DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Can Now Generate Power By Literally Folding Laundry

You Can Now Generate Power By Literally Folding Laundry

Wouldn’t it be convenient if you could charge your smartphone just by walking down the street? How about turning your tie into a voice-recognizing security system? Michigan State University has been working toward creating some great new tech that makes these suggestions seem like real possibilities, in the form of a small device.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Network Security Google User Tips Hackers Microsoft Tech Term Internet Software Productivity Malware Hardware Business Email Innovation Mobile Devices Backup Workplace Tips Data Backup Smartphones Communications Data VoIP Android Efficiency IT Services Data Recovery Cloud Computing Small Business Smartphone Business Continuity Disaster Recovery Computer Ransomware Communication Network Router Managed IT Services Windows 10 Cybersecurity Law Enforcement Windows 10 Chrome Alert IT Support Artificial Intelligence Server Outsourced IT Windows Cybercrime Internet of Things Business Management Browser Password How To Applications Mobile Device Office 365 Money Collaboration Gadgets Miscellaneous Computers Social Media Virtualization Phishing Quick Tips Productivity BDR Word Holiday Facebook Passwords Telephone Systems Spam Operating System Managed IT Services Information Wi-Fi Saving Money Microsoft Office Save Money BYOD Health Data Security Flexibility Apps Social Engineering Office Private Cloud Mobility Encryption Vulnerability Keyboard Voice over Internet Protocol Paperless Office Avoiding Downtime Government App Settings Two-factor Authentication Mobile Device Management Connectivity Data Protection Work/Life Balance Managed Service Virtual Assistant CES Entertainment Bring Your Own Device Automation Google Drive Telephone System Spam Blocking Content Management Google Docs Data Breach Net Neutrality Software as a Service IT Plan Remote Computing Sports Managed IT Comparison Blockchain Botnet Identity Theft Website Bandwidth End of Support Unsupported Software Infrastructure Augmented Reality Telephony Human Resources Windows 7 Office Tips Cryptocurrency Public Cloud Scam Networking Remote Monitoring VPN Servers Upgrade Business Intelligence Data Storage Data Management Meetings Legal Fraud Access Control Update OneNote Machine Learning Employer-Employee Relationship IT Management Redundancy HaaS Wireless Internet Printer Best Practice Save Time Amazon Cleaning Authentication Digital Signage Information Technology Excel Recovery Multi-Factor Security Supercomputer History Budget Telecommuting Enterprise Content Management Display Physical Security Instant Messaging WiFi Gmail Devices Unified Threat Management Tools Workforce Hiring/Firing Digital Signature YouTube Help Desk Travel Google Apps MSP Business Technology Computer Fan Sync Biometric Security IT Support Wire Mouse Knowledge Data loss Music Amazon Web Services Computer Care Nanotechnology Google Search Tip of the week Trending Downtime Virtual Reality Remote Work Practices Password Management Security Cameras Netflix Advertising Recycling Thought Leadership Mobile Computing Risk Management PDF Company Culture webinar Internet Exlporer Firewall Workers File Sharing The Internet of Things Administrator Network Congestion Apple Screen Mirroring Hacking Wearable Technology Online Shopping Smart Tech Proactive IT Windows 10s Windows Server 2008 Root Cause Analysis Worker Commute Training Hosted Computing NIST Hacker HBO Patch Management eWaste Camera Battery Politics FCC Managing Stress Shortcuts Conferencing Scalability FENG Current Events Smart Office Microchip IT Consultant iPhone Cast Techology Automobile USB Evernote Samsung ISP Marketing Black Market Specifications Credit Cards Inventory Smartwatch Outlook Search Criminal Addiction Education Title II Social Emails Internet exploMicrosoft Software Tips Content Big Data Password Manager Remote Worker Skype Electronic Medical Records Staff Search Engine Leadership Wireless Charging Value Cryptomining Solid State Drive Wireless Flash Warranty Document Management Experience Charger Safe Mode Employee Users Hybrid Cloud Frequently Asked Questions How to IBM Cache Computing Infrastructure HIPAA Online Accountants HVAC Vendor Audiobook Business Mangement Wiring Start Menu Millennials Bing Video Games Cortana Database Audit Benefits Worker IT solutions CrashOverride Hosted Solution SaaS Shadow IT Smart Technology Rootkit Emergency Employer Employee Relationship Wireless Technology Compliance Two Factor Authentication Twitter Computer Accessories Content Filtering Assessment Regulation Safety Business Owner Vendor Management Printers Bluetooth Television Managed Service Provider Troubleshooting Transportation Webinar Books Public Computer Loyalty