DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Updating the Whole Net Neutrality Situation

Updating the Whole Net Neutrality Situation

Net Neutrality in the United States has been a hot-button issue for almost anyone that uses the Internet. 2018 saw the 2005 principles governing the preservation of an open Internet repealed completely, leaving control over the Internet in the hands of huge companies that deliver Internet services to people. Today, we’ll go back over Net Neutrality and provide an update of what has happened since the Federal Communications Commission repeal of net neutrality laws.

0 Comments
Continue reading

Which Browser is Best for Your Needs?

Which Browser is Best for Your Needs?

There are a variety of web browsers out there, and that variety is much larger than most people think. While most can list off the main ones: Chrome, Safari, Edge, and Firefox, there are many more to consider. However, the real question remains: which one is best for you?

0 Comments
Continue reading

Know Your Tech: Proxy Server

Know Your Tech: Proxy Server

Your server room may be somewhat intimidating to consider. Wires everywhere, mechanical boxes that just sit there, lights blinking intermittently, and the distinct feeling that you probably shouldn’t touch anything - not even a proxy server, whatever that is. However, to help you get to know your tech, the proxy server is exactly what we discuss below!

0 Comments
Continue reading

Technology Addiction is a Very Real, Very Scary Thing

Technology Addiction is a Very Real, Very Scary Thing

Technology has become essential to workplace functionality and personal productivity, but while the long hours spent glued to our tech during the workday are a necessity, the time we spend at home with our personal devices is definitely voluntary. However, more and more people - children especially - are finding it harder to let their devices power down.

0 Comments
Continue reading

Tech Term: Bandwidth

Tech Term: Bandwidth

Here’s a question we want you to take a second to consider...How much do you rely on the Internet? The answer for almost everyone is that it is essential to your current quality of life. Technologies have been developed, industries have been launched, and literally billions of people use it every day, making it one of the predominant inventions in human history. At the heart of this phenomenal technology is bandwidth.

0 Comments
Continue reading

Tech Term: Cookies Defined

Tech Term: Cookies Defined

Chances are, if you’ve spent any amount of time around a computer, you’ve heard of browser cookies. What you may not have heard, is what these cookies do. For today’s Tech Term, we’ll explore what cookies are, and what they do.

0 Comments
Continue reading

Tech Term: Modems and Routers Defined

Tech Term: Modems and Routers Defined

The Internet is an amazing tool, only bolstered by our ability to access it wirelessly - but what do you know about the devices that allow us to access it, namely, modems and routers? Do you know what each does? For today’s tech term, we’ll dive into exactly that.

0 Comments
Continue reading

Net Neutrality Still Needs Your Help!

Net Neutrality Still Needs Your Help!

December 14th is the last day that our government representatives can vote whether or not to continue the Internet’s protection under the net neutrality rules established in 2015. Without these rules in place, your data can be analyzed by your Internet service provider, and they are free to act on that knowledge and manipulate your Internet in support of their own interests.

0 Comments
Continue reading

How the Convenience of The Internet of Things Can Come Back to Bite Us

How the Convenience of The Internet of Things Can Come Back to Bite Us

While the Internet of Things has made many common tasks much easier through automation, it has also increased the potency of particular cybersecurity threats. For an excellent example, one only has to turn to the increasing prevalence of botnets that are powered by IoT technology.

0 Comments
Continue reading

Tip of the Week: Resolve a Poor Internet Connection By Following These 3 Steps

Tip of the Week: Resolve a Poor Internet Connection By Following These 3 Steps

When the Internet goes down in the modern office, chaos ensues. The only way to subdue the panicked masses is to provide answers and to resolve the issue, ASAP. If you happen to find yourself in such an Internet-less predicament, then be sure to follow these three troubleshooting tips.

0 Comments
Continue reading

If Your Network is in the Cloud, What Do You Do with No Internet?

If Your Network is in the Cloud, What Do You Do with No Internet?

Thanks to the advancements of virtualization and cloud computing, many businesses are hosting key parts of their IT infrastructure off-site. While this move is great for mobility and productivity, it makes operations extremely dependant upon a working Internet connection. If this scenario describes your organization, what’s your plan to stay productive should your Internet connection fail?

0 Comments
Continue reading

The Internet Dramatically Changed the Publishing Industry. What About Your Field of Expertise?

The Internet Dramatically Changed the Publishing Industry. What About Your Field of Expertise?

