Utilizing Windows Server 2012 without the GUI Key workarounds for avoiding the Modern UI

Size: px
Start display at page:

Download "Utilizing Windows Server 2012 without the GUI Key workarounds for avoiding the Modern UI"

Transcription

1 Utilizing Windows Server 2012 Key workarounds for avoiding the Modern UI

2 Even though the graphical user interface (GUI) Microsoft introduced in Windows Server 2012 has its benefits, IT admins are reluctant to embrace it. Fortunately, there are ways to work around the modern UI without sacrificing performance or introducing management complexities and this expert guide details these workarounds. By: Serdar Yegulalp You'd have a harder time finding a bigger target for system administrators' ire than the "Modern UI" that was created for Windows 8 and Windows Server Admins see it as the antithesis of everything a server's user interface (UI) should be: too simple for its own good. The desktop and command line interfaces we've all come to know and love have been relegated to the status of second-class citizens, for instance. There are many arguments for why the Modern UI is a good thing for a server UI, such as how it keeps things simple. But few admins are looking for reasons to keep it; what they want are ways to work around it. Here are some basic ways admins can avoid using the Windows Server 2012 GUI -- and still get things done. The most straightforward way to avoid the Modern UI graphical user interface (GUI) is to use a third-party program to bypass it entirely. Many programs not only provide a way to bypass the Windows Start menu, but also offer a re-creation of the Windows 2000-through-7-era Start menu in some form. Page 1 of 4

3 The good news is there are tons of these programs out there. But that can also be bad news. Which third-party programs are best to eliminate the Windows? Since most such lications have not been tested in a server environment, my recommendation is to go with as minimal a program as possible -- one that only skips or disables the new Start menu and does little else to reduce the attack surface. One such program is Skip Metro Suite. When installed and enabled, it automatically switches to the Desktop after login. Skip Metro Suite can also disable other Windows 8 visual fluff, such as hot corners, so it's also useful for admins already stuck with Windows 8. The program has recently been rewritten to reduce its footprint, and can now run as a standalone lication without the need to be installed. tools as possible to the desktop to avoid context switches This requires some work but no additional software. Launch as many admin tools necessary for a day's work, and then pin them to the Taskbar on the desktop or make shortcuts to them on the desktop. Be warned: The amount of back-and-forth needed to set this up can be a bit annoying If you want a way to launch s on the desktop using the menu -- without flipping back to the Modern UI -- there are a slew of third-party launchers available. Among my favorite is PortableApps, which also works as a repository for many common and useful open-source and free-to-use s. To restore things like the My Computer and Control Panel icons to the desktop, you can install the Desktop Experience feature, which can be found in the Add Roles and Features Wizard under User Interfaces and Infrastructure. Page 2 of 4

4 This may be a bit extreme for some, but it's worth mentioning. The Minimal is a step up from Server Core in Windows Server 2012, and it provides just enough GUI functionality to allow you to run GUI-dependent programs. The Minimal lets you run tools like the Server Manager without having to deal with the Modern UI menu. The disadvantage is that it doesn't provide you with the desktop, Internet Explorer or Explorer, so it's minimal. Be warned that, because of this, any software you run that would use components like Explorer would most likely crash. One nice thing about the Minimal is you can toggle to it from a standard Windows Server 2012 installation with one command in PowerShell: #Install-Windowsfeature server-gui-shell remove restart A reboot is required, of course. If there's one thing Microsoft does regularly, it moves peoples' cheese. Just when we've gotten used to the way things work, they shove things around. Sometimes it's for the better, but more often, it's for the worse. On the plus side, this means whether we see the Windows in the next version is up for grabs. Perhaps by then, Microsoft will have either replaced the Modern UI with something more amenable to an admin environment or tamed it in such a way that it doesn't feel quite so annoying. Until then, at least we have choices. Page 3 of 4

5 Free resources for technology professionals TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. Related TechTarget Websites Page 4 of 4

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY P aranoia has crept into many organizations due to the cloud computing approach, and how it feels insecure with your data stored

