DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

0 Comments
Continue reading

How Technology is Transforming the Way Students Learn

How Technology is Transforming the Way Students Learn

To educate the leaders of tomorrow, using technology from the past isn’t going to cut it. While some schools are still using technology from the last century, others are moving forward. Today, we will take a look at classroom technology innovations, and how to get this exciting new technology in the hands of more students.

0 Comments
Continue reading

A Better Way to Be Rid of Old Cables

A Better Way to Be Rid of Old Cables

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

0 Comments
Continue reading

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be responsible to pay restitution to the IRS.

0 Comments
Continue reading

Ancient Greek Computer in Serious Need of Firmware Update

Ancient Greek Computer in Serious Need of Firmware Update

When you picture an old computer, do you see a giant machine that takes up an entire room? These days, people might consider even something like a CRT monitor and a device running Windows XP to be ancient. Yet, the oldest “computer” in the world may actually be a bronze contraption found off the coast of Greece; the Antikythera mechanism, which was used to predict and track astronomical events, like the movement of the planets and occurrence of eclipses.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Network Security Google User Tips Hackers Microsoft Tech Term Internet Software Productivity Malware Hardware Business Email Innovation Mobile Devices Backup Workplace Tips Data Backup Smartphones Communications Data VoIP Android Efficiency IT Services Data Recovery Cloud Computing Small Business Smartphone Business Continuity Disaster Recovery Computer Ransomware Communication Network Router Managed IT Services Windows 10 Cybersecurity Law Enforcement Windows 10 Chrome Alert IT Support Artificial Intelligence Server Outsourced IT Windows Cybercrime Internet of Things Business Management Browser Password How To Applications Mobile Device Office 365 Money Collaboration Gadgets Miscellaneous Computers Social Media Virtualization Phishing Quick Tips Productivity BDR Word Holiday Facebook Passwords Telephone Systems Spam Operating System Managed IT Services Information Wi-Fi Saving Money Microsoft Office Save Money BYOD Health Data Security Flexibility Apps Social Engineering Office Private Cloud Mobility Encryption Vulnerability Keyboard Voice over Internet Protocol Paperless Office Avoiding Downtime Government App Settings Two-factor Authentication Mobile Device Management Connectivity Data Protection Work/Life Balance Managed Service Virtual Assistant CES Entertainment Bring Your Own Device Automation Google Drive Telephone System Spam Blocking Content Management Google Docs Data Breach Net Neutrality Software as a Service IT Plan Remote Computing Sports Managed IT Comparison Blockchain Botnet Identity Theft Website Bandwidth End of Support Unsupported Software Infrastructure Augmented Reality Telephony Human Resources Windows 7 Office Tips Cryptocurrency Public Cloud Scam Networking Remote Monitoring VPN Servers Upgrade Business Intelligence Data Storage Data Management Meetings Legal Fraud Access Control Update OneNote Machine Learning Employer-Employee Relationship IT Management Redundancy HaaS Wireless Internet Printer Best Practice Save Time Amazon Cleaning Authentication Digital Signage Information Technology Excel Recovery Multi-Factor Security Supercomputer History Budget Telecommuting Enterprise Content Management Display Physical Security Instant Messaging WiFi Gmail Devices Unified Threat Management Tools Workforce Hiring/Firing Digital Signature YouTube Help Desk Travel Google Apps MSP Business Technology Computer Fan Sync Biometric Security IT Support Wire Mouse Knowledge Data loss Music Amazon Web Services Computer Care Nanotechnology Google Search Tip of the week Trending Downtime Virtual Reality Remote Work Practices Password Management Security Cameras Netflix Advertising Recycling Thought Leadership Mobile Computing Risk Management PDF Company Culture webinar Internet Exlporer Firewall Workers File Sharing The Internet of Things Administrator Network Congestion Apple Screen Mirroring Hacking Wearable Technology Online Shopping Smart Tech Proactive IT Windows 10s Windows Server 2008 Root Cause Analysis Worker Commute Training Hosted Computing NIST Hacker HBO Patch Management eWaste Camera Battery Politics FCC Managing Stress Shortcuts Conferencing Scalability FENG Current Events Smart Office Microchip IT Consultant iPhone Cast Techology Automobile USB Evernote Samsung ISP Marketing Black Market Specifications Credit Cards Inventory Smartwatch Outlook Search Criminal Addiction Education Title II Social Emails Internet exploMicrosoft Software Tips Content Big Data Password Manager Remote Worker Skype Electronic Medical Records Staff Search Engine Leadership Wireless Charging Value Cryptomining Solid State Drive Wireless Flash Warranty Document Management Experience Charger Safe Mode Employee Users Hybrid Cloud Frequently Asked Questions How to IBM Cache Computing Infrastructure HIPAA Online Accountants HVAC Vendor Audiobook Business Mangement Wiring Start Menu Millennials Bing Video Games Cortana Database Audit Benefits Worker IT solutions CrashOverride Hosted Solution SaaS Shadow IT Smart Technology Rootkit Emergency Employer Employee Relationship Wireless Technology Compliance Two Factor Authentication Twitter Computer Accessories Content Filtering Assessment Regulation Safety Business Owner Vendor Management Printers Bluetooth Television Managed Service Provider Troubleshooting Transportation Webinar Books Public Computer Loyalty