If you’re using a Windows 7 computer and looking for an option to perform an action to turn OFF the computer remotely, read this article without fail. You can perform this action by using the “Remote Shutdown Dialog” box. Moreover, you can even shutdown, restart or log OFF local or network based computers in an easier way. It is required to open the elevated command prompt, type shutdown –i and press the enter key to open the Remote Shutdown Dialog window.
1.    Here, it is required to click Add button to add the name of the computer on which you wish to perform the action.
2.    Make sure that you’re having the administrative privileges on the computers.
3.    Now, select the command. You can allow the time delay as you like.

In Active Directory, it is default that the administrators are granted permission to perform the different Group Policy management tasks. However, even other individuals can be granted the permissions through delegation. Follow the steps.

How to assign GPO Creation Rights: Administrators

If you’re an administrator of Active Directory, you’ll have the ability to create GPOs in domains and anyone who has created a GPO in a domain will have the rights to manage that GPO. You can follow the following steps to determine who can create GPOs in a domain.
1.    In the GPMC, it is required to expand the entry for the forest you wish to work with and then expand the related Domains node.
2.    After that , it is required to expand the node for the domain you wish to work with. If you don’t see the domain you want to work with, right-click Domains and then click Show Domains. You can then select the domains you want to display.
3.    Then, select the Group Policy Objects node.
4.    Now, the users and groups who can create GPOs in the selected domain will be listed on the Delegation tab.

In order to manage the partitions and volumes, the Windows 7 Disk Management tool offers you a simple interface. In this article, let’s have an easy way to shrink a volume to free up space to create a new partition on our hard drive.

Follow the following steps to shrink a basic volume, simple volume or a spanned volume:
1.    It is required to type diskmgmt.msc at an elevated command prompt to open the Disk Management console.
2.    Then, you can right click the volume that you wish to shrink and then click on the Shrink Volume option.
3.    After that, in the field provided in the Shrink dialog box, it is required to enter the amount of the space by which to shrink the disk.
You can have the following information from the shrink dialog box.
The 24-inch XB2472HD-B and 27-inch X2775HDS-B are now available in Japan. The makers of these monitors Iiyama has officially announced the news. Both of these monitors are equipped with an LED backlight VA panel that produces a 3,000:1 contrast ratio. With these monitors, you can have an HDMI port, DVD-D ouput and an ECO mode. Here, the ECO mode is capable or reducing up to 60% of power consumption.

This is one of the very latest devices in the market. The name of the device is Cube Laser Virtual Keyboard. It is a match-book sized rectangular device that emits a red light to simulate a keyboard onto pretty much any flat surface. Using this device, you can never miss even a single function of a normal keyboard. However, comparatively it takes less than a third of the space. The other stunning feature of the device is that you can use it as a mouse in the mouse mode. Therefore, in the place of using a small, bulky and slower mouse, you can use this Cube Laser Virtual Keyboard.

We’ve been regularly discussing about some newer software in our blog. In such a way, this is a new software comes to the market. The name of the software is ZIP Recovery Free. As its name says, it is an easy-to-use ZIP file recovery software that is capable of repairing and scanning the .ZIP and .SFX files. Using this software, you can easily perform a recovery for the damaged WinZip files. This tool is able to archive the ZIP recovery and find the files from the ZIP archives. Besides, it is capable to restore the files and minimize the data loss during the recovery of the zip files. This tool uses several algorithms and complex methods for recovering the corrupted data. ZIP Recovery Free has a convenient and simplified user interface that makes even novices to use it and lets you recover even the password-protected files as well.

If you’re looking for repairing both .edb and .stm files in an Exchange Server environment, you can go with EDB Exchange Converter. Due to the errors such jet errors, file size errors and improper shutdown, the Exchange EDB files will be corrupted. In that case, you can use this software. You can use the EDB Exchange Converter to convert the damaged or corrupted EDB database into PST file with.

Moreover, you can use EDB Exchange Converter to recover the permanently deleted mails and access your EDB database in Outlook as PST file. If you wish, you can also import the PST file into Exchange Server with the free utility provided by Microsoft. If you import a PST file, the Exchange Server will automatically create it as an EDB file.

