This website uses cookies in order to offer you the most relevant information. Please accept cookies for the most optimal performance. 

80

Blog

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 2 Fast and Simple Ways to Search with Google Chrome

b2ap3_thumbnail_drag_and_drop_search_400.jpg
One of the greatest parts of the Internet is how easy it is to search for new information on a particular subject you’re unfamiliar with. Usually this is done by utilizing a search engine like Google, but the search giant’s web browser, Google Chrome, makes this way easier by providing built-in search functions into the browser, including a super-simple drag and drop search function.

0 Comments
Continue reading

Do We REALLY Need to Explain Why You Shouldn’t Stab Batteries With a Knife? [VIDEO]

b2ap3_thumbnail_smartphone_battery_400.jpg
Following in the iPhone’s footsteps, it’s been confirmed that Samsung mobile devices will no longer feature the removable battery and MicroSD card slots that differentiated them from its competition. While it’s not clear if this change will affect sales figures, it will probably be a while before Samsung users understand that their phones no longer feature removable batteries, which could lead to some potentially messy lawsuits.

0 Comments
Continue reading

4 Considerations You Must Make Before Migrating to the Cloud

b2ap3_thumbnail_move_to_the_cloud_400.jpg
Cloud computing has reached a point where the majority of businesses are utilizing the technology to some extent. According to a 2014 survey, about 70 percent of enterprises either have infrastructure or applications in the cloud. As more companies migrate more of their operations to the cloud, we’re getting more questions about what it takes to make such a transition possible.

0 Comments
Continue reading

Tip of the Week: Enable Multi-Factor Authentication for Office 365 to Improve Security

b2ap3_thumbnail_smart_multi_factor_security_400.jpg
With hackers having their way with seemingly-impregnable organizations (like the IRS and Sony Entertainment), companies are investing more into network security. Thankfully, a simple solution like multi-factor authentication presents an easy (and often free) way to dramatically improve security. More applications are making multi-factor authentication available to its users, like Office 365.

0 Comments
Continue reading

Hackers, Take the Wheel

b2ap3_thumbnail_hack_new_cars_400.jpg
Hackers are always looking to take advantage of the latest technology in new and unexpected ways. The Internet of Things is making their job way easier by providing a plethora of Internet-connected devices. Among these devices is the automobile entertainment system, and, you guessed it; hackers can take control of that, too, if given the right circumstances.

0 Comments
Continue reading

How Website URLs Work

b2ap3_thumbnail_domain_information_400.jpg
When it comes to your online presence, few tools are more valuable than your organization’s website. However, in order to have a website, you first need a domain name. There are countless domains available, but did you know that the meaning of these names has changed significantly over the past several years?

0 Comments
Continue reading

Tip of the Week: 5 Ways to Keep Your Internet Browsing Private

b2ap3_thumbnail_anonymous_browsing_400.jpg
It turns out that the Internet isn’t as anonymous as it seems. This is a hard lesson learned by more than 37 million users of Ashley Madison, a website dedicated to cheating on one’s spouse. In July, the site was hacked by the hacker group, “The Impact Team,” and they’re currently threatening to expose the cheaters by going public with the database. In this particular case, Ashley Madison users should have known better--on two levels.

0 Comments
Continue reading

20% of Visits to Pornographic Websites Originate From Office Workstations

b2ap3_thumbnail_content_filtering_400.jpg
With all of the inappropriate content festering in the gutters of the Internet, you need a solution that will protect you, your family, and your office. Implementing a content filtering solution is a great start, but it’s not going to shield you 100 percent from what’s out there. In addition to having a content filter, you need to take an active role in monitoring who’s doing what on the Internet.

0 Comments
Continue reading

Augmented Reality Technology Can Revolutionize How We Learn

b2ap3_thumbnail_ar_applications_400.jpg
Most people rely heavily on their smartphones. If you’ve been out in public recently, you know the behavior we’re talking about. Some people constantly have their noses in their phone. Many sources are beginning to see this as a major cultural problem, but is this because there has been no dedicated strategy to move smartphone users from constant entertainment and current events consumption? Ironically, to move society forward using these “essential” information delivery systems, we may just need more technology, not less.

0 Comments
Continue reading

Tip of the Week: Protect Your Network By Blacklisting Malicious IP Addresses

b2ap3_thumbnail_know_your_ip_400.jpg
Like your fingerprint, your computer’s IP address holds the key to your identity. Okay, it may not be as unique as your fingerprint, and you may actually use multiple IP addresses every day, but still, your IP address says a lot about you. What do you need to know about your IP address?

