DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

0 Comments
Continue reading

How Technology is Transforming the Way Students Learn

How Technology is Transforming the Way Students Learn

To educate the leaders of tomorrow, using technology from the past isn’t going to cut it. While some schools are still using technology from the last century, others are moving forward. Today, we will take a look at classroom technology innovations, and how to get this exciting new technology in the hands of more students.

0 Comments
Continue reading

A Better Way to Be Rid of Old Cables

A Better Way to Be Rid of Old Cables

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

0 Comments
Continue reading

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be responsible to pay restitution to the IRS.

0 Comments
Continue reading

Ancient Greek Computer in Serious Need of Firmware Update

Ancient Greek Computer in Serious Need of Firmware Update

When you picture an old computer, do you see a giant machine that takes up an entire room? These days, people might consider even something like a CRT monitor and a device running Windows XP to be ancient. Yet, the oldest “computer” in the world may actually be a bronze contraption found off the coast of Greece; the Antikythera mechanism, which was used to predict and track astronomical events, like the movement of the planets and occurrence of eclipses.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Google Microsoft User Tips Hackers Hosted Solutions Tech Term Internet Business Software Malware Backup Hardware Data Innovation Mobile Devices Data Backup Email Smartphones Data Recovery Workplace Tips Small Business Smartphone Communications Business Continuity Android VoIP Cloud Computing Ransomware Managed IT Services Computer IT Services Router Communication Disaster Recovery Windows 10 Artificial Intelligence Network Productivity Internet of Things Alert Cybersecurity Browser Outsourced IT Chrome Cybercrime Law Enforcement Windows 10 Miscellaneous Applications Server Office 365 How To Money Collaboration Business Management Efficiency Windows Computers Password IT Support Productivity Telephone Systems Spam Facebook Virtualization Passwords Mobile Device Holiday Information Gadgets Word Saving Money Wi-Fi BDR Managed IT Services Social Media Social Engineering Quick Tips Vulnerability Work/Life Balance Microsoft Office BYOD Office Settings Save Money Keyboard Voice over Internet Protocol Mobile Device Management Flexibility Apps Two-factor Authentication Operating System Phishing Connectivity Data Protection Mobility Managed Service Government App Data Security Avoiding Downtime Unsupported Software Automation Telephony Comparison Blockchain HaaS Windows 7 Software as a Service Bandwidth Health Sports Identity Theft Website Encryption Infrastructure Entertainment Data Storage Human Resources Scam Networking Private Cloud VPN Remote Monitoring End of Support OneNote Upgrade Employer-Employee Relationship IT Management Business Intelligence Redundancy Servers Remote Computing Managed IT Office Tips Paperless Office Fraud Access Control Public Cloud Update Google Drive CES Spam Blocking Machine Learning Bring Your Own Device Virtual Assistant IT Plan Content Management Data Management Data Breach Legal Botnet Telephone System Google Docs Conferencing Thought Leadership Mobile Computing Net Neutrality PDF Computing Infrastructure Risk Management FENG Password Management Security Cameras Workers Audiobook Firewall Cast File Sharing Company Culture Online Shopping Smart Tech Video Games Wearable Technology IT Consultant Recovery Patch Management Outlook Administrator Hosted Computing Best Practice Training Advertising eWaste Emails Software Tips Camera FCC History Politics Internet Exlporer Skype NIST Hacker Instant Messaging Leadership Augmented Reality Specifications IT Support Current Events Apple Solid State Drive Flash Managing Stress Shortcuts Evernote USB Samsung Criminal Frequently Asked Questions Smart Office Microchip Credit Cards Inventory Meetings Addiction Title II Virtual Reality Start Menu Cryptocurrency Smartwatch Password Manager Big Data Marketing Remote Worker Staff Electronic Medical Records iPhone Techology Audit Social Wireless Charging Value IBM Excel Search Engine Hacking Experience Charger Physical Security Cache Warranty Online Accountants Worker Commute HIPAA Internet exploMicrosoft Tools Safe Mode Business Mangement Wireless Wiring Millennials Battery Computer Fan Sync HVAC Vendor Cortana Scalability Multi-Factor Security Black Market Supercomputer Tip of the week Bing Amazon Authentication Automobile Cleaning Users Hybrid Cloud Knowledge Data loss Netflix Wireless Internet Printer Telecommuting Budget Downtime WiFi Gmail Search webinar Devices Unified Threat Management Workforce Digital Signature Education Hiring/Firing The Internet of Things Enterprise Content Management Travel Display Google Apps Content MSP Trending Windows 10s Windows Server 2008 YouTube Help Desk Amazon Web Services Nanotechnology Music Computer Care Information Technology Network Congestion Screen Mirroring HBO Wire Mouse Remote Work Practices Document Management Root Cause Analysis Recycling How to Employer Employee Relationship Two Factor Authentication Save Time Compliance Twitter Computer Accessories Content Filtering Assessment Shadow IT Vendor Management Regulation Webinar Printers Bluetooth Television Troubleshooting Transportation Safety Wireless Technology Public Computer IT solutions CrashOverride Books Managed Service Provider Loyalty Benefits Business Owner Worker Hosted Solution SaaS Smart Technology Emergency Rootkit