By granting any one of these three specific permissions, you can let a non-administrative user or a group (including users and groups from other domains) to work with a domain, site, or OU GPO.

Read Allows the user or group to view the GPO and its settings.
Edit Settings Allows the user or group to view the GPO and its settings and also change settings. The user or group cannot delete the GPO or modify security.
Edit Settings, Delete, Modify Security Allows the user or group to view the GPO and its settings and also change settings, delete the GPO, and modify security.

Follow these steps to grant these permissions to a user or a group:-
1.    In the GPMC, it’s required to expand the entry for the forest you wish to work with and then expand the related Domains node.
2.    Then, expand the node for the domain you wish to work with.
3.    If you’re not able to view the domain you wish to work with, you can right-click Domains and then click Show Domains.
4.    Then, you can select the domains you wish to display.
5.    After that, select the Group Policy Objects node and select the GPO you wish to work with in the left pane.

In last June, Bing has announced about how the future living room will do more than a great entertainment. Moreover, it will help you find what you’re looking for and help you decide what to enjoy. Therefore, Bing has previewed to that end and found a new way for people to find movies, games, music and other entertainment: voice search with Bing on Xbox.

The HDHomeRun PRIME cable TV tuner is now available from Elgato. This device is capable of working in conjunction with the HDHomeRun PRIME App for iPad 2 that lets you stream and record the live premium cable TV programs directly to your iPad 2. Therefore, watching the news while making dinner, or the baseball game on the patio on a warm evening, or late night TV without disturbing anyone, the HDHomeRun PRIME App enables viewing and recording of live cable TV anywhere in your home’s Wi-Fi network.

Facebook is launching a new feature to play games much easier than ever. Therefore, if you’re a game lover of Facebook, obviously it will be a good news for you. Using this feature, you can easily find new games and play them with your friends.
 A new game ticker
While playing games, you’ll be able to see a separate stream of your friends’ game activities, scores and achievements in a ticker. Therefore, finding new games through your friends is the best way. Moreover, you’ll have more opportunities to see what they’re playing.

Maybe your best friend has started playing Sims; your roommate has a new high score on PacMan; or your mom and sister have taken up Words With Friends. Simply click on a story and you can start playing the game yourself.
Moreover, you can easily control who can see these stories for each individual app in your settings.

We’ll have two primary methods for activating the software on client systems while deploying the Volume License editions of Office 2010. Now, let’s discuss the two primary methods.
•    Key Management Service (KMS)  We’ve already discussed about this approach. However, let’s have a glance on it. This is able to establish a local activation service hosted in your own environment.  In order to do this, we should configure a system on our network to serve as the KMS host by installing and activating a KMS host key. After that, the client systems throughout our organization then connect to the local Office 2010 KMS host for activation.
•    Multiple Activation Key (MAK) This is the second approach and in which the client computers activate Office 2010 online by using the Microsoft hosted activation servers or by telephone.
Yesterday, we’ve discussed about the Google’s Cleaner Interface. Now, let’s try doing it. If you change the NID value of a Google Cookie to get the same interface.
Now, let’s check doing it in Chrome:

1.    First, it is required to install "Edit this Cookie", a cookie manager for Chrome.
2.    Then, it is required to open the Google's homepage and click the yellow cookie icon from Chrome's toolbar.
3.    After that, it’s required to find the lines that start with NID and then click it.
4.    Now, select the value (Ctrl-A or Command-A for Mac), delete it, paste the following value (use Ctrl-V or Command-V for Mac) and click "Submit cookie changes"

Now, Google has come out with a new feature that lets you listen to the audio pronunciation in Google Search results. You can avail this feature if you click on “More” to read all the definitions, but it is more accessible than earlier.
Moreover, for this features, Google uses Flash to play the audio file. Therefore, make sure that the Flash Player isn’t disabled in your computer.

We’ve already discussed that Google has started testing a variation of the search interface. This experimental interface removes all the icons from the sidebar and the icons for Google +1 and Instant Preview will be displayed next to the results. If you hover the mouse over a search result, Google will show you a bigger Instant Preview icon on a vertical bar. If you hover the mouse over the bar, you can see a larger screenshot of the page and the links to the cached page with other similar pages and Google +1 button.

