DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Business Computing User Tips Google Hackers Microsoft Tech Term Hosted Solutions Backup Malware Internet Business Software Hardware Data Innovation Data Backup Mobile Devices Email Smartphones Communications VoIP Business Continuity Android Data Recovery Workplace Tips Small Business Smartphone Communication Cloud Computing Disaster Recovery Managed IT Services Ransomware IT Services Computer Router Alert Chrome Outsourced IT Cybercrime Law Enforcement Windows 10 Productivity Artificial Intelligence Windows 10 Network Cybersecurity Internet of Things Browser Money Collaboration Computers Windows IT Support Password Miscellaneous Applications Server Business Management How To Office 365 Efficiency BDR Word Information Saving Money Social Media Wi-Fi Managed IT Services Telephone Systems Spam Productivity Facebook Passwords Virtualization Mobile Device Holiday Gadgets Phishing Operating System Mobility Data Security Government App Connectivity Social Engineering Managed Service Avoiding Downtime Vulnerability Quick Tips Work/Life Balance Keyboard Voice over Internet Protocol Settings Microsoft Office BYOD Mobile Device Management Office Save Money Two-factor Authentication Flexibility Apps Data Protection Google Drive CES Bring Your Own Device Spam Blocking Servers Paperless Office IT Plan Content Management Data Breach Google Docs Botnet Machine Learning Data Management Virtual Assistant Unsupported Software Comparison Legal Blockchain Bandwidth Telephony Automation Identity Theft Website Windows 7 HaaS Infrastructure Encryption Telephone System Health Human Resources Scam Networking Entertainment Remote Monitoring Data Storage Upgrade Software as a Service VPN Private Cloud Sports Business Intelligence OneNote End of Support Fraud Access Control Employer-Employee Relationship IT Management Redundancy Update Remote Computing Public Cloud Managed IT Office Tips Cryptocurrency Smartwatch Internet exploMicrosoft Amazon Authentication Budget Addiction Multi-Factor Security Worker Commute Computer Fan Sync Telecommuting Scalability Hiring/Firing Knowledge Data loss Remote Worker WiFi Wireless Gmail Battery Tip of the week Social Downtime Users Travel Hybrid Cloud Google Apps Black Market Music Computer Care Netflix Search Engine Workforce Digital Signature Automobile Safe Mode Amazon Web Services Search Nanotechnology webinar Cache Warranty Trending The Internet of Things Remote Work Practices Content Risk Management Network Congestion Screen Mirroring Wiring Recycling Education Firewall Windows 10s Windows Server 2008 HVAC Vendor Root Cause Analysis Information Technology Workers Wearable Technology HBO Bing Net Neutrality PDF Online Shopping How to Smart Tech Training Conferencing Wireless Internet Printer Document Management Patch Management FENG Enterprise Content Management Display Hosted Computing Audiobook Politics IT Consultant Cast Devices Unified Threat Management eWaste Computing Infrastructure Current Events MSP USB Samsung Outlook YouTube Help Desk FCC Video Games Advertising Evernote Recovery Emails Software Tips Wire Mouse Specifications Best Practice Skype Password Management Security Cameras Internet Exlporer Credit Cards Instant Messaging Inventory Leadership Thought Leadership Mobile Computing History Criminal Big Data Solid State Drive Flash Electronic Medical Records Meetings File Sharing IT Support Password Manager Value Frequently Asked Questions Company Culture Apple Title II Wireless Charging Experience Charger Administrator Staff IBM Start Menu NIST Hacker HIPAA Camera Virtual Reality Audit Augmented Reality Marketing Business Mangement Excel Managing Stress Shortcuts iPhone Online Techology Accountants Tools Cortana Cleaning Physical Security Smart Office Microchip Millennials Hacking Supercomputer Worker Printers Hosted Solution SaaS Managed Service Provider Smart Technology Rootkit Business Owner Emergency Employer Employee Relationship Two Factor Authentication Computer Accessories Content Filtering Assessment Vendor Management Save Time Bluetooth Television Troubleshooting Compliance Shadow IT Webinar Transportation Twitter Books Public Computer Loyalty Regulation IT solutions Safety Wireless Technology Benefits CrashOverride