Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
Windows Vista
Change page: < 1 2 3 4 5 6 7 8 9 10 >  |  Displaying page 3 of 10, items 101 to 150 of 465.
Maintaining Desktop Health : Understanding Windows Eventing (part 2) - Event Viewer User Interface
The Windows Vista Event Viewer interface is new for Windows Vista and has many new features. The Event Log service in Windows Vista introduces many more event logs and event log types to the operating system.
Maintaining Desktop Health : Understanding Windows Eventing (part 1) - Windows Eventing Capabilities
A channel is a named stream of events; conceptually, this is no different from a television channel. Just as TV channels are directed at particular audiences, event channels are intended for specific audiences.
Using Voice and Sounds : Associating a Sound with an Event, Using Alternatives to Sound
If you want to hear audio cues for events in Windows—the closing of a program or the arrival of new e-mail, for example—you can assign sounds to those events. Windows Vista comes with a predesigned sound scheme that you can use, or you can create your own customized audio cues.
Using Voice and Sounds : Letting Your Computer Do the Talking, Creating a Sound File
Windows Vista provides a program called Narrator that actually speaks to you! Narrator can describe aloud the items that are currently displayed on your screen, and it can even read long blocks of text.
Managing Windows Licensing and Activation : Notification Experience and Reduced Functionality Mode
The focus so far has been on ensuring that your computers are properly activated. However, what happens when activation can't be obtained or maintained? The general result is that the computer enters a grace period and then eventually into Reduced Functionality Mode.
Managing Windows Licensing and Activation : Managing Volume License Activation (part 3) - Managing licensing and activation, Implementing KMS activation
Before attempting to deploy KMS activation, be sure to plan your layout ahead of time. One item to consider is the number of KMS servers to deploy. The load placed on a KMS server is very light when you consider that computers only communicate with the KMS servers every seven days during normal operating conditions.
Managing Windows Licensing and Activation : Managing Volume License Activation (part 2) - Leveraging MAK activation, Comparing KMS and MAK activation
When KMS activation doesn't meet your needs, Multiple Activation Key (MAK) activation can be used. MAK activation is similar to retail product activation in that each workstation must be activated against the Microsoft activation server. This process may be performed over the Internet or the phone.
Managing Windows Licensing and Activation : Managing Volume License Activation (part 1) - Centralizing activation with KMS
The default activation method for volume license editions of Windows Vista is to use KMS. KMS is an organizational, centralized activation solution. The focus of KMS activation is to have a local server at your organization to activate the Windows Vista clients
Managing Windows Licensing and Activation : Licensing Windows
Understanding and managing Windows licenses can be a full-time job. Just as you think you understand it, it changes. The aim of this section is to provide you with the information necessary to build a successful deployment.
Maintaining Desktop Health : Monitoring Reliability and Performance (part 6) - Using Reliability Monitor
Reliability Monitor is a new MMC snap-in for Windows Vista that provides a system stability overview and trend analysis with detailed information about individual events that may affect the overall stability of the system.
Maintaining Desktop Health : Monitoring Reliability and Performance (part 5)
You can use System Monitor’s new Compare feature to overlay multiple log files for comparison. This feature is most useful for comparing multiple log files that have been configured to log the same data points for the same amount of time.
Maintaining Desktop Health : Monitoring Reliability and Performance (part 4)
The Data Manager was introduced in Windows Vista as a central location to manage logged performance data files. Each DCS has an associated Data Manager that controls the data management tasks, including report generation, data retention policy, conditions/actions, and data transfer, for the data in all of the subfolders in the Data Collector Set’s root path.
Maintaining Desktop Health : Monitoring Reliability and Performance (part 3)
You create a DCS by using a wizard or a preconfigured XML template. The data can be a single performance log, event trace, or system configuration data set, or any combination of the three. You can also configure Performance Counter Alerts from this interface.
Maintaining Desktop Health : Monitoring Reliability and Performance (part 2)
The Performance Monitor Add Counters dialog has been redesigned based on user feedback to improve usability. The design of the previous Add Counters dialog made it difficult for users to confirm the performance counters that were being added.
Maintaining Desktop Health : Monitoring Reliability and Performance (part 1) - Component Binaries, Opening the Reliability and Performance Monitor, Using Resource Overview
You can use the Resource Overview to monitor resources only on the local computer. You cannot obtain Resource Overview information for a remote computer.
Preparing Windows PE : Automating Windows PE, Using Windows PE with BDD
BDD 2007 provides an infrastructure solution for automating the deployment of Windows Vista. Part of the infrastructure is the support for customizing and building Windows PE images.
