DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An IT Christmas Carol

An IT Christmas Carol

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

0 Comments
Continue reading

Which Browser is Best for Your Needs?

Which Browser is Best for Your Needs?

There are a variety of web browsers out there, and that variety is much larger than most people think. While most can list off the main ones: Chrome, Safari, Edge, and Firefox, there are many more to consider. However, the real question remains: which one is best for you?

0 Comments
Continue reading

A Better Way to Be Rid of Old Cables

A Better Way to Be Rid of Old Cables

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

0 Comments
Continue reading

Cyberbullying is a Serious Issue Everywhere

Cyberbullying is a Serious Issue Everywhere

As technology has evolved, so have our capabilities of using it. While this has led to great improvements in how we can live our lives, it has also made it much easier for us to torment and harass one another. This is a huge problem, and growing, so it is important to know how to take a stand against it - both at home, and in the workplace.

0 Comments
Continue reading

How Does the A.I. in Reality Measure Up to Hollywood’s?

How Does the A.I. in Reality Measure Up to Hollywood’s?

Figuring out how to utilize platforms that depend on machine learning to boost an organization’s bottom line is one of the biggest puzzles for every modern business owner. After all, seemingly every new technology concept can be leveraged into enhanced profitability if it is rolled out right. In this case, many organizations have found ways to use human-created machines to learn how to do tasks that would be deemed too expensive if humans were to do them.

0 Comments
Continue reading

What Star Wars can Teach About Mentorship

What Star Wars can Teach About Mentorship

The Star Wars saga has many recurring themes - the struggle between desire and destiny, good and evil, impulse and discipline. However, a theme that particularly stands out throughout the series is the examination of the relationship between student and teacher. This theme is similar to the relationship that an IT provider should strive to have with their clients.

0 Comments
Continue reading

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

0 Comments
Continue reading

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

0 Comments
Continue reading

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

0 Comments
Continue reading

Tip of the Week: Netflix Now Lets You Download Videos for Offline Viewing

Tip of the Week: Netflix Now Lets You Download Videos for Offline Viewing

The development of Netflix was revolutionary for its time, allowing users to stream a plethora of great television shows and movies on a whim. Nowadays, Netflix continues to innovate and create ways for users to take their services to places where they never thought possible. One example is taking Netflix on a flight, where the Wi-Fi is either completely unavailable, or too slow or expensive to be worth using. Netflix now allows users to download videos for offline viewing via its mobile app.

0 Comments
Continue reading

How Vizio Got Busted for Spying on Its Customers

How Vizio Got Busted for Spying on Its Customers

What have you watched on TV lately? Actually, never mind; if you don’t want to tell us, we can just ask Vizio. Relax--we’re not actually going through with this, but the fact remains that 11 million owners of Vizio televisions had their viewing habits tracked by the manufacturer. Were you one of them?

0 Comments
Continue reading

Hack a Hospital and Get Blacklisted By Other Hackers

Hack a Hospital and Get Blacklisted By Other Hackers

Hackers are notorious for committing cybercrimes and exploiting what seems like everybody and anybody. Yet, just as there exists honor among thieves, there’s an unwritten rule within the hacking community: leave hospitals alone.

0 Comments
Continue reading

3 Compelling Reasons Why Your Business Should Move to the Cloud

3 Compelling Reasons Why Your Business Should Move to the Cloud

Businesses are turning to the cloud because it’s designed to make operations easier and save them money. In light of these benefits, organizations that have yet to move to the cloud may be missing out on some serious advantages by continuing to do IT the hard way. If you’re still unsure about the cloud, then consider how these three features of cloud computing can change how you do business.

0 Comments
Continue reading

This Hacker Messed With the Wrong Transportation Agency

This Hacker Messed With the Wrong Transportation Agency

While San Francisco residents might not be happy that they’ll again have to pay fares to ride the city’s rail system, the reason they again have to do so is understandable. Plus, it provides an excellent example of the importance of maintaining a backup and using complex passwords.

0 Comments
Continue reading

Does 10,000 Hours of Practice Automatically Make Someone an Expert?

Does 10,000 Hours of Practice Automatically Make Someone an Expert?

You’re already a business owner, but let’s say that you want to pick up some new skills. You want to be known as an expert in a new field, and you’re pretty dedicated to doing so. Perhaps you’re familiar with the 10,000 hours rule, which attempts to explain how someone becomes a master of a particular craft. Well, we hate to burst your bubble, but this rule might not be as simple as it sounds.

0 Comments
Continue reading

Hollywood is Captivated By Fictional Hackers, But Real Hackers aren’t Entertaining

Hollywood is Captivated By Fictional Hackers, But Real Hackers aren’t Entertaining

It’s not an understatement to suggest that hackers are a hindrance to business. They take what doesn’t belong to them, and worse than that, they use that stolen information to make off with money, misrepresent individual actions, and ultimately, just cause a degree of added entropy that any business simply doesn’t need. Recently, with the hacker group Anonymous consistently in the news and dozens of corporate hacks resulting in millions of people’s personal information being compromised, hackers have been an increased part of the public consciousness.

0 Comments
Continue reading

Do Memes Have a Place in the Professional Business Environment?

Do Memes Have a Place in the Professional Business Environment?