More information

Desktop Virtualization: What Windows Managers Should Know

Desktop Virtualization: What Windows Managers Should Know One of the biggest jobs for any Windows shop is managing client workstations. Using desktop virtualization can help make that job a little bit easier. This e-guide, from SearchVirtualDesktop.com, can help

More information

Storage Virtualization Explained

Storage Virtualization Explained Storage Virtualization Explained In order to understand the benefits of storage virtualization, it is important to understand how it works. In this e-guide, brought to you by SearchServerVirtualization.com,

More information

AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER

AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER E-Guide AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER SearchSecurity E ffective IT security today demands that users be both authenticated and authorized. But even those

More information

KNOW THE FEATURES OF WINDOWS SERVER 2012 R2

KNOW THE FEATURES OF WINDOWS SERVER 2012 R2 E-Guide KNOW THE FEATURES OF WINDOWS SERVER 2012 R2 SearchWindows Server T hinking of upgrading to Windows Server 2012 R2? In this eguide learn about five new features. From managing the cloud faster to

More information

SSL Certificate Management: Common Mistakes and How to Avoid Them

SSL Certificate Management: Common Mistakes and How to Avoid Them Common Mistakes and How to Avoid Them Common Mistakes and Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes. How to Avoid Them By:

More information

SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY

SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY E-Guide SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY SearchSecurity L earn how network access control, data loss prevention (DLP) and robust data destruction can secure endpoints and protect enterprise

More information

E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT

E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT E nterprise adoption of Windows 10 isn t likely to follow the same pattern as for Windows 7, and that s a good thing, writes columnist Brian Madden. And even

More information

NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS

NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS E-Guide NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS SearchSecurity D evices may not connect to enterprise access systems or inventory and patching mechanisms. This expert eguide explains how

More information

Server Hardware for Virtualization: Exploring the Options

Server Hardware for Virtualization: Exploring the Options Server Virtualization: Exploring the Options As virtualization moves toward the private cloud, server hardware will also have to evolve. Soon, when you talk about hardware for virtualization, you ll mean

More information

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY E-Guide WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY SearchSDN : S oftware-defined networking (SDN) and network technologies are being combined to fundamentally change our approach

More information

LESSONS LEARNED FROM AN OFFICE 365 MIGRATION

LESSONS LEARNED FROM AN OFFICE 365 MIGRATION E-Guide LESSONS LEARNED FROM AN OFFICE 365 MIGRATION SearchExchange Office 365. O ffice 365 s take time and careful research, but even then, some mistakes are inevitable. Find out what one expert learned

More information

ADDRESSING TODAY S VULNERABILITIES

ADDRESSING TODAY S VULNERABILITIES E-Guide ADDRESSING TODAY S VULNERABILITIES SearchSecurity E ven if your firm has no legal or contractual obligation to perform them, authenticated scans should be an essential part of your security program.

More information

Disaster Recovery Planning: Weighing your customer s options

Disaster Recovery Planning: Weighing your customer s options Disaster Recovery Planning: Weighing your Even though backing up data and developing a plan to restore it isn't the first step in business continuity planning (BCP), it's still a cornerstone. Without a

More information

An introduction to the VDI landscape

An introduction to the VDI landscape The : An Virtual desktop infrastructures are quickly gaining popularity in the IT industry as end users are now able to connect to their desktops from any location, at any time. This e-guide, from SearchVirtualDesktop.com,

More information

PREVENTING PRIVILEGE CREEP

PREVENTING PRIVILEGE CREEP E-Guide PREVENTING PRIVILEGE CREEP SearchSecurity Mike Cobb The security principle of least privilege is the practice of limiting permissions to the minimal level that will allow users to perform their

More information

AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER?

AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER? E-Guide AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER? SearchSecurity A pplication development teams often prioritize timely delivery of software above all other concerns

More information

E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD

E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD A modern trend in IT infrastructures reveals that more and more companies are installing solid-state storage and caching. Additionally,

More information

Identify and Eliminate Oracle Database Bottlenecks

Identify and Eliminate Oracle Database Bottlenecks Identify and Eliminate Oracle Database Bottlenecks Improving database performance isn t just about optimizing your queries. Oftentimes the infrastructure that surrounds it can inhibit or enhance Oracle

More information

Requirements for virtualizing Exchange Server 2010

Requirements for virtualizing Exchange Server 2010 Requirements for Exchange : Hardware Microsoft Exchange Server is one of the most mission-critical IT services for many enterprises. Yet while isn t difficult, it must be done properly to ensure success.

More information

MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH

MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH E-Guide MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH SearchSecurity L earn how to implement appropriate security controls for endpoint management. PAGE 2 OF 7 MANAGING ENDPOINTS WITH DEFENSE-IN-DEPTH Mike

More information

ADOPTING FIDO SearchSecurity

ADOPTING FIDO SearchSecurity E-Guide SearchSecurity T he inability of passwords to keep online accounts secure has been recognized for quite some time, but the IT industry has struggled to establish a practical alternative. PAGE 2

More information

BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE

BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE E-Guide BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE SearchServer Virtualization P art 1 of this series explores how trends in buying server hardware have been influenced by the scale-up

More information

SECURITY MONITORING: BE EVERYWHERE AT ONCE

SECURITY MONITORING: BE EVERYWHERE AT ONCE E-Guide SECURITY MONITORING: BE EVERYWHERE AT ONCE SearchNetworking P ervasive security improves on defense in depth by layering security according to risk and assigning it specifically to each critical

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

Disaster recovery planning for health care data and HIPAA compliance regulations

Disaster recovery planning for health care data and HIPAA compliance regulations Disaster recovery care data and HIPAA compliance regulations Disaster recovery care Disaster recovery planning takes on special importance in health care organizations dealing with patients and care delivery.

More information

Evaluating the Security of Software Defined Networking

Evaluating the Security of Software Defined Networking Evaluating the Security of Software Defined Networking This expert e-guide explores the latest challenges in network security. Get tips for evaluating network security virtualization and explore the security

More information

VMware vsphere Beginner s Guide

VMware vsphere Beginner s Guide The latest version of VMware s virtualization platform, vsphere 5, builds on the already solid foundation of. With the growth of cloud computing and the move from ESX to ESXi, it s imperative for IT pros

More information

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid state storage is ready for prime time, or so the latest awareness and usage statistics would indicate. Moreover, a recent

More information

10 Cloud Storage Concepts to Master

10 Cloud Storage Concepts to Master 10 Cloud Storage Concepts to Master Cloud hype has given way to a certain amount of confusion, particularly around the terms used to describe the technology itself. This E-Guide defines "cloud washing"

More information

E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE

E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE D atabase performance can be sensitive to the adjustments you make to design. In this e-guide, discover the affects database performance data

More information

BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES

BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES E-Guide BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES SearchAWS T here is no catch-all for securing a cloud network. Administrators should take a comprehensive approach to protect AWS cloud resources

More information

SDN Technologies Primer: Revolution or Evolution in Architecture?

SDN Technologies Primer: Revolution or Evolution in Architecture? There is no single, clear definition of softwaredefined networking (SDN), but there are two sets of beliefs centralized control and management of packet forwarding vs. a distributed architecture. This

More information

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS E-Guide TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS SearchSDN T here is some confusion surrounding as there is no one definition. In this exclusive guide, you ll find ten to help you better understand

More information

STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES

STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES E-Guide STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES SearchStorage S torage network technology is changing and speed is the name of the game. To handle the burgeoning data growth, organizations

More information

Best Practices for the Hybrid Cloud

Best Practices for the Hybrid Cloud Best Practices for the Hybrid Cloud Private clouds have been a popular topic amongst IT managers in the past year, but IT organizations that build private clouds need the peak computing power of a public

More information

Vista Deployment: What s in the Box and What s Not

Vista Deployment: What s in the Box and What s Not An IT Briefing produced by Vista Deployment: What s in the Box and What s Not By Mark Minasi 2007 TechTarget BIO Mark Minasi is a best-selling author, popular technology columnist and commentator, and

