Leflore County Installs ProntoREC

ProntoREC Icons


The process of recording Land Records utilizing their previous green screen text based Land Records Management System was taking Leflore County way too much time. Too many steps, too many screens, and antiquated, complicated search and retrieval methods persuaded Leflore to seek relief. They decided to convert to a faster, easier, modern LRMS – Land Records Management System, Data Systems Management’s ProntoREC.

ProntoREC programming utilizes the new Graphical Web Based Browser Environment. (Our customers call the new interface – Blue Screen Graphical). The new BSG Graphical interface does not require specific PC software or a Client/Server environment. Simply open your browser and access the application from any PC. Since multiple task can be accomplished with only a single screen, records can be processed quickly. Optical Character Recognition technology is utilized to capture ALL THE DATA on the actual documents. This process provides the capability to Copy/Paste index information directly from the document or to SEARCH for specific information within the actual document.

View a Brief Video of Full Text Search Inquiry

walk in the park
Walk in the Park


Migrating from an older Legacy system to Data Systems Management’s new ProntoREC is a Walk in the Park. DSM transfers your existing data and images seamlessly into ProntoREC. We provide a few days of on-site training, establish a GO LIVE date, and your new Document Recording day begins with the Cool Blue Breeze of Blazingly Fast Blue Screen Graphical ProntoREC.

Download ProntoREC Flyer

IBM iSeries Server – Cloud or Local

IBM has just declared that my 5 year old IBM iSeries has reached “End of Life” and IBM will shortly cease offering maintenance and support.  Its time once again to buy the newest model, or is it?  IBM recently made available the IBM iSeries environment for deployment in the cloud.  The full functionality, speed, and reliability of the iSeries can now execute on your new on-site local hardware OR remotely in a secure data center.  So how do we decide which way to go.  Well that all depends.  Let’s explore the pros and cons via the analogy of buying or renting a car.


If I’m buying a vehicle, I need to make sure I have enough seats and horsepower to accommodate my family.  My server requires enough processor speed, memory, and disk capacity to satisfy my users.  Typically, you would overbuy server capacity to make sure costly upgrades were not required….OR

Cloud allows you to dynamically add performance and capacity as needed.  Rent precisely only what you need. Save money and maximize performance.


My Car/Server is parked at my home in my fortified, locked garage provisioned with redundant backup power, security cameras and restricted access.  In case of failure, I call my IBM mechanic who travels to my residence with the exact part that is required.  In case a tornado destroys the place, not to worry; all my tape backups are in another location. I have insurance to pay for a new Server that IBM can provision in perhaps a week; and I can delay payroll until the new Server arrives…OR

My Rental Car/Server is parked in a secure, fortified data center with super redundant internet and power.  If disaster strikes the data center, I can restore my environment from backups that were automatically performed via a direct non-tape disk to disk process. My backup is located in a completely separate data center. A new cloud environment could be provisioned in a matter of a few days.  Business Continuity Achieved.


New functionality and the closure of security threats are provided via PTF’s and OS Release Level updates. Think of having to change your oil, rotate your tires, etc.  Your server should be running the latest OS level which is V7R4.  Just like taking your car to the dealership, applying PTF’s and migrating to the next OS release level take time, cause downtime, and cost money… OR

The cloud environment is automatically maintained at the latest and greatest IBM i Release and PTF level which provides enhanced functionality and security protection.


One typically purchases a car because one thinks that it will last five years and have some resale value.  Unfortunately, old servers have no value and the acquisition process must repeat again…OR

Save your capital and always ride in the newest car.

no worries picture

“NO WORRIES” With the CLOUD everything is included: backups, security, release updates, anywhere remote access, on-demand storage, hardware and system software maintenance.

Visit ProntoCLOUD iSeries Hosting for more information


           FINALLY FRIDAY!!!!!!

Excited for the Weekend!

We’ve all felt the pressure of daily tasks that need to get done and know how it is when one or more of those tasks are not completed on time or in the fashion we quite wanted.  As the work week progresses, we feel more and more pressure to get a project completed or to at least make a deadline in a project.  This creates for us an environment of stress that we dread walking into on Monday and love to leave on Friday.