In today’s mobile life, it’s really difficult finding where people are in a crowd breeze. However, “We’re In” is capable of organizing get-together and finding the people. If you wish to see where your friends are, you can seek help of We’re In. The process is much simpler; all it is required to do is inviting our friends. If they join, they’ll be able see your location and you can see theirs as well. When the invite expires, so does the shared location – no complicated process to worry about.
Besides, We’re In is a great way for saving time and frustration. If you plan your road trip or a meet with your friend as it helps you connect with your friends faster. Now, let’s have a deep look at the new product features of We’re In.

HP Thin Client is a rocking unveil from HP. The name of the device is HP T5335Z Smart Client. It is Slim, streamlined and silent; the HP t5335z is equipped with technology that ensures optimum utilization of time. Its Auto-Sensing technology adapts to your environment automatically identifying and connecting to the right client virtualization infrastructure in seconds.

First of its kind
The HP t5335z Smart Client is a uniquely intelligent zero client, delivering new levels of simplicity and value in thin computing. Too smart to be called Zero, the HP t5335z features Auto-Sensing technology that adapts to your environment. Simply connect the HP Smart Client to the network and a user monitor, and you’re on.

Now, the arrow buttons are used to replace the pagination links of the latest Gmail design refresh. If you think it’s not obvious, the navigation links that sent you to the newest/oldest messages are still available in the new interface. It is required to just lick the message similar to "11-20 of 3903" from the screenshot below to know that two options are missing.
This will work for Gmail’s search results when you click any one of the labels. For instance, click the "All Mail" system label, click the pagination message, select "Oldest" and find the first messages from your Gmail account.

There is a well-known issue that the clock, volume, power or network icon will be missing from the system tray on the taskbar. At the same time, the checkboxes in the taskbar and start menu properties windows used to enable the icons will be greyed out. It is really an annoying issue in the Windows Operating Systems. To come out of this issue, we’ve an article. Go through the following information. After performing these steps, it is required to enable the system icons.
•    Before performing the steps, make sure that you’ve saved all the open files and close all the programs as there is a possibility of data loss.
•    First, it is required to restart the explorer process.
•    Then, press the Ctrl + Alt + Del keys on the keyboard.
•    After that, select Task Manager. You may also use the Ctrl + Shift + Esc keys to open the task manager.

Now, Bing shopping has become much simpler. Bing says that making you find things in the fewest possible steps is its goal. Over the past year, Bing has expanded the number of available products by five times and added top brands like Nordstrom, ESPN, Tom’s Shoes, Sony Store, Babies R Us and Dick’s Sporting Goods. Therefore, Bing is unveiling a set of features that surely help you make shopping decisions even faster.
Refining the searches faster

Video: Bing Shopping: More Selection, Fewer Steps

Finding a website or its portion has been removed from a search index and it’s a perplexing experience. What if you could help reduce that risk by restricting access to sensitive areas of webmaster tools, and render them “read only” for assigned individuals?
The Webmaster Tools of Bing place exactly that kind of control within reach. By managing user access levels, you can control those who have the full access as an admin and who can read and export the data and who can read only. This is to ensure that the accidental blocks on content folders or even the entire website can’t happen without direct any direct action by a select set of individuals. Our job is ensuring those with full access understand how to use the tools and their functionality. You can start it by selecting the domain you wish to enable levels of user access for. Check on the left hand side to see the Settings: Users option.

If you’re very conscious about your physical fitness, Scosche’s new myTREK wireless pulse monitor will be perfect choice for you. The gadget is capable of connecting your iPhone or iPod over Bluetooth with a range of up to 33 feet away to feed the information about your pulse and motion to an accompanying free myTREK app. Other than this, the app is capable of tracking everything from calories burned, distance run, speed and pace (when used with a GPS-equipped iPhone) over time. This gadget is powered by a Lithium-ion battery that provides up to 5-hours of workout time. If you’ve $129.99 in your pocket, you can own this Scosche myTREK.

