programming4us
programming4us
DESKTOP
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 12 of 73, items 441 to 480 of 2882.
Windows 8 : Installing and Maintaining Applications - Managing Desktop Apps
Apps are new to Windows 8. Apps can be purchased in the Windows Store and installed over the Internet. They also can be developed in-house or by third-party developers and deployed using Group Policy. Although apps can be managed using techniques similar to desktop programs, apps have many distinct characteristics.
Windows Server 2003 : Managing Software Deployment with Group Policy (part 2) - Software Deployment Approaches, Distributing Windows Installer Packages
Given that software can be either assigned or published, and targeted to users or computers, you can establish a workable combination to meet your software management goals. Table 1 details the different software deployment approaches.
Windows Server 2003 : Managing Software Deployment with Group Policy (part 1) - Software Installation Extension
The Software Installation extension in the Group Policy Object Editor console, seen as the first node under the Computer Configuration and User Configuration nodes, is the key administrative tool for deploying software, allowing administrators to centrally manage
Windows Server 2003 : Managing Special Folders with Group Policy (part 3) - Folder Redirection Best Practices
If you redirect My Documents to the home directory, and if your users log on to the domain via Terminal Server clients, then don’t specify a separate Terminal Services Home Directory.
Windows Server 2003 : Managing Special Folders with Group Policy (part 2) - Policy Removal Considerations, Folder Redirection and Offline Files
If you are working offline (either because you are disconnected from the network or because you undocked your portable computer), you can still browse network drives and shared folders in My Computer or My Network Places. A red X appears over any disconnected network drives.
Windows Server 2003 : Managing Special Folders with Group Policy (part 1) - Folder Redirection, Setting Up Folder Redirection
If you redirect a user’s Application Data and the user encrypts files or folders using the Encrypting File System (EFS), the user might not be able to decrypt his or her EFS encrypted folders when he or she is not connected to the network. This occurs because the user’s encryption keys are stored in the Application Data folder structure.
Windows 7 : Computer Management (part 2) - Shared Folders,Services
Windows 7 is highly modular. Many of the inner housekeeping chores of the OS are broken down into services that can be added, removed, started, and stopped at any time, without requiring a reboot.
Windows 7 : Computer Management (part 1) - Task Scheduler, Event Viewer
Event Viewer is an administrative application used to view the log files that record hardware, software, and system problems and security events. You can think of an “event” as any occurrence of significance to the OS.
Windows Server 2012 : Active Directory Domain Services Primer - Understanding Domain Trusts
Two-way transitive trusts are automatically established upon the creation of a subdomain or with the addition of a domain tree into an AD DS forest. Transitive trusts are normally two-way, with each domain trusting the other domain.
Windows Server 2012 : Active Directory Domain Services Primer - Outlining AD DS Components
The AD DS schema is a set of definitions for all object types in the directory and their related attributes. The schema determines the way that all user, computer, and other object data are stored in AD DS and configured to be standard across the entire AD DS structure.
Windows Server 2012 : Active Directory Domain Services Primer - AD DS Structure - Describing AD DS Domain Trees
The transitive trust relationship is automatic. The transitive trust relationship means that because the Asia domain trusts the root companyabc domain, and the Europe domain trusts the companyabc domain, the Asia domain trusts the Europe domain as well. The trusts flow through the domain structure.
Windows Server 2012 : Active Directory Domain Services Primer - AD DS Structure - Understanding the AD DS Domain
Domains in AD DS serve as administrative security boundaries for objects and contain their own security policies. It is important to keep in mind that domains are a logical organization of objects and can easily span multiple physical locations.
Tips Against Data Collectors
It is impossible to escape data tracking completely. With our tips, you can keep the data collectors away from you so much that they can no longer create a usable profile of you. Simultaneously, you can use the web without discomfort.
Desktops Disguise - All-In-One Computers (Part 5)
Acer's Aspire 5600U is a great example of the current generation of home, family- focused Windows 8 all-in-ones. It has an attractive design that carries through to its bundled peripherals, a reasonable spec, and an excellent stand that allows for a wide tilt range - highly useful if you're dealing with touch-centric applications or games.
