DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An IT Christmas Carol

An IT Christmas Carol

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Google Microsoft User Tips Tech Term Hosted Solutions Backup Malware Internet Business Software Hardware Data Backup Data Innovation Mobile Devices Email Smartphones Android Business Continuity Workplace Tips VoIP Data Recovery Small Business Smartphone Communications Disaster Recovery Cloud Computing Ransomware Communication IT Services Computer Router Managed IT Services Internet of Things Browser Cybercrime Law Enforcement Chrome Windows 10 Network Productivity Artificial Intelligence Alert Windows 10 Cybersecurity Outsourced IT Business Management Efficiency Computers Windows Password How To Miscellaneous Applications Server Office 365 IT Support Money Collaboration Saving Money Managed IT Services Wi-Fi Social Media BDR Productivity Facebook Virtualization Passwords Word Telephone Systems Mobile Device Holiday Information Gadgets Spam Two-factor Authentication Settings Mobile Device Management Data Protection Avoiding Downtime Work/Life Balance Quick Tips Phishing Social Engineering Microsoft Office Data Security BYOD Save Money Office Keyboard Flexibility Apps Voice over Internet Protocol Vulnerability Operating System Connectivity Mobility Government App Managed Service Data Storage Fraud Access Control Virtual Assistant Update Data Management Bring Your Own Device OneNote Telephone System Employer-Employee Relationship IT Management CES Redundancy Legal Automation Data Breach HaaS Software as a Service Google Drive Content Management Sports Health Google Docs Entertainment Spam Blocking Bandwidth IT Plan Comparison Blockchain Private Cloud Website End of Support Identity Theft Remote Computing Encryption Scam Networking Servers Botnet Infrastructure Office Tips Unsupported Software Human Resources Managed IT Public Cloud Paperless Office Telephony Remote Monitoring Windows 7 VPN Upgrade Business Intelligence Machine Learning Search Wireless Internet Printer Solid State Drive Flash Leadership Cleaning Content Devices Unified Threat Management Frequently Asked Questions Online Accountants Supercomputer Education Enterprise Content Management Display Meetings Business Mangement MSP Millennials Information Technology YouTube Help Desk Start Menu Cortana Budget Multi-Factor Security How to Wire Mouse Audit Amazon Authentication Hiring/Firing Document Management Gmail Music Computer Care Audiobook Thought Leadership Mobile Computing Excel Telecommuting Computing Infrastructure Password Management Security Cameras WiFi Video Games File Sharing Physical Security Workforce Digital Signature Company Culture Tools Travel Google Apps Trending Firewall Recovery Advertising Administrator Computer Fan Sync Amazon Web Services Nanotechnology Risk Management Best Practice Recycling Wearable Technology Instant Messaging Internet Exlporer Camera Tip of the week Remote Work Practices History NIST Knowledge Hacker Data loss Training Apple Augmented Reality Netflix Net Neutrality PDF Patch Management IT Support Managing Stress Shortcuts Downtime Workers webinar Smart Office Microchip The Internet of Things Online Shopping Smart Tech Politics eWaste USB Samsung Addiction Windows 10s Windows Server 2008 Hosted Computing Current Events Virtual Reality Cryptocurrency Network Congestion Smartwatch Screen Mirroring iPhone Techology Remote Worker HBO FCC Marketing Social Root Cause Analysis Conferencing Specifications Big Data Search Engine FENG Evernote Hacking Criminal Value Internet exploMicrosoft Cache Warranty Credit Cards Inventory Electronic Medical Records Worker Commute Safe Mode IT Consultant Cast Experience Charger Scalability Wiring Outlook Title II IBM Battery Wireless HVAC Vendor Password Manager Emails Software Tips Staff Black Market Users Hybrid Cloud Bing Skype Wireless Charging HIPAA Automobile Loyalty Business Owner Benefits Webinar Worker Hosted Solution SaaS Smart Technology IT solutions Emergency CrashOverride Rootkit Compliance Employer Employee Relationship Save Time Twitter Two Factor Authentication Regulation Content Filtering Assessment Shadow IT Computer Accessories Printers Vendor Management Television Bluetooth Wireless Technology Safety Troubleshooting Managed Service Provider Transportation Books Public Computer