0 Comments
Continue reading

Buying and Selling Data is a $300-Billion Per Year Industry

b2ap3_thumbnail_i_love_it_when_they_call_me_big_data_400.jpg
There’s no question that mobile devices have changed the way society works on a fundamental level. It’s hard to imagine even leaving the house without your trusty smartphone by your side. The iPhone was once advertised as “life in your pocket,” and this phrase has proven to be entirely too true. Eight years following the introduction of these devices, businesses have grown reliant on this type of mobile technology to stay relevant in their chosen industry.

0 Comments
Continue reading

Can Your Team Spot the Latest Email Security Threats?

b2ap3_thumbnail_email_security_solutions_400.jpg
For many businesses, few parts of a network’s infrastructure are as important as the email management system. It’s a pain point for most businesses, but so many of them don’t understand how best to protect their network from the threats that come through the email medium. What kind of threats should you expect to see, and how can you best protect your business from them?

0 Comments
Continue reading

Tip of the Week: Grow Your Business By Improving Customer Service [VIDEO]

b2ap3_thumbnail_customer_service_tips_400.jpg
The Internet has given modern businesses the ability to grow like never before. On the flip side of the coin, the Internet can quickly bring down a business if a dissatisfied customer chooses to broadcast their negative experience and opinions. Therefore, it’s essential to take customer service seriously.

0 Comments
Continue reading

The Word “Hack” and Falcons Have More in Common Than You Would Think

b2ap3_thumbnail_origin_of_hacking_400.jpg
The word “hack” is a most peculiar word. When we use it, it’s often in the context of discussing a data breach. But did you know that “hack” has been a part of the English language since before computers and even electricity were a thing? Read on to learn more about the fascinating meanings of hack!

0 Comments
Continue reading

The Cloud Conundrum: Why SMBs Need to Worry About Their Mobile Devices

b2ap3_thumbnail_challenges_of_mobile_400.jpg
Mobile technology has changed the way that the business world operates. No longer do employees have to be tethered to their desks in order to remain productive at all times. Instead, they can work while on the road or from their home office. However, if your business’s mobile device management solution is too lax, it might encounter a number of different problems that could potentially ruin the mobile experience for your business.

0 Comments
Continue reading

Tip of the Week: How to Knock the Socks Off Your Audience with Your Speech, Part 2

b2ap3_thumbnail_tips_for_presentation_400.jpg
In last weeks’ tip, we discussed various ways you can prepare for a big presentation, including the content development stage, audience definition, and practice sessions. This week, we’ll be discussing ways in which you can ensure that your presentation goes off without a hitch, so that your audience (and you) can benefit from it as much as possible.

0 Comments
Continue reading

These Stats Don’t Bode Well For Mobile Devices In the Workplace

b2ap3_thumbnail_mobile_app_wasting_400.jpg
Your mobile phone is meant to be an extension of productivity while you’re out of the office, but some people can’t resist the urge to mess around with the numerous entertainment applications right in front of them. Unfortunately, nowhere is this more true than in the office. What’s that? Your employees don’t waste time with mobile devices? Withhold judgment until you see the statistics. Your people might be wasting more time than you think.

0 Comments
Continue reading

What Happens to a Hard Drive When It’s Stored Away for Several Years?

b2ap3_thumbnail_cold_storage_for_server_400.jpg
One of the most common questions we are asked by our clients is, “What’s the best way to store my business’s data?” Questions like these are imperative to the survival of any business endeavor, as they force you to think in the grand scheme of things. So, what’s the best way to store your data long-term?

0 Comments
Continue reading

Tip of the Week: How to Knock the Socks Off Your Audience with Your Speech, Part 1

b2ap3_thumbnail_public_speaking_400.jpg
Whether you’re presenting at a trade show, webinar, conference, or giving a sales demonstration, giving a solid presentation is a crucial skill to master and add to your strategies. However, if you are part of the 74 percent of people who suffer from speech anxiety (glossophobia), these opportunities may seem incredibly daunting. With some solid preparation before your presentation and a few tricks to master while giving one, any professional can master the art of public speaking.

0 Comments
Continue reading

3 out of 4 Professionals Plan on Upgrading to Windows 10

b2ap3_thumbnail_windows_10_logo_onefive_400.jpg
Not all new operating systems released are popular. A few examples from Microsoft’s past include Windows Vista and Windows 8. The reasons why they don’t take off vary, but the end result is the same; less users overall than other Windows operating systems. With Windows 10 on the horizon, one has to wonder if it will have a profound effect on the business world.

0 Comments
Continue reading

News & Updates

Computerware is proud to announce the launch of our new website at ww.cwit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Computerware can do for your business.

Computerware, Inc.
8480 Tyco Road Suite I
Vienna, Virginia 22182

Copyright 2025 Computerware. All Rights Reserved.

FPS
FPS