Thus we end up with these two phrases:  THANK GOD IT’S FRIDAY! and OH GOD IT’S MONDAY (sad face here ).   While we laugh and joke about this each week that rolls around, the simple truth is we need a better way of performing our tasks.

Data Systems has just completed work on our Graphical Payroll Update along with our Time and Attendance System.  These two programs work independently as well as in harmony to give you a better way to manage your tasks.

Let’s begin with our Graphical Payroll.

For starters, our graphical solution offers a dashboard that allows you the convenience of notifications of recent changes to the system.

Payroll Security , drop down windows, multiple new reports, column sorting are all a part of the new graphical payroll update.  There are many more options that are not listed here that affect the way your day to day operations are handled.  Items like the ability to print/re-print W-2 for a single employee, or re-print employee check information as well as displaying all Demand Reports in a PDF format for reviewing, printing, or downloading.

If you are interested in a demo of this application, please contact Data Systems Management at 601-925-6270.

When your payroll is upgraded with our new graphical solution, your days will be easier as all your needs are technically just a click away.

Your new catch phrase will be TGIM – Thank Goodness It’s Monday!  You may still use TGIF, but at least payroll wont be the reason why.

In my next post I will discuss the Time and Attendance Application available to you through Data Systems Management.

Stay Tuned…

ProntoREC Scanning


Land Records Management

The ability to acquire and own property in the United States is a freedom that we often take for granted.  “A man’s home is his castle” rings true as property ownership in the past was only reserved for lords and kings.  The protection of that ownership depends upon a reliable system of the accurate recording of all transactions that identify and track all rights of ownership to the property.   The official recording of these instruments is typically handled by an elected or appointed official of the county or parish such as the Chancery Clerk in Mississippi.


Historically the recording of this information has been a paper intensive process whereby all the documents are stored in large volumes of books cross referenced by even larger index books that recorded the grantor, grantee, section, township, range etc. of the instrument.  Modern digital and scanning technology now allow many counties to store these documents in an electronic format thereby eliminating the bulky volumes of paper documents.   These new electronic scanning systems are typically called a “Land Records Management System”, or LRMS.


Data Systems Management has recently completed the development and installation of our LRMS referred to as ProntoRec. We use the term Pronto because our system is FAST, easy to learn, and completely browser based graphical and cloud enabled.  We extend the application beyond the capability of most existing systems by providing the ability to not only search by the typically keyed indexes on grantee, grantor, etc; we utilize OCR (Optical Recognition Technology) to allow the search and retrieval of any instrument by simple searching for any word, document, or phrase.  Yes, internet search functionality is a standard feature of ProntoRec.

ProntoDMS Board Minute Edition

board meeting

Board Meetings can be a time consuming.  From planning the agenda to recording the minutes and finally tucking them away in a safe a secure location.  Once a process is in place, it can go untouched for years.  Regardless of the number of times you meet annually, we can help you organize your board minutes, even if you need to redact certain information such as social security numbers etc.  Our easy on-site paper to electronic conversion gives you a full text searchable digital archive available for private, local, or public access.

Searching your board minutes has never been easier!  Just type in any string of text, and see your results in seconds.  You can also easily eMail and track documents with this application.  Please feel free to contact Data Systems Management for a free on-line demo at your convenience.  Contact Annette Walker at 601-573-6130 for your demo today!

Justice Court Conference

DSM has been working to improve your software experience.  We have added some new screens, and changed some functionality on our screens to help with your everyday workflow.  Efficiency is the name of the game here.  Stop by our booth at the upcoming Justice Court Conference to see what we’ve been up to in your office!

Here is a sneak peek  at some of the changes headed your way!


Stop by our booth and see Al, Alan, or Tommy regarding the newest version of our software for the Mississippi Justice Court Clerks!

MS Chancery Clerk Conference

conferenceThe beginning of a new year is so exciting!  This year is no different.  Soon the Mississippi Chancery Clerks will meet.  February 5-7 at the Jackson Marriott.  Look for our booth and take a minute to chat with Al or Alan.

Recently, you should have received an invite in the mail similar to this one:

Feb 2019 Chancery Clerk Conference

As always, we are looking forward to seeing you there!


DSM Winter Seminar

Mark Your Calendar!

