Tip of the Week: How to Prepare Your Organization for The Internet of Things

b2ap3_thumbnail_internet_of_things_security_400.jpg
Most devices that are being produced these days are aiming for the “connectivity” angle, be it simply connecting to the Internet, or allowing you to stay connected to something specific through the cloud. While this does wonders for productivity and online interaction, some users approach these devices without considering the state of online security. October is Cybersecurity Month, so there’s no time like the present to ask yourself how trends in Internet of Things security can affect your organization.

0 Comments
Continue reading

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpg
Malware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

0 Comments
Continue reading

News & Updates

Computerware is proud to announce the launch of our new website at ww.cwit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Computerware can do for your business.

Computerware, Inc.
8480 Tyco Road Suite I
Vienna, Virginia 22182

Copyright 2025 Computerware. All Rights Reserved.

FPS
104 FPS (104-104)