DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hosted Solutions User Tips Google Microsoft Hackers Internet Productivity Software Malware Tech Term Workplace Tips Business Email Innovation Mobile Devices Backup Data Data Backup Smartphones Communications Hardware VoIP Android Data Recovery Small Business Smartphone IT Services Efficiency Business Continuity Cloud Computing Ransomware Cybersecurity Router Computer Communication Managed IT Services Windows 10 Disaster Recovery Artificial Intelligence Network Server Business Management Browser Internet of Things Chrome IT Support Alert Outsourced IT Law Enforcement Cybercrime Windows Windows 10 Miscellaneous How To Applications Mobile Device Office 365 Gadgets Money Collaboration Computers Password Quick Tips Productivity Facebook Information Passwords Virtualization Word Holiday Operating System BDR Spam Saving Money Social Media Managed IT Services Wi-Fi Telephone Systems Mobile Device Management Work/Life Balance Health Keyboard Paperless Office Encryption Office Microsoft Office Private Cloud Phishing Connectivity BYOD Voice over Internet Protocol Save Money Managed Service Data Security Flexibility Apps Two-factor Authentication Government App Mobility Data Protection Vulnerability Social Engineering Avoiding Downtime Settings OneNote Net Neutrality Redundancy Employer-Employee Relationship IT Management HaaS Comparison Blockchain Cryptocurrency Identity Theft Scam Networking Website Servers Entertainment Infrastructure Remote Monitoring Google Drive Human Resources End of Support Spam Blocking Upgrade Machine Learning VPN Virtual Assistant Office Tips Remote Computing Public Cloud IT Plan Business Intelligence Fraud Access Control Managed IT Bring Your Own Device Botnet Update Telephone System Telephony Unsupported Software CES Windows 7 Data Breach Software as a Service Sports Data Management Data Storage Content Management Bandwidth Augmented Reality Automation Meetings Google Docs Legal ISP Start Menu Audiobook Workers Politics Smart Office Microchip Computing Infrastructure PDF Audit Video Games Online Shopping Smart Tech Current Events Addiction Advertising USB Samsung Smartwatch Hosted Computing Remote Worker Internet Exlporer Recovery eWaste Social Excel Best Practice Save Time Apple Cryptomining Tools Instant Messaging Search Engine Physical Security History FCC Big Data Computer Fan Sync Evernote Electronic Medical Records Cache Warranty IT Support Specifications Value Safe Mode Employee Credit Cards Inventory IBM Wiring Knowledge Data loss Criminal Experience Charger HVAC Vendor Tip of the week iPhone Database Techology Downtime Password Manager HIPAA Marketing Bing Netflix Virtual Reality Title II Digital Signage The Internet of Things Wireless Charging Wireless Internet Printer webinar Staff Hacking Supercomputer Devices Unified Threat Management Internet exploMicrosoft Network Congestion Screen Mirroring Cleaning Enterprise Content Management Display Windows 10s Windows Server 2008 MSP Business Technology Root Cause Analysis Business Mangement Budget YouTube Help Desk Wireless HBO Worker Commute Online Accountants Google Search FENG Scalability Cortana Hiring/Firing Wire Users Mouse Hybrid Cloud Conferencing Battery Millennials Automobile Amazon Authentication Thought Leadership Mobile Computing IT Consultant Cast Black Market Multi-Factor Security Music Computer Care Password Management Security Cameras Telecommuting File Sharing Search WiFi Gmail Company Culture Outlook Proactive IT Skype Content Travel Google Apps Risk Management Administrator Information Technology Emails Software Tips Education Workforce Digital Signature Firewall Amazon Web Services Nanotechnology Camera Leadership Trending Wearable Technology NIST Hacker Solid State Drive Flash Remote Work Practices Patch Management How to Recycling Training Managing Stress Shortcuts Frequently Asked Questions Document Management Regulation Computer Accessories Webinar Content Filtering Assessment Printers Vendor Management CrashOverride Bluetooth IT solutions Television Troubleshooting Transportation Shadow IT Books Public Computer Safety Loyalty Benefits Wireless Technology Managed Service Provider Worker Hosted Solution SaaS Smart Technology Emergency Rootkit Business Owner Compliance Biometric Security Employer Employee Relationship Two Factor Authentication Twitter