Desktops Disguise - All-In-One Computers (Part 4) - Asus Transformer AiO
The Transformer AiO consists of a massive 18.4-inch multi-touch tablet, with a 1920 X 1080-pixel IPS display. The tablet is a marvelously svelte (for its size) 18mm thick, and weighs 2.4kg- also reasonable for the size. Asus claims the screen's viewing angle is 178 degrees, and in our limited experience, that does seem accurate.
Desktops Disguise - All-In-One Computers (Part 3) : Apple iMac 27-inch
The iMac's screen is exceptional, though I'd expect nothing less from a company as devoted to the design and photography markets as Apple. The 2560 x l440-pixel display scored well in all areas when tested with the Spyder4 Elite, achieving an overall rating of4.5/5, and covering 100% of the sRGB color space.
Desktops Disguise - All-In-One Computers (Part 2)
Lenovo has been in the all-in-one market for a while now, but we were unable to get hold of a review sample in time for our February roundup. This month we got our hands on the ThinkCentre Edge 92z, a 21.5-inch all-in- one workstation running Windows 8.
Desktops Disguise - All-In-One Computers (Part 1)
As all-in-ones strive to take over the desk space once dominated by bulky desktops, they must continually evolve to meet our requirements as consumers and PC users. We checked out three models that have appeared since our last roundup in February, and one very interesting upcoming device from Asus, in our quest to follow that evolution
Winddows Home Server 2011 : More Optimization Tricks (part 2) - Upgrading Your Device Drivers
Device drivers that are designed to work with Windows Home Server generally load faster than older drivers. Therefore, you should check each of your device drivers to see whether a 64-bit version exists that’s designed to work with Windows Home Server 2011 and, where available, upgrade to that driver.
Winddows Home Server 2011 : More Optimization Tricks (part 1) - Eliminate the Use of Visual Effects, Optimizing Windows Home Server for Services
You can set up Windows Home Server so that it’s optimized to run services. This involves configuring the processor scheduling, which determines how much time the processor allocates to the computer’s activities.
Winddows Home Server 2011 : Tuning Windows Home Server Performance - Optimizing Applications
Unless you use Windows Home Server as your main workstation, it’s unlikely that you want or need to optimize applications. However, if you do run programs on Windows Home Server, you can do a few things to improve the performance of those applications.
Winddows Home Server 2011 : Optimizing Virtual Memory
No matter how much main memory your system boasts, Windows Home Server still creates and uses a paging file for virtual memory. To maximize paging file performance, ensure that Windows Home Server is working with the paging file optimally. The next few sections present some techniques that help you do just that.
Winddows Home Server 2011 : Optimizing the Hard Disk
Windows Home Server uses the hard disk to fetch application data and documents as well as to temporarily store data in the paging file. Therefore, optimizing your hard disk can greatly improve Windows Home Server’s overall performance, as described in the next few sections.
Windows Home Server 2011 : Monitoring Performance (part 5) - Monitoring Performance with Performance Monitor
For more advanced performance monitoring, Windows Home Server offers the Performance Monitor tool, which you can get to by selecting Start, typing perf, and pressing Enter.
Windows Home Server 2011 : Monitoring Performance (part 4) - Monitoring Performance with Resource Monitor
Windows Home Server 2011 comes with a new tool for monitoring your system: the Resource Monitor. You load this tool by selecting Start, typing monitor, and then choosing Resource Monitor in the search results. Figure 6 shows the Resource Monitor window.
Windows Home Server 2011 : Monitoring Performance (part 3) - Monitoring Performance with Task Manager - Monitoring Network Performance
If your network feels sluggish, it could be that the server or node you’re working with is sharing data slowly or that network traffic is exceptionally high. To see whether the latter situation is the cause of the problem, you can check out the current network utilization value, which is the percent of available bandwidth that your network adapter is currently using.