Whether we like it or not, memes have had a profound effect on how the world’s population views current events and popular culture. In part, this is thanks to the prevalence of the Internet, which has fostered these absurd images and provided them an outlet to flourish. Due to how viral they are, it would be foolish to dismiss them as inconsequential; in fact, when leveraged properly, memes can make a statement about your business and its specific brand.

0 Comments
Continue reading

How One Major Government Department is Revamping Its IT Infrastructure

How One Major Government Department is Revamping Its IT Infrastructure

After implementing their current infrastructure for almost a decade, the U.S. Department of Education have plans to upgrade, directing their attention toward ensuring that the new initiative keeps mobile capabilities as a high priority.

0 Comments
Continue reading

4 Reasons Why You Should Quit Stressing Out About Stress

4 Reasons Why You Should Quit Stressing Out About Stress

Stress is a natural part of the workplace. It’s almost impossible to make it through the workday without getting stressed out about at least one thing or another, especially when you’re a business owner. In these stress-filled circumstances, it’s important to remember that stress isn’t always a bad thing; it has some redeeming factors that are often lost amongst the cacophony of shuffling papers and constant phone calls.

0 Comments
Continue reading

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be responsible to pay restitution to the IRS.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hosted Solutions Google User Tips Hackers Microsoft Software Productivity Malware Tech Term Internet Innovation Mobile Devices Backup Workplace Tips Hardware Business Email Smartphones Communications Data Data Backup VoIP Android IT Services Small Business Smartphone Cloud Computing Business Continuity Efficiency Data Recovery Network Computer Communication Router Managed IT Services Windows 10 Disaster Recovery Cybersecurity Ransomware Artificial Intelligence Server Alert IT Support Internet of Things Outsourced IT Cybercrime Windows Law Enforcement Windows 10 Browser Business Management Chrome Mobile Device Office 365 Money Collaboration Gadgets Computers Password Miscellaneous How To Applications Phishing Information BDR Passwords Holiday Word Telephone Systems Operating System Spam Saving Money Wi-Fi Managed IT Services Social Media Quick Tips Productivity Facebook Virtualization BYOD Paperless Office Save Money Office Encryption Private Cloud Data Security Connectivity Flexibility Apps Voice over Internet Protocol Managed Service Social Engineering Mobility Two-factor Authentication Keyboard Government App Vulnerability Data Protection Avoiding Downtime Settings Work/Life Balance Mobile Device Management Health Microsoft Office Website Google Drive Identity Theft Spam Blocking Data Breach Infrastructure Remote Computing Human Resources End of Support IT Plan Managed IT Machine Learning Virtual Assistant Office Tips VPN Bandwidth Public Cloud Upgrade Business Intelligence Botnet Unsupported Software Fraud Access Control Telephony Telephone System Windows 7 Scam Networking Update Remote Monitoring CES Software as a Service Data Management Sports Legal Data Storage Meetings Content Management Augmented Reality HaaS Automation OneNote IT Management Redundancy Google Docs Employer-Employee Relationship Cryptocurrency Entertainment Net Neutrality Bring Your Own Device Comparison Blockchain Servers eWaste Music Computer Care Cryptomining Apple Computer Fan Hosted Computing Sync Search Engine Safe Mode Employee FCC Tip of the week Cache Warranty Virtual Reality Knowledge Data loss Specifications Netflix Firewall Wiring Evernote Downtime Risk Management HVAC Vendor webinar Criminal Wearable Technology Database iPhone Techology Credit Cards The Internet of Things Inventory Bing Hacking Marketing Digital Signage Title II Windows 10s Windows Server 2008 Patch Management Wireless Internet Printer Worker Commute Network Congestion Password Manager Screen Mirroring Training Scalability Staff HBO Devices Unified Threat Management Battery Internet exploMicrosoft Wireless Charging Root Cause Analysis Politics Enterprise Content Management Display Wireless Conferencing USB Samsung MSP Business Technology Black Market FENG Current Events YouTube Help Desk Automobile Google Search Search Online Accountants Wire Mouse Users Hybrid Cloud IT Consultant Business Mangement Cast Security Cameras Content Millennials Outlook Big Data Thought Leadership Mobile Computing Education Cortana Password Management Multi-Factor Security Emails Software Tips Value File Sharing Amazon Authentication Skype Electronic Medical Records Company Culture Experience Charger Proactive IT How to Telecommuting Solid State Drive Flash IBM Administrator Document Management Information Technology WiFi Leadership Gmail NIST Hacker Audiobook Workforce Digital Signature Frequently Asked Questions Camera Computing Infrastructure Travel Google Apps HIPAA Trending Amazon Web Services Nanotechnology Start Menu Managing Stress Shortcuts Video Games Recycling Cleaning ISP Recovery Remote Work Audit Practices Supercomputer Smart Office Microchip Best Practice Save Time Smartwatch Instant Messaging PDF Excel Biometric Security Addiction History Advertising Workers Budget Physical Security Remote Worker IT Support Internet Exlporer Online Shopping Smart Tech Tools Hiring/Firing Social Shadow IT Smart Technology Emergency Rootkit Employer Employee Relationship Two Factor Authentication Wireless Technology Safety Content Filtering Assessment Computer Accessories Managed Service Provider Vendor Management Business Owner Television Bluetooth Troubleshooting Compliance Transportation Books Public Computer Twitter Webinar Loyalty Regulation Benefits Printers Worker IT solutions Hosted Solution SaaS CrashOverride