More information

Backup Appliances: Key Players and Criteria for Selection

Backup Appliances: Key Players and Criteria for Selection Backup Appliances: Key Players and Criteria for Selection Backup appliances may have been created with the SMB in mind, but that doesn't mean larger companies can't derive value from them. In fact, recent

More information

A primer to SQL Server 2012

A primer to SQL Server 2012 A primer to SQL Server 2012 Many industry insiders have declared SQL Server 2012 to be the strongest version Microsoft has released in a long time. The 2012 edition offers new features geared toward enterprises

More information

Backup solutions for today s Data Center

Backup solutions for today s Data Center Backup solutions for today s Data Center If your job involved storage data, you already know storage eats up budget dollars fast! In this eguide learn the different data and storage systems available,

More information

The Emergence of SDN in WLAN

The Emergence of SDN in WLAN The Emergence of SDN in WLAN SDN is being implemented rapidly find out how SDN can benefit your wireless network. Contents architectures? Chuck Moozakis Some experts predict that the network functions

More information

Understanding the Value behind Enterprise Application-Aware Firewalls

Understanding the Value behind Enterprise Application-Aware Firewalls Value behind Enterprise Application-Aware Firewalls Value behind Enterprise Firewalls have remained largely unchanged since their emergence 25 years ago, but with Web 2.0 technologies surfacing, organizations

More information

Copyright 2013

Copyright 2013 Windows Server 2012 has a choice of 3 different interfaces. These are full, minimal and server core. Minimal is new to Windows Server 2012.This video will look at how to change between the interfaces and

More information

Ios 6 Manual Ipad 2 Wifi Problemi >>>CLICK HERE<<<

Ios 6 Manual Ipad 2 Wifi Problemi >>>CLICK HERE<<< Ios 6 Manual Ipad 2 Wifi Problemi Page 6 30-pin to USB Cable: Use this to connect ipad 2 or ipad 3rd generation to the USB power adapter to charge, or to your The SIM card in ipad Wi-Fi + cellular models

More information

Launch Multiple Instances of App from Start Screen in Windows 8

Launch Multiple Instances of App from Start Screen in Windows 8 1 sur 5 10/02/2014 19:16 Home Download Windows 8 Windows 8 Colors Contact Us Subscribe Us HOME Addons Apps General How To's News Security Tips & Tricks Tweaks Launch Multiple Instances of App from Start

More information

Security Management System SNMP Trap Interface

Security Management System SNMP Trap Interface Security Management System software generates various alarms on events. SMS SNMP trap Interface application connects to one or more SMS Servers and receives all the alarms generated by the SMS application.

More information

Microsoft's latest OS is a lot better than its predecessor, but it still has some annoying quirks. We help you solve them.

Microsoft's latest OS is a lot better than its predecessor, but it still has some annoying quirks. We help you solve them. Welcome! HOW-TO How to fix five Windows 10 headaches Microsoft's latest OS is a lot better than its predecessor, but it still has some annoying quirks. We help you solve them. By Preston Gralla Contributing

More information

Welcome to Windows 8. ICT Support Office

Welcome to Windows 8. ICT Support Office Welcome to Windows 8 ICT Support Office Windows 8 User Guide Table of Contents Laptop Specifications... 2 Flexible Design... 2 Technical Specifications... 2 Laptop Description... 3 Introducing Windows

More information

Barchard Introduction to SPSS Marks

Barchard Introduction to SPSS Marks Barchard Introduction to SPSS 21.0 3 Marks Purpose The purpose of this assignment is to introduce you to SPSS, the most commonly used statistical package in the social sciences. You will create a new data

More information

E-Guide DATA MIGRATION BEST PRACTICES

E-Guide DATA MIGRATION BEST PRACTICES E-Guide DATA MIGRATION BEST PRACTICES N o matter what kind of enterprise data storage media you house your data in, data migration is a complicated and often confusing process that can expose your data

More information

Barchard Introduction to SPSS Marks

Barchard Introduction to SPSS Marks Barchard Introduction to SPSS 22.0 3 Marks Purpose The purpose of this assignment is to introduce you to SPSS, the most commonly used statistical package in the social sciences. You will create a new data

More information

This document provides additional information for the installation and use of the Keithley I/O Layer.