Windows Home Server 2011 : Monitoring Performance (part 2) - Monitoring Performance with Task Manager - Monitoring System Performance
The graphs show you both the current value and the values over time for the CPU Usage (the total percentage of CPU resources that your running processes are using) and the Physical Memory Usage.
Windows Home Server 2011 : Monitoring Performance (part 1) - Monitoring Performance with Task Manager - Monitoring Processes
In the list of processes, you’ll likely see several instances of svchost.exe. This is a program that acts as a host process for services that run from dynamic-link libraries (DLLs) instead of from executable files.
Windows 8 : Managing User Access and Security - Managing Remote Access to Workstations (part 2)
Remote Desktop is not enabled by default. You must specifically enable it to allow remote access to the workstation. When it is enabled, any member of the Administrators group can connect to the workstation.
Windows 8 : Managing User Access and Security - Managing Remote Access to Workstations (part 1) - Configuring Remote Assistance
Remote Assistance is a useful feature for help desks, whether in-house or outsourced. A user can allow support personnel to view and take control of his desktop. This feature can be used to walk users through a complex process or to manage system settings while they watch the progress of the changes.
Windows 8 : Managing User Access and Security - Managing Local User Accounts and Groups (part 3)
Local user accounts can become disabled for several reasons. If a user forgets a password and tries to guess it, he might exceed the account policy for bad logon attempts. Another administrator could have disabled the account while a user was on vacation. When an account is disabled or locked out, you can enable it by using the methods described here.
Windows 8 : Managing User Access and Security - Managing Local User Accounts and Groups (part 2) - Creating Local Groups for Workstations
Under the System Tools node, double-tap or double-click the Local Users And Groups node to expand it, and then select Groups. In the details pane, you should see a list of the currently defined group accounts.
Windows 8 : Managing User Access and Security - Managing Local User Accounts and Groups (part 1) - Creating Local User Accounts
Local user accounts and groups are managed much like domain accounts. You can create accounts, manage their properties, reset accounts when they are locked or disabled, and so on.
Windows 8 : Managing User Access and Security - Managing Stored Credentials
In Windows 8, you can use Credential Manager to store credentials that can be used to try to automatically log on users to servers, websites, and programs. Credentials are stored in a user’s profile.
Running a SharePoint Site on Windows Home Server : Creating Content for a SharePoint Site (part 2) - Maintaining a List of Contacts
A SharePoint contacts list keeps track of your appointments and events. It’s similar to the Outlook Contacts feature and can even synchronize with Outlook so that you don’t have to maintain two separate lists of contacts.
Running a SharePoint Site on Windows Home Server : Creating Content for a SharePoint Site (part 1) - Storing Images in a Picture Library , Tracking Appointments with a Calendar
A SharePoint picture library is a storage area for images. You can use the library to view an image slide show, and you can edit the images if your computer has an image-editing program installed.
Running a SharePoint Site on Windows Home Server : Working with Site Settings (part 4) - Working with Permissions
A site’s permissions specify what a user or group can access on the site and what actions a user or group can perform on the site’s content and other items that are part of the site (such as users and even permissions themselves).
Running a SharePoint Site on Windows Home Server : Working with Site Settings (part 3) - Working with Groups
Like the security groups in Windows Home Server, the groups in a SharePoint site serve to simplify user management and user permissions. You’ve seen how to add a user to one of the three predefined groups—Visitors, Members, or Owners—but SharePoint offers several other group features.
Running a SharePoint Site on Windows Home Server : Working with Site Settings (part 2) - Working with Users
Unlike a typical website where any user can browse anything on the site, a SharePoint site is restricted to just those Windows Home Server users who have been granted access to the site.
Running a SharePoint Site on Windows Home Server : Working with Site Settings (part 1) - Customizing a Site
The look and feel of a SharePoint site is governed by settings that control the title, the description, the visual theme, the top link bar and Quick Launch, and more.
 
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us
programming4us
 
 
programming4us