Soon you will see this invite arrive in the mail. We are very excited this year as we have some new applications to show and we also have a new Client Portal to introduce you to.  As always, the sessions will be in the morning and we will feed you a good hot meal.  We will be available to answer any questions you may have.  We always like to sit and visit with our clients and hear your feedback on ways we can improve our software.  This year we have two dates, December 5 or December 12, so be sure to send your invite back with the date you will attend.  You can email me at, or contact me by phone at 601-573-6130.  We look forward to seeing each of you there!

Dude… it’s me!

Years ago during a military training mission, we had two guys guarding an entry point. Around 4am a man walked toward the post. “Halt! Who goes there?” one of the guards asked. The stranger said, “Dude… it’s me!” The two guards were, like, “sure… come on in.” The perpetrator quickly left instructions with the guards that they were now considered “deceased” and were no longer permitted to participate in the exercise. They got the rest of the night off and we all learned a valuable lesson, i.e., sometimes the bad guys don’t look or act like bad guys!

Social Engineering

Social engineering attempts are increasing. By some estimates, over 90% of email attacks are social engineering attacks. Only around 10% are malware attacks. With the improvements to anti-virus software, the attackers have found the perfect weak point – the employee!

So what is social engineering?  Social engineering is the art of tricking people into giving up information.  No amount of software or hardware will protect your network or data if your employees give an attacker information or access to your equipment or data.  Sometimes it’s intentional.  There are disgruntled employees out there.  Most of the time employees are duped into releasing information or access to a skilled social engineer.

In this series we’ll look at some of the ways social engineers do what they do and, more importantly, how you can avoid falling victim to their evil ways.  So… how do theses masters of social engineering do it?

Tools of the Trade

Humans are curious and generally want to be helpful.  And these are the two factors that social engineers exploit.  In many situations you don’t even see the attacker.  Many attacks come in the form of an email.

Phishing – An email containing links to fake websites that tries to get the user to click on the link and log in to their account.

That seems innocent enough, but the link actually goes to the attacker’s website where he will, at that point, have your username and password.  They’ll pretend to be banks, credit card companies, social media accounts, etc.  The hook is they will tell you that there is some sort of problem and you need to log in to check it out or fix it.

You may have heard in 2016 the DNC was hacked.  It all started when a high-ranking DNC staffer responded to a phishing email by typing in his username and password into what he thought was his email account.  Instantly the attackers had access to all his emails!  And they also had access to his account which allowed them to set all sorts of configurations without his knowledge.

The best way to keep from falling prey to this attack is to simply go directly to your account’s website and don’t use the link provided in the email.  Another way to check the legitimacy of the email is to hover your mouse over the link.  If it’s an email for your account at, then you’ll see displayed on the bottom left of your screen when you hover over the link.  If it’s a different address, it’s probably a phishing attempt.

Even if it’s the same email address, that still doesn’t necessarily mean it’s legit.  Generally speaking, no company is going to send you an email requesting you to log in using the links provided.  If you have a legitimate concern about your account, simply call the company or go to their website directly and log in without using the links from the email.

Baiting – Leaving a USB drive in a public location with the expectation that a person will pick it up and stick in into their computer just to see what’s on it.  You’ve heard the phrase “curiosity killed the cat.”  That applies here.

Recently, the Pentagon suffered a huge security breach when agents from a hostile country drove through the parking lot tossing out infected USB drives knowing people going to work would pick them up and try to see what was on them.

When they inserted the USB drives into their computer, key loggers were installed that recorded every key stroke the user made and sent that information to the hacker.  Key loggers have a way of hiding from detection so users will most likely not even know they’re infected.

But this type of attack can also install ransomware that encrypts your data so that you can’t access it and holds it for ransom… hence the name “ransomware.”  It could also install trojans that steal your information like social security and bank account numbers and open back doors into your system for hackers.  And once they’re in your system they have access to every system on your network.

How do you avoid this?  If you find a USB drive on the ground, open it using someone else’s computer!  NOOOO!  Just kidding.  If you find a USB drive on the ground, then pick it up and hand it over to lost and found, if you have one, or keep it and see if someone lost theirs.  Resist the temptation to pop it in.

Next Time

In my next installment I’ll discuss some of the ways social engineers interact face-to-face with the user to gain access to equipment and data.