Using Voice and Sounds : Customizing Speech Recognition, Talking to the Mouse
You can customize the way the speech-recognition program works so that it adjusts to your preferences, including the language you want to use, the way it spaces sentences, and its ability to recognize someone else’s voice or different background sounds.
Using Voice and Sounds : Directing Your Computer with Voice Commands, Dictating Text
Windows Vista includes a powerful speech-recognition program that makes it possible for you to use your voice to command the computer. Although speech recognition is designed primarily for people who have difficulty using the keyboard and/or the mouse, the ability to direct Windows and your other programs with your voice has a certain authoritative appeal.
Using Voice and Sounds : Controlling the Volume
Although a computer blaring loud music can be fun when you’re relaxing or having a party, it’s not a good idea when you’re working on a notebook computer around other people in a crowded room or office.
Preparing Windows PE : Working with Windows PE (part 3) - Customizing Windows PE
Most Windows PE customization tasks will involve the processes described in the previous section. You will import and install additional components, add applications, import and install updates, and prepare and capture the resulting image.
Preparing Windows PE : Working with Windows PE (part 2)
Once you have added all required components, applications, and updates to the image, you can prepare it for capture. The preparation process removes all components that you have not installed and prepares the image for capture.
Preparing Windows PE : Working with Windows PE (part 1) - Adding Optional Components
This Windows PE base image includes a number of pre-staged application support components; you can add more if they are available. To import an additional component or language pack to the base Windows PE build image, use the Peimg.exe command.
Maintaining Security : Restricting Content in Windows Media Center, Creating Trusted Contacts, Installing Critical Fixes
E-mail is your computer’s gateway to the rest of the world, and this gateway is what makes your e-mail one of the prime vectors for the distribution of computer viruses and other evils. Fortunately, Windows Mail provides options that can help you detect and prevent the introduction of viruses onto your computer.
Maintaining Security : Restricting Content in Windows Media Center, Creating Trusted Contacts
Windows Media Center has its own tools to control the type of content that can be viewed. Unlike most of the Windows Vista controls, access to the settings is controlled by the use of a pin code rather than reliance on Administrator access. These settings affect all users of the computer.
Maintaining Security : Restricting DVD Movies in Windows Media Player, Preventing Access While Using Windows Media Player
Locking the full-screen display of Media Player provides minimal protection and is designed mostly to prevent accidental changes to the display and the media being played. To play music while denying access to your computer, start your music, and then choose Lock This Computer from the Start menu.
Maintaining Security : Maintaining High Security, Setting Internet Explorer Security
Although most Web sites pose little security threat to your computer, some sites are designed with malicious intentions. In Internet Explorer, to protect your computer from these sites—and to allow access to additional features for sites you know won’t cause any harm—you can set and customize your own security levels and can add sites to your list of trusted or restricted Web sites.
Maintaining Security : Restricting Access on the Computer
Not all games are child’s play any more, not all programs can be safely used by children, and unlimited access to the computer isn’t necessarily the best policy.
Preparing Windows PE : Setting up the Environment
You will need to build an environment for customizing Windows PE images before deployment. Having everything in the appropriate location will simplify the task of creating builds and will help you establish repeatable methods for creating and updating builds.
Preparing Windows PE : Exploring Windows PE
Windows PE, which is supplied with Windows Vista and in the Windows AIK, is the installation engine for Windows Vista. It is directly bootable from CD, DVD, and USB Flash Drives (UFDs).
Planning Deployment : Starting Deployment Workbench, Updating BDD 2007 Components
Check the Internet for updated components frequently. On the Deployment Workbench main menu, from the Action menu, click Check For Updates. On the Check For Updates page of the Check For Updates Wizard, select the Check The Internet check box, and then click Check.
Planning Deployment : Installing BDD 2007
If you’re installing BDD 2007 on Windows XP Professional or Windows Server 2003 with Service Pack 1, you must install additional prerequisite software.
Planning Deployment : Preparing for Development
Whether your organization uses BDD 2007 or not, it will likely require multiple feature teams to develop high-volume deployment projects. Most feature teams need a lab environment.
Planning Deployment : Planning Low-Volume Deployment, Windows Vista Requirements
In low-volume deployment projects, such as in a small or medium-sized business, the planning guidance in BDD 2007 can be overwhelming. The BDD 2007 technology framework is well-suited to low-volume deployment projects.
Using BDD 2007 for Deployment Planning
BDD 2007 is Microsoft’s best offering for high-volume Windows Vista deployment projects. It reduces complexity and increases standardization by allowing you to deploy a hardware and software baseline to all users and computers.
Developing Disk Images : Manually Preparing Images, Customizing BDD 2007
The distribution share and answer files describes to Windows Setup how to install and configure Windows Vista. It includes the settings (answer file) as well as device drivers and packages you want to add to the operating system. It might also contain applications that you want to install.