There are a lot of software available for creating flowcharts, org charts and network diagrams. Now, there is another software that joins the group. The name of the software is EDraw Max; it is one of the perfect software that fulfills your need in creating the diagrams.
EDraw Max is a versatile graphics program and is capable of making professional-looking flowcharts, organizational charts, network diagrams and business charts. Besides, it lets you build plans, mind maps, workflows, fashion designs, UML diagrams, electrical engineering diagrams, directional maps, database model diagrams, science illustration etc. The software features or than 5000 built-in vector symbols to make your work much simpler than ever.

Now, you can embrace change and enable business to thrive using Microsoft Dynamics AX 2012.
It is a powerful foundation built for five industries: manufacturing, distribution, retail, services, and public sector, along with comprehensive, core ERP functionality for financial, human resources and operations management. All the packaged in a single global solution thus giving customers a rapid time to value.
Agility through a set of unified natural models that serve as a library of business processes reflecting real-world situations. This enables customers to easily modify their organizations and processes to meet their changing business needs.

If you are deploying volume license editions of Office 2010 in your organization, you have two possible methods for activating Office 2010 on client systems.

Consider you’re planning to deploy volume license editions of Office 2010 in your organization, you’ll have two possible methods for activating Office 2010 on client systems. Now, let’s check the methods out:
•    Key Management Service (KMS) This method establishes a local activation service hosted in your own environment.
If you want to do this, it is required to configure a system on your network to serve as the KMS host by installing and activating a KMS host key. Therefore, client systems throughout your organization can connect to the local Office 2010 KMS host for activation.
•    Multiple Activation Key (MAK) This is another method using which, the client computers can activate Office 2010 online by using the Microsoft hosted activation servers or by telephone.
We know you might’ve come across so many conversion software to convert the videos to fit your mobile or mobile device. One of the unavoidable formats is 3GP as it supports most of the mobiles and music devices. However, if you convert any video to such format, you should be ready to compromise with the quality of the file. To come out of this trouble, you can go with Acala 3GP Movies Free software. It is an easier, faster and better conversion software to convert your favorite video files into 3GP video.
Some important key features of the software:-
•    Edit video clip converting start time and end time.
•    Edit video screen recording range to crop video screen.
•    Edit text or image watermark on video screen.
•    1-click Convert all video files to Mp4, 3GP, 3G2, AVI, WMV, H263.
•    Copy movies to Mobile Phone, Pocket PC, BlackBerry, Palm Phone.
•    Rip audio track and transcode to mp3, wma, mp2, m4a, aac, ac3, su au, arm, wav.
•    Create you own favor ringtone music from movies.
•    Shutdown computer automatically when job is done.
•    Lifetime FREE Technical Support and FREE upgrade .

In our blog, we’ve already discussed about the RACAgent. In this article, let’s discuss about understanding and managing the RACAgent Scheduled Task. The RACAgent is a hidden scheduled task that is automatically configured during the system installation. For gathering the responsibility and reliability data, this tasks takes the privilege. Moreover, this task can display it in a chart view. This task typically runs once every hour, but it will not wake the computer if it is in the sleep mode. The other stunning advantage of this task is that the computer is a laptop and it is running out of the battery power or less than 33 percent, the RACAgent.exe will immediately exit.

If you want to view the RACAgent task, open the Task Scheduler. Now, in the Task Scheduler Library navigate to Microsoft\windows\RAC.
Make sure that you’re enabling the option to Show Hidden Tasks, available from the View menu (View | Show Hidden Tasks).

Now-a-days, the domination of the social bookmarking giant Facebook is unbeatable. We always rely on Facebook for sharing our updates and sending/receiving messages. Besides, mostly we like to send and receive messages on our phones. But, it is not such an easy task to reach some on their phones. Should you send an email or text? Which will they check first? Did they even get your last message? We think messaging should be easier than that. At the same time, how it will be if you’re able to write a message, click "Send" and know that you will reach the person right away? Amazing? Today, Facebook is introducing Messenger, a new mobile app that simplifies your messaging work and offers a faster way to message your friends and small groups.

