Windows 10’s new features, how they work and how you can make them work for you.

The final version of Windows 10 won’t be available until 2015, but that doesn’t mean you can’t live the Windows 10 experience — the extremely pre-final experience — right now.

The technical preview is available right now and although things will likely change drastically between now and release, now’s a good chance to get acquainted.

And keep checking back. As the months close in on the new OS’s final release, expect all our How To coverage to be posted right here.

Windows 10 Technical Preview: 1

spartan

Build 10049 of the Windows 10 Pro Technical Preview just dropped, and with it comes Microsoft’s sexy, speedy new browser: Project Spartan.

The next-gen browser has several new features to try out, including a distraction-free reading view and a fast, secure rendering engine (which was available as an experimental feature in Build 9926). But the coolest new feature is inking — the ability to draw, write on, and generally mark up Web pages from directly within the browser. You can share your marked-up creations via email or through social networks, or you can save them to OneNote.

Start inking

When you see a Web page you want to “ink,” click the small icon that looks like a pen and paper in the upper right corner of the browser window. There are only about five icons total, so this shouldn’t be too difficult to find.

The Web page will refresh and the inking toolbar will appear over the regular toolbar. On the left side of the inking toolbar, you’ll see five icons: Pen, highlighter, eraser, text, and clip. The pen tool is selected by default, so you can just start scribbling away if you’d like (in medium thickness, light blue ink). If you want to change the color of your pen, click the pen icon to choose from 12 colors and three sizes.

To use a highlighter, which will let you highlight text and images instead of drawing over them, click the highlighter button. Click the highlighter button a second time to select your highlighter color and shape (six colors, three shapes).

Type some comments

Drop a connect pin

If you prefer typing to writing or drawing, you can use the text tool to make comments on the webpage. The text tool is a little different from the pen and highlighter tools: Instead of letting you put text wherever you want on the page, this tool lets you drop a comment pin and type text in a corresponding text box on the right side of the page. You can minimize the text box (the pin will remain visible) for less clutter.

When you select the text tool, your pointer will turn into a cross-hair. Click anywhere on the page to drop a comment pin. The pin will appear where you click, and a thin line will connect it to a corresponding text box on the right side of the page.

Click inside the text box to type your comment. To minimize the box, you can either click the minus sign in the upper right corner of the box, or you can click the corresponding comment pin. To delete both the comment pin and the text box, click the trash can icon in the lower right corner of the text box.

The clipping tool will also turn your cursor into a cross-hair, so you can clip out a section of the page. It works similar to the Snipping Tool — click the clipping tool icon, and the page will fade out until you select a section of it. Once you have a section selected, you’ll see a small copy icon in the lower right corner; click this to copy your clip (you can paste it into another program, such as Microsoft Paint, if you want to save it).

Don’t make any mistakes

As of right now, the eraser tool doesn’t do much. If you click on it, nothing happens. If you click on it again, a “Clear All” box appears, which you can click to clear the Web page of annotations.

I assume the eraser tool will be fixed before Project Spartan goes public, because right now there’s no way to fix an annotation mistake without clearing the entire page and starting over.

Share or save your masterpiece

On the right side of the inking toolbar, you’ll see a save icon and a share icon. To save your newly-annotated webpage, click the save icon.

Right now, Project Spartan will let you save your marked-up page as an HTML file – that is, you can add it to your Favorites or your reading list. In the future, you’ll also be able to save your projects in OneNote.

To share your work, click the share icon to open up Windows 10’s sharing sidebar. Because this is such a new build, Project Spartan’s sharing capabilities don’t appear to be turned on – but when they are, you’ll be able to share your creation with any app that supports Windows’ sharing sidebar.

Have questions?