Maintaining Security : Authorizing Administrative Actions, Restricting Access to Web Content
If you’re a parent, grandparent, guardian, or concerned relative or friend, a child’s access to a computer is a huge source of worry. Fortunately, you can restrict the type of content the child can access, and, if several children have access to your computer, you can make custom settings that are age-appropriate for each child’s account.
Maintaining Security : Monitoring Your Security Settings, Configuring the Windows Firewall
A firewall is a program that’s designed not only to prevent unauthorized and malicious access to your computer over the Internet, but also to prevent unauthorized communications from your computer to the Internet—for example, those that can be made by a spyware program. In other words, a firewall is your defense against hackers, viruses,
Developing Disk Images : Capturing a Disk Image for LTI, Capturing a Disk Image for ZTI
Capturing a disk image for deployment by ZTI is similar to the process of capturing an image for LTI with minor differences. This section describes how to capture an image for ZTI by using the SMS 2003 Image Capture Wizard. Before proceeding, you must have a working SMS 2003 infrastructure and have OSD installed.
Developing Disk Images : Creating the Lab Deployment Point
The Windows AIK comes with Windows PE. No additional files are necessary to create Windows PE boot images for BDD 2007. Deployment Workbench automatically customizes Windows PE .wim files when a deployment point is updated
Adobe Illustrator CS5 : Organizing Your Drawing - Working with Groups
Creating groups is a way to organize the elements in a file. Most importantly, groups allow you to easily select or work with several objects that may belong to a single design element.
Adobe Illustrator CS5 : Organizing Your Drawing - Enhancing Appearances with Live Effects
Illustrator refers to effects as live effects. There are several reasons for this. First—and most important—any effect you apply from the Effect menu is added as an attribute in the Appearance panel. Second, all effects can be edited at any time, even after the file has been closed and reopened at another date.
Adobe Dreamweaver CS5 : Working with Multimedia and Online Tools - Checking for Plug-ins
Use the Check Plugin action to send visitors to different pages depending on whether they have the specified plug-in installed. For example, you might want visitors to go to one page if they have Shockwave and another page if they do not. The Check Plugins action is an excellent tool for making your visitor’s experience a pleasant one.
Adobe Dreamweaver CS5 : Working with Multimedia and Online Tools - Using Plug-ins
You can include content on a page that runs in a Netscape Navigator plug-in, such as a QuickTime or RealPlayer movie, in the user’s browser. After you insert content for a Netscape Navigator plug-in, you can use the Properties panel to set options and parameters for the selected element.
Adobe Dreamweaver CS5 : Working with Multimedia and Online Tools - Using ActiveX Controls
You can insert an ActiveX control in your page. ActiveX controls (formerly known as OLE controls) are reusable components, somewhat like miniature applications, that can act like browser plug-ins.
Maintaining Security : Restricting User Rights, Protecting Your Account
One of the surest ways to protect your computer from either malicious or accidental damage is to assign everyone who uses the computer to the Standard group, and allow only one Administrator account for use in executing system changes.
Maintaining Security : Setting Your Password, Changing Your Password, Resetting Your Password
Unless you create a password that allows you to gain entry to your user account, anyone can log on to your computer and access your files. If you want to protect the computer from unauthorized access, create a password that’s easy for you to remember and difficult for others to guess.
Adobe Photoshop CS5 : The Essentials of Camera Raw - Photoshop Killer Tips
If you have multiple images open in Camera Raw, and need more room to see the preview of the image you’re currently working on, just double-click right on that little divider that separates the filmstrip from the Preview area, and the filmstrip tucks in over to the left, out of the way, giving you a larger preview.
Adobe Photoshop CS5 : Cropping and Straightening
There’s a distinct advantage to cropping your photo here in Camera Raw, rather than in Photoshop CS5 itself, and that is you can return to Camera Raw later and bring back the uncropped version of the image.
Adobe Photoshop CS5 : Adjusting Contrast Using Curves
When it comes to adding contrast to a photo, I pretty much avoid the Contrast slider in Camera Raw’s Basic panel as much as possible, because it’s too broad and too lame. So, when it comes to creating contrast, try the Tone Curve instead, and you’ll never go back to that one broad and lame slider that is too broad and too lame.
Developing Disk Images : Editing a Build’s Task Sequence
In BDD 2007, the task sequence is a list of tasks to run during deployment. However, it’s not a linear list of tasks like a batch script. The task sequence is organized into groups and specifies conditions, or filters, that can prevent tasks and entire groups from running in certain situations.
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Windows Vista
Windows 7
Windows Azure
Windows Server