Windows 7 has a new feature included. The “stub” of a partition. It is able to bring us two functions. First, it has the capability to hold the Boot Manager code and Boot Configuration Database. Second, it reserves space for the startup files required by the BitLocker Drive Encryption feature. If you’re looking to encrypt your system drive using BitLocker, it is not required to repartition your system drive.
If you’re trying to avoid BitLocker and if you prefer to do without the additional complexity of this System Reserved partition, your best bet is to make sure it’s never created. In order to perform a clean installation starting from an unformatted hard drive, it is required to use different disk-management utility such as the setup disk available from many hard-disk manufactures or a startup disk from Windows Vista. First, it is required to create a single primary partition using all unallocated space and then it is required to point the installer to the newly created partition as the setup location.

Consider you’ve a Windows PC and configured with multiple users, how many times you would have thought to prevent other standard users from turning OFF or restarting the computer? Uncountable times? Okay, in this article, we have a great plot for you. Now, let’s discuss about preventing other users from performing discussed tasks. For this task, we’re going to create a separate Group Policy object for non-administrators. In order to open the Group Policy, press the Windows logo key, type mmc in the search box and press the enter key. Now, you can open the Microsoft Management Console.

TaskBowFree is a new name joins Windows 7. This is one of the decorative utilities for Windows 7. Using this tool, you can assign colors to programs or windows, drag and reorder the tasks to the taskbar, you can create a compact quick launch bar and you can fill from the taskbar immediately. Moreover, you can have a quick access to the tasks into groups without any clicks. In one word, you can say it’s a replacement for the taskbar. The tool is compatible with Windows 2000, Windows XP and Windows 7. TaskBowFree can paint the programs on the taskbar and it makes you convenient to find programs faster as human eyes have a good response on different colors. Besides, TaskBowFree lets you collect and organize programs in the taskbar.

If you like Google Chrome than any other browser, this will be one of the best news for you. Moreover, if you like to download more files from internet, you might have faced some difficulties. To come over this trouble, Google Chrome has released a dedicated Downloads button for you here. It lets you open the download webpage in a single click.
Now, let’s discuss about installing this download button in Google Chrome.

A new CWR25/35 HDD/SSD slot-in rack has been unveiled by Century to sustain in the market. The device has been designed with the compatibility with your HTPC or desktop PC. It has come out with a standalone design that lets you install two drives comprising a 3.5-inch HDD and a 2.5-inch SSD or HDD.

If you’re trying to set some automatic actions, it is good for an easy work. However, if the automatic processes turn out to be frustrating, what you will do? Recently, we had a discussion on turning OFF the feature in Word that automatically selects entire words when you may be trying to select just part of a word. Similar to this, you may wish to disable Aero Snap. It is the feature that automatically snaps Windows to a certain size and position when you drag their title bars on the desktop.
Turning OFF this feature is possible though the setting to do isn’t readily apparent. Let’s discuss what we’ve to actually do.
1.    Open the start menu by clicking the start button or pressing the Windows key.
2.    Now, type mouse in the search file and program box.
3.    Then, it is required to change How Your Mouse Works from the list of items that are found.
4.    After that, it is required to select the checkbox for the option Prevent Windows From Being Automatically Arranged When Moved To The Edge Of The Screen.
5.    Make sure that this will also disable the Aero Shake feature that lets us shake a window to minimize all other open windows. Moreover, check out the option just shown above the Prevent Windows From Being Automatically Arranged.
In our blog, we’ve already discussed about Windows Azure as it a cloud service operating system and it serves us as the development service hosting and service management environment for the Windows Azure Platform. From Windows Azure, the developers can have on-demand compute and storage of host, scale and it enables us to manage Web applications on the internet through Microsoft data centers.
Windows Azure is an open environment that supports both Microsoft and non-Microsoft languages and environments. In order to build applications and services on Windows Azure, we can use our existing Microsoft Visual Studio expertise. At the same time, Windows Azure supports popular standards and protocols comprising SOAP, REST and XML.

Comparatively, the new interface is better than the older one. The only thing is that it has a lot of white space that could be used to show more information about the files. At the same time, the details view is no longer available from the interface. However, you can still enable it in the old UI and the setting is preserved.

Everyone of use was using Google Dictionary as it is one of the standalone features of Google. Now, unfortunately, Google has quit this feature as standalone. Earlier we used to fine it at google.com/dictionary. However, we can still find it in Google Web Search and Google Translate.

