DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

What kind of Microsoft products does your business use on a regular basis? If you can’t answer this question, you could be in trouble when it comes time to update your crucial applications and operating systems. This is a necessary part of working with technology; if your software can’t be considered secure, you need to upgrade to a more recent, better-functioning tool, or find yourself in a dangerous situation.

0 Comments
Continue reading

Any Version of Internet Explorer Prior to 11 Can’t Be Trusted

Any Version of Internet Explorer Prior to 11 Can’t Be Trusted

We often talk about how important it is that your business use the most recent and up-to-date versions of your software solutions, but it’s not often that we get to say that people using Internet Explorer 11 have the right idea. As it turns out, nearly a quarter of all Windows PCs are still using unsupported versions of Internet Explorer, with half of them being found on computers still running Windows XP. What has this world come to?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Microsoft User Tips Hackers Google Tech Term Hosted Solutions Internet Business Software Malware Backup Data Data Backup Innovation Mobile Devices Hardware Email Smartphones Workplace Tips Small Business Smartphone Communications Data Recovery Business Continuity VoIP Android Ransomware IT Services Router Computer Communication Managed IT Services Cloud Computing Disaster Recovery Productivity Internet of Things Network Cybersecurity Browser Alert Chrome Outsourced IT Cybercrime Law Enforcement Artificial Intelligence Windows 10 Windows 10 Miscellaneous How To Applications Server Business Management Office 365 Efficiency Money Collaboration IT Support Computers Windows Password Productivity Facebook Passwords Virtualization Mobile Device Word Holiday Gadgets BDR Spam Saving Money Social Media Information Wi-Fi Managed IT Services Telephone Systems Mobile Device Management Quick Tips Managed Service Work/Life Balance Two-factor Authentication Keyboard Data Protection Phishing Office Microsoft Office BYOD Save Money Data Security Flexibility Apps Operating System Mobility Government App Vulnerability Social Engineering Avoiding Downtime Voice over Internet Protocol Settings Connectivity Machine Learning VPN Upgrade OneNote Business Intelligence Employer-Employee Relationship IT Management HaaS Health Virtual Assistant Redundancy Fraud Access Control Scam Networking Entertainment Remote Monitoring Update Google Drive Telephone System Private Cloud CES Spam Blocking End of Support Software as a Service IT Plan Office Tips Remote Computing Public Cloud Sports Content Management Managed IT Botnet Bring Your Own Device Google Docs Unsupported Software Telephony Comparison Blockchain Windows 7 Servers Identity Theft Data Breach Website Paperless Office Encryption Infrastructure Human Resources Data Storage Data Management Legal Automation Bandwidth Start Menu Audiobook Bing Politics Title II Computing Infrastructure Password Manager Current Events Staff USB Samsung Wireless Charging Audit Video Games Advertising Wireless Internet Printer Recovery Enterprise Content Management Display Excel Best Practice Internet Exlporer Devices Unified Threat Management Tools Instant Messaging YouTube Help Desk Online Accountants Physical Security History Apple MSP Big Data Business Mangement Electronic Medical Records Millennials IT Support Value Cortana Computer Fan Sync Wire Mouse IBM Multi-Factor Security Knowledge Data loss Password Management Security Cameras Experience Charger Amazon Authentication Tip of the week Thought Leadership Mobile Computing Downtime Marketing Company Culture HIPAA Telecommuting Netflix iPhone Virtual Reality Techology File Sharing WiFi Gmail Administrator Workforce Digital Signature webinar Travel Google Apps The Internet of Things Supercomputer Trending Network Congestion Screen Mirroring NIST Hacker Cleaning Amazon Web Services Nanotechnology Windows 10s Windows Server 2008 Internet exploMicrosoft Hacking Camera Root Cause Analysis Wireless Managing Stress Shortcuts Budget Remote Work Practices HBO Worker Commute Augmented Reality Recycling Scalability Hybrid Cloud Smart Office Microchip Hiring/Firing Net Neutrality PDF Conferencing Battery Workers FENG Users IT Consultant Cast Black Market Cryptocurrency Smartwatch Music Computer Care Online Shopping Smart Tech Addiction Automobile eWaste Search Social Hosted Computing Outlook Remote Worker Information Technology Content Search Engine Risk Management FCC Emails Software Tips Education Firewall Skype Specifications Leadership Safe Mode Wearable Technology Evernote Solid State Drive Flash Cache Warranty Criminal Meetings How to HVAC Vendor Training Credit Cards Inventory Frequently Asked Questions Document Management Wiring Patch Management Computer Accessories Webinar Content Filtering Assessment Vendor Management Save Time CrashOverride Bluetooth IT solutions Television Troubleshooting Shadow IT Transportation Books Public Computer Safety Compliance Loyalty Benefits Wireless Technology Twitter Worker Managed Service Provider Regulation Hosted Solution SaaS Smart Technology Printers Rootkit Business Owner Emergency Employer Employee Relationship Two Factor Authentication