This document provides additional information for the installation and use of the Keithley I/O Layer. Keithley Instruments KIOL-850C07 Release Notes for Version C07 Keithley I/O Layer, including the Keithley Configuration Panel and Wizard, Keithley Communicator, and VISA runtime 3/30/2015 This document

More information

Getting started with the Spyder IDE

Getting started with the Spyder IDE Getting started with the Spyder IDE Claudius Gräbner 1,2 1 Johannes Kepler University 2 ZOE. Institute for Future-Fit Economies Version 1.0 of July 18, 2018 Abstract Here I provide you with some basic

More information

Event insight: Key takeaways from Cloud Expo Europe and Data Centre World

Event insight: Key takeaways from Cloud Expo Europe and Data Centre World Event insight: Key takeaways from Cloud Expo Europe and Data Centre World Caroline Donnelly, Datacentre Editor, Computer Weekly The CIO of the US Department of Labor (DoL) has cautioned would-be cloud

More information

BENEFITS AND CHALLENGES OF PCIE SSDS

BENEFITS AND CHALLENGES OF PCIE SSDS E-Guide BENEFITS AND CHALLENGES OF PCIE SSDS SearchSolidState Storage S o l i d-s tat e s t o r a g e i s increasingly becoming universally recognized as a top storage performance option but its performance

More information

Deploying Wireless Solutions Beyond in the Enterprise

Deploying Wireless Solutions Beyond  in the Enterprise An IT Briefing produced by Deploying Wireless Solutions Beyond Email in the Enterprise 2003 TechTarget This reference document is based on a Research In Motion/TechTarget Webcast, "." To view the Webcast

More information

Getting Started with Soonr

Getting Started with Soonr WWW.SOONR.COM Getting Started with Soonr A Quick Start Guide for New Users Soonr Inc. 12/19/2012 Revision 1.1 Copyright 2012, Soonr Inc., all rights reserved. Table of Contents 1 How Soonr Workplace Works...

More information

Windows 10 Quick Tips

Windows 10 Quick Tips Windows 10 Quick Tips Contents Drag to Fit Windows... 2 Quickly Jump Between Virtual Desktops... 2 Move open windows between virtual desktops... 2 Rotate Your Screen via Keyboard Ctrl-Alt-D Arrows... 3

More information

I'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the

I'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the I'm Andy Glover and this is the Java Technical Series of the developerworks podcasts. My guest is Brian Jakovich. He is the director of Elastic Operations for Stelligent. He and I are going to talk about

More information

Command Line Windows 7

Command Line Windows 7 How To Force Uninstall Internet Explorer 10 Command Line Windows 7 Jul 10, 2014. Since, you are unable to uninstall Internet Explorer 10 from View installed updates, let us try forcefully removing it using

More information

Product Documentation. AppWave Browser. Apps User Guide. Version 4.1 Published February 12, 2013

Product Documentation. AppWave Browser. Apps User Guide. Version 4.1 Published February 12, 2013 Product Documentation AppWave Browser Apps User Guide Version 4.1 Published February 12, 2013 2013 Embarcadero Technologies, Inc. Embarcadero, the Embarcadero Technologies logos, and all other Embarcadero

More information

E-Guide CLOUD COMPUTING VS. VIRTUALIZATION

E-Guide CLOUD COMPUTING VS. VIRTUALIZATION E-Guide CLOUD COMPUTING VS. VIRTUALIZATION A lthough cloud computing uses virtualization, virtualization is simply one element that makes cloud computing. In this e- guide, brought to you by SearchServerVirtualization.com,

More information

10 Gb Ethernet: Evaluating when and why to upgrade

10 Gb Ethernet: Evaluating when and why to upgrade 10 Gb Ethernet: Evaluating when and why to upgrade While 10 (GbE) has been broadly available for years, it s still new to most network engineers and can be a challenge to decide when. This expert E-Guide