This article is about the Windows Azure Application Monitoring Management Pack. The System Center can enable you use existing skills and tools in order to monitor and manage applications on Windows Azure without purchasing any additional hardware or software. This Windows Azure Application Monitoring Management Pack can bridge the gap between System Center Operations Manger 2007 R2 and the applications running on Windows Azure, enabling IT Pros to use the System Center Operations Manager to manage the applications on Windows Azure. Here, users have to follow a step-by-step guide to deploy a sample applications to Windows Azure and then use the System Center Operations Manager to monitor and manage the applications. You can check some of the components that are included in the Deploying and Managing Windows Azure Applications evaluation:

Installing the current version of Office Filter Packs is a pre-requisite for Exchange 2007. For Exchange 2007 and Exchange 2010 RTM, the pre-requisite is 2007 Office System Converter: Microsoft Filter Pack. Besides, in Exchange 2010 SP1, this is updated to Office 2010 Filter Packs. The filters are used by Exchange Search for indexing e-mail attachment on Mailbox servers and by the transport rules agent to scan attachments on the transport servers. At the same time, the filters are also important for discovery searches in Exchange 2010 – the Multi Mailbox Search uses content indexes generated by Exchange Search. In Exchange 2010 RTM and Exchange 2007, it is required to register the IFilters with Exchange Search (for Exchange 2007, you can check this Microsoft article # KB 944516). In Exchange 2010 SP1, IFilters included in the Office 2010 Filter Pack are automatically registered by Exchange Setup. Therefore, it is required to register any third-party filters you install.

Earlier we’ve discussed that for the Microsoft Management Console (MMC), Active Directory Administration tools are provided as snap-ins. The following are some of the tools used to manage Active Directory:
•    Active Directory Administrative Center For performing task-orientated management tasks.
•    Active Directory Domains And Trusts For working with domains, domain trees, and domain forests.
•    Active Directory Module For Windows PowerShell For managing Active Directory when you are working with Windows PowerShell.
•    Active Directory Sites And Services For managing sites and subnets.

The primary administrator tool to manage users, groups, computers and organizational units is Active Directory Users and Computers. It is snap-in for the Microsoft Management Console (MMC). You can also refer to the Active Directory administrative tools included MMC snap-ins for Managing Active Directory. However, this is somehow different from other snap-ins.
If you wish to start Active Directory Users And Computers, you can do it by selecting it from the Administrative Tools Menu. Moreover, this snap-in can be added to any console that can be updated. Usually, the Active Directory Users and Computer snap-in works with the domain to which your computer is currently connected. Therefore, you can access the computer and the user objects in this domain through the console tree. If you can’t find a domain controller or if the domain you want to work with isn’t displayed, it is required to connect to a domain controller in the current domain or a domain controller in a different domain. Moreover, the other high-level tasks you might want to perform with Active Directory Users And Computers are viewing advanced options or searching for objects. The following standard set of folders will be disabled if you access a domain in Active Directory Users and Computers.

For both domain and workgroup, the Fast Logon Optimization feature is set by default. If you start the computer or log on to it, this setting will cause policy to be asynchronously applied. This result is similar to the background refresh. Besides, it is able to reduce the amount of time it takes for the logon dialog box to appear and the amount of time it takes for the desktop to become available to the user. This is one of the advantages. Moreover, it also means that the user may log on and start working before the absolute latest policy settings that have been applied to the system.
It is required to disable Fast Logon Optimization depending upon your environment. It is possible doing with Group Policy, using the Always wait for the network at computer startup and logon policy setting. To access this setting:
This article is about hiding or showing a library on the Windows 7 Navigation Pane. If the library is hidden, it will not be displayed in the navigation pane, but it will be displayed in the main Libraries window. You can find Documents, Downloads, Music, Pictures, and Videos libraries are displayed in the Navigation Pane as it is the default settings.
Using the libraries, you can access and arrange the items from one or more folders fast without moving them from their original location. Moreover, the libraries don’t store your files or folders, whereas they point to different locations on a hard disk or external drive attached to your computer. Besides, you can have access to a category of files wherever they’re. If you’ve saved the music files in your local and external hard drives, you’ll still be able to access all the music files from within the “Music” library.
Below given is the full path of the hidden libraries folder.



