DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

What kind of Microsoft products does your business use on a regular basis? If you can’t answer this question, you could be in trouble when it comes time to update your crucial applications and operating systems. This is a necessary part of working with technology; if your software can’t be considered secure, you need to upgrade to a more recent, better-functioning tool, or find yourself in a dangerous situation.

0 Comments
Continue reading

Any Version of Internet Explorer Prior to 11 Can’t Be Trusted

Any Version of Internet Explorer Prior to 11 Can’t Be Trusted

We often talk about how important it is that your business use the most recent and up-to-date versions of your software solutions, but it’s not often that we get to say that people using Internet Explorer 11 have the right idea. As it turns out, nearly a quarter of all Windows PCs are still using unsupported versions of Internet Explorer, with half of them being found on computers still running Windows XP. What has this world come to?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hosted Solutions Google User Tips Microsoft Hackers Productivity Internet Software Malware Tech Term Business Email Innovation Workplace Tips Backup Mobile Devices Smartphones Data Communications Data Backup Hardware VoIP Android Data Recovery Small Business Smartphone Efficiency IT Services Business Continuity Cloud Computing Ransomware Communication Cybersecurity Managed IT Services Router Windows 10 Computer Disaster Recovery Outsourced IT Cybercrime Windows IT Support Network Server Browser Business Management Artificial Intelligence Chrome Internet of Things Law Enforcement Windows 10 Alert Miscellaneous Gadgets Applications Mobile Device Office 365 Computers How To Password Money Collaboration Quick Tips Productivity Word Information Facebook Managed IT Services Wi-Fi Passwords Spam Virtualization BDR Holiday Saving Money Social Media Telephone Systems Data Security Health Paperless Office Keyboard Connectivity Avoiding Downtime Office Private Cloud Managed Service Vulnerability Work/Life Balance Encryption Voice over Internet Protocol Operating System Microsoft Office Settings Save Money Government App Mobile Device Management BYOD Two-factor Authentication Flexibility Apps Data Protection Social Engineering Phishing Mobility Servers IT Plan Content Management Scam Networking Remote Monitoring Google Docs Data Management Net Neutrality Botnet Unsupported Software Comparison Blockchain Machine Learning Telephony Legal Website End of Support Windows 7 Identity Theft Virtual Assistant HaaS Infrastructure Office Tips Human Resources Public Cloud Bring Your Own Device Entertainment Telephone System Data Storage VPN Meetings Upgrade Business Intelligence Software as a Service OneNote IT Management Data Breach Sports Redundancy Fraud Access Control Employer-Employee Relationship Remote Computing Update Augmented Reality Managed IT Google Drive CES Bandwidth Automation Spam Blocking Cryptocurrency USB Samsung Remote Worker Automobile Netflix Workforce Digital Signature Current Events Social Black Market Downtime Travel Google Apps webinar Trending Search Engine Search Advertising The Internet of Things Amazon Web Services Nanotechnology Cryptomining Recycling Big Data Cache Warranty Content Internet Exlporer Windows 10s Windows Server 2008 Remote Work Practices Safe Mode Employee Education Network Congestion Screen Mirroring Value Wiring Apple HBO PDF Electronic Medical Records HVAC Vendor Root Cause Analysis Workers Conferencing IBM Bing How to FENG Online Shopping Smart Tech Experience Charger Database Document Management eWaste Wireless Internet Printer Audiobook Hosted Computing HIPAA Digital Signage Computing Infrastructure IT Consultant Cast Devices Unified Threat Management Video Games iPhone Techology Outlook FCC Enterprise Content Management Display Marketing Best Practice Business Technology Save Time Emails Software Tips Specifications Supercomputer YouTube Help Desk Recovery Skype Evernote Cleaning MSP Criminal Wire Mouse Instant Messaging Internet exploMicrosoft Solid State Drive Flash Credit Cards Inventory Budget History Google Search Leadership Thought Leadership Mobile Computing Frequently Asked Questions Title II Hiring/Firing Password Management IT Support Security Cameras Wireless Password Manager File Sharing Staff Company Culture Users Hybrid Cloud Start Menu Wireless Charging Music Computer Care Administrator Audit Proactive IT Virtual Reality Firewall Camera Excel Online Accountants Risk Management NIST Hacker Business Mangement Hacking Physical Security Millennials Managing Stress Shortcuts Information Technology Tools Cortana Wearable Technology Multi-Factor Security Patch Management Smart Office Microchip Computer Fan Sync Amazon Authentication Training ISP Worker Commute Addiction Scalability Tip of the week Telecommuting Politics Smartwatch Battery Knowledge Data loss WiFi Gmail Vendor Management Business Owner Television Bluetooth Troubleshooting Transportation Biometric Security Books Public Computer Loyalty Safety Benefits Worker Hosted Solution SaaS Managed Service Provider Webinar Smart Technology Shadow IT Emergency Rootkit Compliance Twitter Employer Employee Relationship Wireless Technology IT solutions Two Factor Authentication CrashOverride Regulation Content Filtering Assessment Printers Computer Accessories