It’s well-known that publishers are a major component of an author sharing their work with the world, but recent innovations threaten to disrupt the status quo of the industry. Like many industries, the publishing industry has been changed significantly by the introduction of new technologies that afford writers more liberty when producing their work. What can the business owner learn from these changes?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Network Security User Tips Google Hackers Microsoft Malware Tech Term Internet Software Productivity Backup Business Email Mobile Devices Innovation Workplace Tips Data Hardware Smartphones Data Backup Communications VoIP Business Continuity IT Services Efficiency Data Recovery Small Business Smartphone Cloud Computing Android Managed IT Services Cybersecurity Disaster Recovery Windows 10 Computer Ransomware Router Communication IT Support Law Enforcement Windows 10 Business Management Browser Chrome Network Alert Outsourced IT Server Artificial Intelligence Cybercrime Windows Internet of Things Computers Password Applications Mobile Device Office 365 Money Collaboration How To Gadgets Miscellaneous Saving Money Social Media Spam Virtualization Holiday Quick Tips Productivity Facebook BDR Passwords Information Telephone Systems Managed IT Services Word Wi-Fi Work/Life Balance Data Protection Vulnerability Microsoft Office Save Money BYOD Settings Health Flexibility Apps Mobile Device Management Private Cloud Office Mobility Encryption Paperless Office Social Engineering Phishing Connectivity Voice over Internet Protocol Data Security Managed Service Operating System Avoiding Downtime Keyboard Government App Two-factor Authentication Remote Monitoring Update Botnet HaaS Unsupported Software Telephone System Telephony Windows 7 Entertainment CES Software as a Service Sports Automation Content Management Data Storage Bring Your Own Device Remote Computing Augmented Reality Google Docs Meetings OneNote Managed IT Net Neutrality Cryptocurrency Redundancy Comparison Blockchain Employer-Employee Relationship IT Management Data Breach Identity Theft Website Servers Infrastructure End of Support Human Resources Google Drive Bandwidth Public Cloud Spam Blocking Office Tips VPN Data Management Upgrade Machine Learning Legal Virtual Assistant Business Intelligence IT Plan Scam Networking Fraud Access Control Online Accountants HBO Video Games MSP Business Technology Business Mangement Root Cause Analysis YouTube Help Desk Big Data Best Practice Save Time Google Search Electronic Medical Records Cortana FENG Recovery Wire Mouse Value Millennials Conferencing IBM Information Technology Amazon Authentication Instant Messaging Thought Leadership Mobile Computing Experience Charger Multi-Factor Security IT Consultant Cast History Password Management Security Cameras Telecommuting Outlook File Sharing HIPAA WiFi Gmail IT Support Company Culture Emails Software Tips Proactive IT Travel Google Apps Skype Administrator Workforce Digital Signature NIST Hacker Supercomputer Amazon Web Services Nanotechnology Solid State Drive Flash Camera Cleaning Trending Leadership Virtual Reality Advertising Remote Work Practices Frequently Asked Questions Budget Recycling Managing Stress Shortcuts Hacking ISP Hiring/Firing Workers Start Menu Smart Office Microchip Internet Exlporer PDF Smartwatch Online Shopping Smart Tech Audit Addiction Music Computer Care Apple Worker Commute Hosted Computing Excel Scalability Remote Worker eWaste Battery Social FCC Physical Security Automobile Cryptomining Risk Management Tools Black Market Search Engine Firewall Safe Mode Employee Marketing Evernote Computer Fan Sync Search Cache Warranty Wearable Technology iPhone Techology Specifications Patch Management Credit Cards Inventory Tip of the week Content Wiring Training Criminal Knowledge Data loss Education HVAC Vendor Title II Netflix Database Politics Password Manager Downtime Bing Internet exploMicrosoft Document Management Digital Signage Current Events Wireless Wireless Charging The Internet of Things How to Wireless Internet Printer USB Samsung Staff webinar Users Hybrid Cloud Windows 10s Windows Server 2008 Audiobook Devices Unified Threat Management Network Congestion Screen Mirroring Computing Infrastructure Enterprise Content Management Display Bluetooth Television Troubleshooting Transportation Books Public Computer Compliance Biometric Security Shadow IT Loyalty Benefits Twitter Worker Webinar Wireless Technology Regulation Hosted Solution SaaS Smart Technology Printers Emergency Rootkit IT solutions Employer Employee Relationship CrashOverride Business Owner Two Factor Authentication Safety Computer Accessories Content Filtering Assessment Managed Service Provider Vendor Management