January 1, 2011
 

Windows 8: Microsoft’s Self-redemption In 2012?
 by: Wendy Wong

About half an year ago, the rumor that Microsoft is developing their next generation operating system Windows 8 has been widely spread. Some leaks from the insider and Steve Ballmer, CEO of Microsoft’s hint have both proved that Windows 8 is being developed now. Since Windows 7 has achieved great success in this year, we have enough reasons to expect Windows 8—the so called riskiest product bet by Microsoft.

What we know about Windows 8 by now ?

Released in 2012
In Oct 2010, Microsoft’s Dutch web site accidentally published a paragraph on Sunday that indicated work on Windows 8 was in the run and the release time would be in 2012.

Facial recognition
Facial recognition would be added to Windows 8 so that the users can enter the system just like login to your e-mail and social network web sites all by simply looking at a camera. The advanced technology could make it easier to replace other passwords with faces.

Faster startup speed
Although the startup speed of Windows 7 is faster than XP and Vista, it’s remains left behind in OS world. Mac Books can start in the 25-second range and Linux including Chrome OS, reduce that to just a few seconds. Now, Windows 8 might make it different.

128-bit compatibility
Back in November 2009, when Windows 7 was just released, a Microsoft engineer updated his claiming he was trying to get “IA-128 working backwards with full binary compatibility on the existing IA-64 instructions in the hardware simulation to work for Windows 8 and definitely Windows 9.” It seems that Windows 8 could be the first version of Windows to drop 32-bit support entirely.

App store
Now, app store has been a necessary part of smart phone operating system. Apple iOS、Google Android、HP web OS and Windows Phone 7 supply with app store service. According to leaked slides from a presentation, Windows 8 will follow suit with the “Windows Store.” Partners like HP may get opportunities to develop their own app stores (“HP Store powered by Windows”).

Data Transfer and Security for an Old PC's Hard Drive

How to fix overheating

How to Direct Connect two Computers

How to reset a Router back to factory default settings

How to install more RAM in your computer

Helpdesk
We have implemented our new dashboard to the IS Concepts Helpdesk. This feature is primarily for our support staff and those primary users who have access to Hardware and Software on the IS Concepts Helpdesk.

The new Dashboard allows us to view open ticket by customer, the up/down status of certain Hardware devices, for example Servers and recently installed/uninstalled Software. Also, it gives us a snapshot of Events and Disk usage by list and by graph. Which is very helpful to us to see how a customer network is doing.

We are starting work on expanding our Monthly report to include all Support Tickets for the Month along with the current report items.



1426 S. Dodsworth Ave.
Glendora, CA 91740

WWW.ISCONCEPTS.COM

Phone: 866.663.6913
Fax: 626.209.0266
Email: support@isconcepts.com

Full Time Support @
a Part Time Price

The Difference between a Virus, Worm, and Trojan Horse.
Viruses, Worms, and Trojan Horses are malicious programs that infect your computer and potentially can cause damage or reduced performance to your PC. Here are the differences.

Viruses:
A Virus attaches itself to a file or program that can be spread to other computers, similarly to a human virus. Viruses range in severity from annoyance all the way to computer damage. Viruses need human interaction to be spread, by running the virus, which is usually done unknowingly.

Worms:
Worms are very similar to viruses, but unlike a virus a worm does not need human interaction to spread to other PCs. Worms use the computers transport features to spread. The biggest danger with worms is that, since they don't need human interaction they can potentially spread to hundreds or thousands of other PCs without the users knowledge.

Trojan Horses:
Trojan Horses use trickery to gain access to your system. Usually this is done by tricking the user to click on something that will run the Trojan Horse. Once on the PC, the range in severity could be as simple as changing home pages, desktops or deleting files. But some create a back door to your system, so the creator can gain access and steal data or worse.

Get Our Free Business Advisory Guide!

21 Revealing Questions You Should Ask Any Computer Consultant BEFORE Giving Them Access To your Company’s Critical Network Operations and

For more information, please visit
here.