More information

Computer Password Remote

Computer Password Remote How To Change Ip Manually Windows 7 Computer Password Remote Normally, a changing IP address does not cause any problem until you try to connect Connect to your computer via Remote Desktop Connection and

More information

VMWARE HORIZON CLIENT INSTALLATION USER GUIDE

VMWARE HORIZON CLIENT INSTALLATION USER GUIDE VMWARE HORIZON CLIENT INSTALLATION USER GUIDE REMOTE DESKTOP SERVICES (RDS) Abstract This guide will take you through the required steps to install VMware Horizon Client. The VMware Horizon Client is required

More information

E-Guide REINVENTING WAN ARCHITECTURE FOR CLOUD SERVICES

E-Guide REINVENTING WAN ARCHITECTURE FOR CLOUD SERVICES E-Guide REINVENTING ARCHITECTURE FOR CLOUD SERVICES REINVENTING ARCHITECTURE FOR CLOUD SERVICES Cloud architecture: service delivers E nterprises need to reinvent architecture for cloud services. The data

More information

Installing and Configuring Citrix XenApp 6.5 (Part 1)

Installing and Configuring Citrix XenApp 6.5 (Part 1) Installing and Configuring Citrix XenApp 6.5 (Part 1) Introduction The first part of this series describes the installation steps of the first server (which will create the XenApp environment) and the

More information

Colligo Briefcase for Mac. Release Notes

Colligo Briefcase for Mac. Release Notes Colligo Briefcase for Mac Release Notes Contents Technical Requirements... 3 Release 7.5 06 Oct0ber 2017... 4 New in this Release... 4 Release 7.5 18 May 2017... 4 New in 7.5... 4 Issues 7.5... 5 Known

More information

ZENworks Application 2017 Update 2. 1 Documentation Updates. 2 Overview. 1.1 January 2018: Update to ZENworks 2017 Update 2.

ZENworks Application 2017 Update 2. 1 Documentation Updates. 2 Overview. 1.1 January 2018: Update to ZENworks 2017 Update 2. ZENworks Application 2017 Update 2 January 2018 1 Documentation Updates This section contains information on documentation content changes that were made in ZENworks Configuration Management (ZENworks

More information

Manual Backup Sql Server Express 2008 Schedule Database Using Sql Agent

Manual Backup Sql Server Express 2008 Schedule Database Using Sql Agent Manual Backup Sql Server Express 2008 Schedule Database Using Sql Agent This ensures that your server is ready with the latest version of the database software. Unless you are using applications that make

More information

Remote Desktop Services Guide. Windows XP DG ITEC ESIO - STANDARDS

Remote Desktop Services Guide. Windows XP DG ITEC ESIO - STANDARDS Remote Desktop Services Guide Windows XP DG ITEC ESIO - STANDARDS Table of Contents Table of Contents... 2 Introduction... 3 1 Download and Install Citrix Receiver... 3 2 Installing Citrix Receiver...

More information

Setting up EntraPass Card Gateway with SQL Server 2008

Setting up EntraPass Card Gateway with SQL Server 2008 Setting up EntraPass Card Gateway with SQL Server 2008 The EntraPass Card Gateway is designed to interface with the Oracle or the SQL Server Database Engine. Unfortunately the interface has not been updated

More information

SmartDraw. S M A R T D R A W S I T E L I C E N S E : A d m i n C o n t r o l s G u i d e

SmartDraw. S M A R T D R A W S I T E L I C E N S E : A d m i n C o n t r o l s G u i d e SmartDraw S M A R T D R A W S I T E L I C E N S E : A d m i n C o n t r o l s G u i d e TABLE OF CONTENTS Overview... 2 Initial Site License Setup Wizard... 4 Login to Your Account... 4 Start the Initial

More information

Using the Remote Desktop Portal

Using the Remote Desktop Portal Using the Remote Desktop Portal The Remote Desktop Portal The ICT Services team have implemented new software to provide staff greater access to College resources when away from the College. The new software

