This website uses cookies in order to offer you the most relevant information. Please accept cookies for the most optimal performance. 

80

Blog

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Gmail Now Lets You Take Back a Sent Email!

b2ap3_thumbnail_gmail_undo_400.jpg
Have you ever felt like you shouldn’t have sent that angry email? Do you second-guess yourself right before sending someone a stern talking-to? With Gmail’s new Undo Send feature, you have the opportunity to take back words that might not have been deserved, or simple mistakes that were meant for someone else. You have to think on your feet, though; the clock is ticking down every second you waste.

0 Comments
Continue reading

6 Apps to Help You Know What Your Competition is Up To

b2ap3_thumbnail_track_your_competition_400.jpg
Have you ever wondered how your competitors are doing but haven't gotten up the nerve to ask them yourself? With these six apps, you’ll be able to keep track of what other people are saying about your competitors, as well as what they are saying about you.

0 Comments
Continue reading

What Does a Firewall Keep Away?

b2ap3_thumbnail_firewall_400.jpg
As a business owner, you depend on your network security solution to protect your assets. You trust it to do its job without your intervention, but do you know how it works? One of the most basic parts of network security is a firewall. These are the first lines of defense against threats which can potentially steal information or destroy it completely. In order to get the most out of your network security solution, it’s your responsibility to understand how a firewall works.

0 Comments
Continue reading

Tip of the Week: How to Prevent “Needing a Vacation from Your Vacation”

b2ap3_thumbnail_post_vacation_blues_400.jpg
Imagine getting back on the plane home and remembering that you have to go back to work in less than twelve hours. It might feel draining and just plain awful, but you might be relieved to know you’re not alone. Returning from a vacation doesn’t have to be as painful as it sounds. In fact, it can be easy if you approach it the right way.

0 Comments
Continue reading

What You Need to Know Before Blindly Upgrading to Windows 10

b2ap3_thumbnail_windows_10_upgrade_400.jpg
We’re counting down the days until the release of Windows 10 on July 29th. The Microsoft hype train is in full gear and the world has high expectations for the new OS. This begs the question, “Should your business upgrade to Windows 10 as soon as possible?”

0 Comments
Continue reading

4 Obvious Signs of a Phishing Attack

b2ap3_thumbnail_phishing_attacks_400.jpg
The online world is full of threats that are waiting for you to let your system's guard down. Thanks to powerful security measures, you might not be worried enough to consider that hackers have found ways to get around your defenses. If you’ve grown complacent, you might be in for a rude awakening when a hacker’s phishing scam works on you.

0 Comments
Continue reading

Tip of the Week: Why It’s Smart to Dumb Down Your Smartphone

b2ap3_thumbnail_useful_smartphone_400.jpg
The smartphone was an incredibly valuable introduction to the business world, allowing entrepreneurs to exponentially increase productivity both in and out of the workplace. However, they are a double-edged sword, capable of cutting down barriers, or slicing productivity to ribbons with time-wasting apps and texting.

0 Comments
Continue reading

You Don’t Want to Get Caught in the Middle of a Hacking War [VIDEO]

b2ap3_thumbnail_hacker_wars_400.jpg
When you see the results of a major hacking campaign on the news, you might tend to sympathize with the victim. While most hacks target individuals or high-profile businesses, hackers have, for the first time, intentionally targeted each other. The attack in question occurred between Naikon, a cyberespionage group, and another group called Hellsing.

0 Comments
Continue reading

Backing Up Your Data Keeps Your Technology In Tip-Top Shape

b2ap3_thumbnail_backup_for_it_utopia_400.jpg
For eons, the human species has sought to improve efficiency through the integration of new innovative technologies. We always push toward the bright new future, a garden filled with shimmering hardware and the sweet, sweet smell of silicon. Everything is running smoothly, just like music, until you hear a note that doesn’t belong. Instead of a chorus of heavenly angels serenading you as you open the door to your server room, you hear the sound of failure; hardware failure, to be specific; and it’s not pretty.

0 Comments
Continue reading

Tip of the Week: Ctrl+F May Be the Most Handy Keystroke that You’re Not Using

b2ap3_thumbnail_find_that_needle_400.jpg
There is so much content on the Internet that finding exactly what you’re looking for can be quite challenging. Search engines like Google and Bing help out immensely by narrowing down your search to one web page, but how do you find what you specifically need on a single page?