Method 1:
Now, let’s check how to hide a library in the Navigation Pane.
1.    First of all, open the Windows Explorer.
2.    Right click on the library files (Documents, Music etc) either from the navigation pane or main Libraries window.
3.    Then, click Don’t show in Navigation Pane as shown in the screenshot.

By default, you will be able to pin only the Pin Programs to the start menu and it’s not possible to pin the folders and libraries in Windows 7. This is article will be useful if you’re trying to enable folder and library pin to start menu. By default, what we use to do is dragging a folder to the start button until we see the Pin to Start Menu option and dropping it to the Pin folder. However, this procedure will be something different for adding the Pin to Start Menu option to the context menu of the folder or library.

Make sure that from the Start menu, All Programs area, we will be able to pin only the folders we have added and not any of the default Accessories, Administrative Tools, Maintenance, and Startup folders.

1.    First, it is required to open the registry by typing regedit in the search box and pressing the enter key. Check the screen shot out.

In this article, let’s discuss about distributing a Customized Office 2010 Install to the Remote Workers. Once you’ve successfully configured the installation settings on a network installation point using OCT and Config.xml file, you will be able to distribute the customized install to the users in the field via DVD. All it is required to do is copying all the files and folders from the network installation point to DVD comprising any .msp files you’ve saved to the Updates folder and your modified Config.xml file.
After that, you will be able to run setup.exe from the DVD to get the same customizations as users installing Office 2010 from the network installation point.
Have you ever been through this trouble? Have you ever forgotten to decrypt the file first and directly copied it in its encrypted format to any other computer? Then, you might have received the message says “Access is denied” when you tried to open it. This message appears only because of two reasons. First, you may not have sufficient privilege to view the file or the key that was used to encrypt may not be available in your other computer. Then, you can confirm by selecting the security tab from the properties of the file or a folder to check if you’ve the permission. At the same time, if you’re opening the file from any other computer, it is required to get the key from the computer where you’ve encrypted the file.
Now, let’s check the procedure to get an encryption key from the other computer:
•    First, it is required to export the Encrypting File System (EFS) certificate and key on the computer where the file was encrypted.

A little ago, Robert Wahbe, STB corporate vice president, posted to the Official Microsoft Blog, writing: “While the path to cloud computing might be different for each customer, the economics, agility and focus the cloud provides will eventually prove irresistible to customers. For our partners, the resulting economic opportunity to work with those customers will, I believe, be equally irresistible.”
After the Worldwide Partner Conference, Microsoft has announced updates for the Microsoft Partner Network. The company is investing $5.8 billion in tools, training and incentives throughout fiscal year 2012 to better help partners grow their businesses and meet evolving technology needs of customers. Specifically, Microsoft is investing heavily in helping partner embrace the opportunities of public and private cloud computing. The new partner programs and incentives related to cloud computing comprise:

On the 7th July, Microsoft has announced the general availability of Windows Small Business Server 2011 Essentials (SBS 2011 Essentials). It has been designed as very user friendly and it is an easy-to-use-first-server solution designed and priced especially for small business (up to 25 users). Moreover, it is able to integrate into online services like Office 365, cloud backup, and cloud management solutions.
The SBS 2011 Essentials Server is able to deliver the enterprise-class technology for data backup, remote access, file and printer sharing, and quick connection to the cloud—in one fully integrated solution.
Now, you can purchase a copy of the server through Volume Licensing, Retail, and from most OEM partners, with more offers and OEM products will start available in the next few months ahead.

Most of the ITs are in an infinite need for more computing power to deliver business solutions and the ever increasing demands for greater agility, higher efficiency and lower costs. Now, it is much easier to deliver on these seemingly contradictory demands by leveraging the benefits of cloud computing with our public and private cloud solutions. In this article, we’re really excited to give you a sneak peek at the next step in private cloud computing by showing you just two hundreds of new capabilities coming in the next version of Windows Server, internally code-named “Windows Server 8.”
In this 36:50 duration online video, it is demonstrated how Windows Server 8 Virtual Machines help you build private clouds of greater scale by supporting 16 virtual processors fully loaded with business critical workloads like SQL Server.