More information

Flowcharts for Picaxe BASIC

Flowcharts for Picaxe BASIC Flowcharts for Picaxe BASIC Tech Studies Page 1 of 11 In the college you will use the PICAXE Programming Environment in order to carry out all of your program writing, simulating and downloading to the

More information

pcsetup Installation Guide Version 6, August 29, 2000

pcsetup Installation Guide Version 6, August 29, 2000 pcsetup 2.1.7 Installation Guide Version 6, August 29, 2000 Introduction Thank you for purchasing the latest edition of pcsetup. PcSetup 2.1.7 is the third version that has been specifically designed for

More information

Preventing system crashes with Resource Meter

Preventing system crashes with Resource Meter Preventing system crashes with Resource Meter Introduction to the problem/solution If you're running multiple applications, you may notice your system begin to run sluggishly. When

More information

Intro to Workflow Part One (Configuration Lab)

Intro to Workflow Part One (Configuration Lab) Intro to Workflow Part One (Configuration Lab) Hyland Software, Inc. 28500 Clemens Road Westlake, Ohio 44145 Training.OnBase.com 1 Table of Contents OnBase Studio & Workflow... 2 Log into OnBase Studio...

More information

Windows 10 IoT QSG Edited Draft

Windows 10 IoT QSG Edited Draft Initial Setup and Configuration Windows 10 IoT QSG Edited Draft By default, when you first boot up your new Windows 10 IoT 10ZiG Thin Client, you are automatically logged in as Administrator. While logged

More information

Managing the Startup Folder in Windows 8

Managing the Startup Folder in Windows 8 Managing the Startup Folder in Windows 8 Introduction In this lab, you will customize the Startup Folder and the Run Key in the Registry to manage what applications are started automatically when Windows

More information

Organizing your Outlook Inbox

Organizing your Outlook Inbox Organizing your Outlook Inbox Tip 1: Filing system Tip 2: Create and name folders Tip 3: Folder structures Tip 4: Automatically organizing incoming emails into folders Tip 5: Using Colors Tip 6: Using

More information

Windows 7 Overview. The Desktop. Notification Area. Taskbar

Windows 7 Overview. The Desktop. Notification Area. Taskbar Windows 7 Overview The Desktop Notification Area (far right end of the Taskbar) Customization: You configure which icons and/or notifications you want to be visible or not on the task bar. To customize

More information

Tips and Tricks for Windows 8

Tips and Tricks for Windows 8 Tips and Tricks for Windows 8 Windows 8 is optimized for touch This means that there are two interfaces to Windows 8, the traditional Desktop and also the new Metro which is optimized for touch. Metro

More information

Using ATI Catalyst Control Center to Configure Desktops & Displays

Using ATI Catalyst Control Center to Configure Desktops & Displays Using ATI Catalyst Control Center to Configure Desktops & Displays The following general instructions apply using CCC to configure displays. The ATI Catalyst Control Center (CCC) Desktops & Displays manager

More information

WINDOWS 8.X SIG SEPTEMBER 22, 2014

WINDOWS 8.X SIG SEPTEMBER 22, 2014 New Start Screen: Top RIGHT corner next to your Sign in Name is the OFF button. To the Right of Off button is a Search icon You can click on Search icon OR just start typing anywhere in open area of Start

More information

Andy OS User Manual 46

Andy OS User Manual 46 Andy OS User Manual 46 Installing: System Requirements Preparation The Installer HandyAndy: Andy Support Package Logs Start Andy Restart Andy Quit Andy Exit HandyAndy Backup/Restore Settings Set Resolution@DPI

More information

CopyTrans Manager User Guide

CopyTrans Manager User Guide CopyTrans Manager User Guide CopyTrans Website: http://www.copytrans.net Download CopyTrans Manager: http://www.copytrans.net/download.php CopyTrans Manager Support: http://www.copytrans.net/support.php

More information

Setting up FT3000 and version on Windows 7. This is a step by step guide for setting up the FT3000 on a new Windows 7 or 8 PC

Setting up FT3000 and version on Windows 7. This is a step by step guide for setting up the FT3000 on a new Windows 7 or 8 PC Setting up FT3000 and version 3.0.1 on Windows 7 This is a step by step guide for setting up the FT3000 on a new Windows 7 or 8 PC PROBLEM: Computer being updated from XP to WIN 7 or 8. New PC does not

More information

Polarion Trial Installation 17.2

Polarion Trial Installation 17.2 SIEMENS Polarion Trial Installation 17.2 POL002 17.2 Contents About this guide...................................................... 1-1 Before you begin.....................................................