0 Comments
Continue reading

The Vital Difference Between Cloud Services and Virtualization

b2ap3_thumbnail_cloud_vs_virtualization_400.jpg
Many businesses go about their daily duties without understanding the difference between a cloud computing solution and virtualization services. Contrary to popular belief, they are, in fact, NOT the same thing. Rather, virtualization itself is an important part of integrating a cloud solution.

0 Comments
Continue reading

Hackers Turn to Radio Signals to Get the Data They Want

b2ap3_thumbnail_radio_signal_400.jpg
You should never assume that your data is safe from a hacking attack. Just like how the technology industry is working toward new ways to protect the public from hacks, those who lurk in the gutters of the Internet are trying to undermine these developments by any means possible. Some security professionals believe that even radio signals can undermine network security.

0 Comments
Continue reading

Tip of the Week: How to Attract and Keep Quality Employees with Workplace Flexibility

b2ap3_thumbnail_workplace_flexibility_400.jpg
With each new generation comes a new group of workers, and attracting good, quality help can be difficult. Even if you can find good help, it can be a challenge to keep. A study at Cornell University has proven that workplace flexibility can greatly improve the odds of finding good employees - and keeping them around.

0 Comments
Continue reading

Connectify Turns Your PC Into a WiFi Hotspot [VIDEO]

b2ap3_thumbnail_wifi_hotspot_virtual_router_400.jpg
Do you need a WiFi signal? If you’ve got a PC with a wireless card, then you’ve got what it takes to download Connectify and turn your PC into a WiFi hotspot. These days, with everyone being so dependent on WiFi, having an additional WiFi hotspot can come in handy.

0 Comments
Continue reading

We Salute You, Mr. Do-It-Yourself Entrepreneur!

b2ap3_thumbnail_real_entrepreneur_400.jpg
Computerware presents to you, “Real Men of Brilliance.” Today, we salute you, Mr. Do-It-Yourself Entrepreneur.

0 Comments
Continue reading

Tip of the Week: Don’t Limit Yourself to 1 Page in Microsoft Word

b2ap3_thumbnail_word_icon_400.jpg
When working in Microsoft Word, it can be helpful to view more than one page at a time. Did you know that Word allows you to view up to eight pages at once? Here’s how you do it.

0 Comments
Continue reading

Even Homeland Security’s IT Is Preparing for a Security Storm

b2ap3_thumbnail_america_it_security_400.jpg
Just like any other high-profile entity, a government should place great emphasis on its IT infrastructure. The U.S. government is moving through 2015 with an increased awareness of the state of cybersecurity, and with all of the huge security breaches that happen almost regularly, it qualifies cyber threats as important as other national security threats.

0 Comments
Continue reading

2 Conflicting Views of the Cloud

b2ap3_thumbnail_cloud_gears_400.jpg
Cloud computing is here to stay. Yet, there are still companies hesitant to adopt the cloud. While every business that hesitates migrating to the cloud has its own reasons, one common source of conflict that we’ve seen is the opposing view between the business owner and their IT department.

0 Comments
Continue reading

Tip of the Week: How to Walk the Line between Boss and Friend

b2ap3_thumbnail_office_relationships_400.jpg
When you first started your company, you may have had a group of close friends who were your original employees. They started off ambitious, like you, but gradually they grew more and more complacent. Now they are a hazard to your company’s future, and you don’t like that. You feel like you need to replace them with someone who cares about the company’s future, or maybe you just found someone who has more skill than them, but what if you don’t get along as well with the new employee? And how do you fire a friend?

0 Comments
Continue reading

Can a Robot Win the Pulitzer Prize?

b2ap3_thumbnail_robots_writing_stories_400.jpg
To maximize your business' communicative abilities, you need to produce content. Content is found almost everywhere and it is an essential variable in every form of written communication. Innovators don’t miss out on the importance of content, and have developed content-writing software. Yet, this poses an important question: can a robot truly imitate prose written by a human?

0 Comments
Continue reading

News & Updates

Computerware is proud to announce the launch of our new website at ww.cwit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Computerware can do for your business.

Computerware, Inc.
8480 Tyco Road Suite I
Vienna, Virginia 22182

Copyright 2025 Computerware. All Rights Reserved.

FPS
106 FPS (106-106)