DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft OneNote May Be the Best Note-Taking Tool on the Market

Microsoft OneNote May Be the Best Note-Taking Tool on the Market

Most modern PCs come pre-installed with a handy tool by Microsoft called OneNote (and it’s also included with Office 365). Today, we’ll run through the features that OneNote offers that make it a useful business tool.

0 Comments
Continue reading

Tip of the Week: How to Automatically Open a Windows App in Fullscreen

Tip of the Week: How to Automatically Open a Windows App in Fullscreen

If you’re a regular user of Windows applications, you’ll notice that they will, by default, open into smaller windows, allowing users to customize the size of their windows as need be. Usually, when you want to increase the size of the app, you have to click the maximize button in the top-right corner. However, you can save a little bit of time each time you do this by setting Windows to default to full-screen mode for this application.

0 Comments
Continue reading

3 Talk-to-Text Apps that Get the Job Done

3 Talk-to-Text Apps that Get the Job Done

Mobile platforms have given way to entirely new ways to develop and make use of apps. More business professionals than ever before are relying on their smartphones to get work done while out of the office, but the functionality of the on-screen keyboard interface has some of them stumped on how to stay productive. It’s for this reason that developers have created applications designed to listen to users’ voices, and record them in text format.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hosted Solutions User Tips Google Microsoft Hackers Internet Productivity Software Malware Tech Term Workplace Tips Business Email Innovation Mobile Devices Backup Data Data Backup Smartphones Communications Hardware VoIP Android Data Recovery Small Business Smartphone IT Services Efficiency Business Continuity Cloud Computing Ransomware Cybersecurity Router Computer Communication Managed IT Services Windows 10 Disaster Recovery Artificial Intelligence Network Server Business Management Browser Internet of Things Chrome IT Support Alert Outsourced IT Law Enforcement Cybercrime Windows Windows 10 Miscellaneous How To Applications Mobile Device Office 365 Gadgets Money Collaboration Computers Password Quick Tips Productivity Facebook Information Passwords Virtualization Word Holiday Operating System BDR Spam Saving Money Social Media Managed IT Services Wi-Fi Telephone Systems Mobile Device Management Work/Life Balance Health Keyboard Paperless Office Encryption Office Microsoft Office Private Cloud Phishing Connectivity BYOD Voice over Internet Protocol Save Money Managed Service Data Security Flexibility Apps Two-factor Authentication Government App Mobility Data Protection Vulnerability Social Engineering Avoiding Downtime Settings OneNote Net Neutrality Redundancy Employer-Employee Relationship IT Management HaaS Comparison Blockchain Cryptocurrency Identity Theft Scam Networking Website Servers Entertainment Infrastructure Remote Monitoring Google Drive Human Resources End of Support Spam Blocking Upgrade Machine Learning VPN Virtual Assistant Office Tips Remote Computing Public Cloud IT Plan Business Intelligence Fraud Access Control Managed IT Bring Your Own Device Botnet Update Telephone System Telephony Unsupported Software CES Windows 7 Data Breach Software as a Service Sports Data Management Data Storage Content Management Bandwidth Augmented Reality Automation Meetings Google Docs Legal ISP Start Menu Audiobook Workers Politics Smart Office Microchip Computing Infrastructure PDF Audit Video Games Online Shopping Smart Tech Current Events Addiction Advertising USB Samsung Smartwatch Hosted Computing Remote Worker Internet Exlporer Recovery eWaste Social Excel Best Practice Save Time Apple Cryptomining Tools Instant Messaging Search Engine Physical Security History FCC Big Data Computer Fan Sync Evernote Electronic Medical Records Cache Warranty IT Support Specifications Value Safe Mode Employee Credit Cards Inventory IBM Wiring Knowledge Data loss Criminal Experience Charger HVAC Vendor Tip of the week iPhone Database Techology Downtime Password Manager HIPAA Marketing Bing Netflix Virtual Reality Title II Digital Signage The Internet of Things Wireless Charging Wireless Internet Printer webinar Staff Hacking Supercomputer Devices Unified Threat Management Internet exploMicrosoft Network Congestion Screen Mirroring Cleaning Enterprise Content Management Display Windows 10s Windows Server 2008 MSP Business Technology Root Cause Analysis Business Mangement Budget YouTube Help Desk Wireless HBO Worker Commute Online Accountants Google Search FENG Scalability Cortana Hiring/Firing Wire Users Mouse Hybrid Cloud Conferencing Battery Millennials Automobile Amazon Authentication Thought Leadership Mobile Computing IT Consultant Cast Black Market Multi-Factor Security Music Computer Care Password Management Security Cameras Telecommuting File Sharing Search WiFi Gmail Company Culture Outlook Proactive IT Skype Content Travel Google Apps Risk Management Administrator Information Technology Emails Software Tips Education Workforce Digital Signature Firewall Amazon Web Services Nanotechnology Camera Leadership Trending Wearable Technology NIST Hacker Solid State Drive Flash Remote Work Practices Patch Management How to Recycling Training Managing Stress Shortcuts Frequently Asked Questions Document Management Regulation Computer Accessories Webinar Content Filtering Assessment Printers Vendor Management CrashOverride Bluetooth IT solutions Television Troubleshooting Transportation Shadow IT Books Public Computer Safety Loyalty Benefits Wireless Technology Managed Service Provider Worker Hosted Solution SaaS Smart Technology Emergency Rootkit Business Owner Compliance Biometric Security Employer Employee Relationship Two Factor Authentication Twitter