More information

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS...

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS... Welcome to Razer Cortex, the nerve center of your entire gaming experience. From effortlessly finding the best deals on your games to launching and boosting them for peak pc performance while backing up

More information

why DiggSpace? Easy to Setup & Manage Attractive and inviting for all employees Office 365 Integration Drive the adoption of Office 365

why DiggSpace? Easy to Setup & Manage Attractive and inviting for all employees Office 365 Integration Drive the adoption of Office 365 why DiggSpace? Engage with all Employees Support Change Management thru effective corporate information sharing increasing employee engagement and performance Easy to Setup & Manage Attractive and inviting

More information

AVG INTERNET SECURITY 8.5 Installation, Configuration and Use for AARP Tax-Aide

AVG INTERNET SECURITY 8.5 Installation, Configuration and Use for AARP Tax-Aide The following pages show how to install and configure version 8.5 of the AVG Internet Security suite, including the Antivirus and Firewall components, for use on AARP purchased and donated computers used

More information

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS...

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS... Welcome to Razer Cortex, the nerve center of your entire gaming experience. From effortlessly finding the best deals on your games to launching and boosting them for peak pc performance while backing up

More information

USE QUICK ASSIST TO REMOTELY TROUBLESHOOT A FRIEND S COMPUTER

USE QUICK ASSIST TO REMOTELY TROUBLESHOOT A FRIEND S COMPUTER USE QUICK ASSIST TO REMOTELY TROUBLESHOOT A FRIEND S COMPUTER Windows 10 s Anniversary Update brings a new Quick Assist feature. Built into Windows 10, Quick Assist allows you to take remote control of

More information

NetBackup 7.6 Replication Director A Hands On Experience

NetBackup 7.6 Replication Director A Hands On Experience NetBackup 7.6 Replication Director A Hands On Experience Description Through this hands on lab you can test drive Replication Director and experience for yourself this easy to use, powerful feature. Once

More information

Universal Function. How to build an Universal Function with beas Usability Extension. Beas Tutorial. Boyum Solutions IT A/S

Universal Function. How to build an Universal Function with beas Usability Extension. Beas Tutorial. Boyum Solutions IT A/S Universal Function How to build an Universal Function with beas Usability Extension Boyum Solutions IT A/S Beas Tutorial TABLE OF CONTENTS 1. INTRODUCTION... 3 2. PROCESS... 3 2.1. Header... 5 2.2. Detailed...

More information

Encompass360 SmartClient Installation and Login Instructions

Encompass360 SmartClient Installation and Login Instructions Encompass360 SmartClient Installation and Login Instructions This document describes the process of installing the Encompass360 SmartClient, and then logging into Encompass360. Smart Client Installation

More information

PTC Technical Specialists E-Newsletter Date: November 30, 2005

PTC Technical Specialists E-Newsletter Date: November 30, 2005 PTC Technical Specialists E-Newsletter Date: November 30, 2005 PTC Product Focus: A) Cabling Design Option Tips of the Week: B) Introducing Windchill Archive A) Part Level Simplified Representations Announcements:

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

Windows 10 Creators Edition Tips & Tricks. These New Hidden Features Will Save You Time and Money

Windows 10 Creators Edition Tips & Tricks. These New Hidden Features Will Save You Time and Money Windows 10 Creators Edition Tips & Tricks These New Hidden Features Will Save You Time and Money In April 2017, Microsoft released the new Windows 10 Creators Edition. Its features will save you hours

More information