Our small business team is here to help.
Call us at: 856-745-9990

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Pro tip: Sort table data in a Word document

sort word

Microsoft Word

 

Sorting data in a Word document isn’t something you routinely do. On the other hand, presenting list and table data is, so the potential exists that one day you’ll want to sort something. The good news is that it’s easy to sort data in a table or a list. In this article, I’ll show you how to do just that. We’ll work through a few simple sorting examples. You can use most any table, or you can download the example .docx or .doc file.

Behind the scenes

Word relies on paragraphs when sorting, which seems a bit odd within the context of a table (or list). The paragraph formatting mark determines where one paragraph ends and the next starts. As you can see in Figure A, there’s no paragraph mark in a table. The end-of-cell markers denote the end of each cell’s content. The similar marker at the end of each row (outside the right border) is an end-of-row marker. These markers also contain cell and row formatting. When sorting a table, Word relies on the end-of-row marker to identify where one row ends and the next begins, the same way the paragraph mark does. (To see a document’s formatting symbols, click Show/Hide in the Paragraph group on the Home tab.)

Figure A

Table end-of-row markers are similar to paragraph markers.

Sort by the first column

We’ll start with the simplest sort possible; we’ll sort a table by the values in the first column. To do so, select, the table by clicking its move handle (the small square in the top-left corner). If you don’t see this handle, check the view. It’s available only in Print Layout and Web Layout. With the entire table selected, do the following:

  1. Click the contextual Layout tab. In the Data group, click Sort — or click Sort in the Paragraph group on the Home tab. In Word 2003, choose Sort from the Table menu.
  2. The resulting dialog does a good job of anticipating the sort. Notice that the Header Row option (at the bottom) is selected. As a result, the Sort By field is set to Species — the label in the first column’s header (Figure B).
    Figure B

  3. This is exactly what we want, so click OK. Figure C shows the sorted table.
    Figure C

Before we move on, let’s discuss the Type and Using options to the right. We didn’t need to change either, but sometimes you will. The Type options are Text, Number, and Date. Word usually defaults to the appropriate data type. You can force a specific type by choosing a different option other than the one Word assumes (but you’ll rarely have reason to do so). The Using options defaults to Paragraph — we talked about that earlier.

Sort by the second column

That first exercise was easy. Let’s complicate things a bit by sorting by the second column. Fortunately, it’s just as easy as the first. Repeat steps 1 and 2 from the first exercise. Then, do the following:

  1. In the resulting dialog, click the Sort By drop-down.
  2. Choose Common Name, the header label for the second column.
  3. Click OK. Figure D shows the results of sorting by the second column.
    Figure D

That wasn’t any more difficult that the first sort. Tell Word which column contains the values you want to sort by and click OK — that’s it!

Sort by multiple columns

With only two sort tasks under your belt, you’re beginning to see how simple the sorting process in Word can be. Let’s complicate things a bit so you can see how flexible this feature truly is. Let’s sort by the Class column and then sort the bird and mammal groups in a secondary sort. Repeat steps 1 and 2 from the first two exercises. Then, do the following:

  1. To sort by the Class, choose Class from the Sort By drop-down.
  2. To further sort each class group, click Common Name from the Then by drop-down (Figure E). You could add a third column to the sort if the results warranted the additional grouping.
    Figure E

  3. Click OK to see the results shown in Figure F.
    Figure F

What about lists?

You might be wondering how to sort the same data in list form. Word handles the list sort the same way — the exact same way. Highlight the list and click Sort in the Paragraph group on the Home tab. In the resulting dialog, check the header option and set appropriately (if necessary). Then, determine the sort order by choosing the fields (columns), appropriately.Figure G shows the result of sorting the same data in list form.

Figure G

Sort a columnar list the same way you sort a table.

 

Is Your Organization Using SHA-1 SSL Certificates? If so here’s what you need to know and do:

ssl

 

Following a recommendation by the National Institute of Standards and Technology (NIST), Microsoft will block Windows from accepting SSL certificates encrypted with the Secure Hash Algorithm-1 (SHA-1) algorithm after 2016. Given the number of mission-critical SSL certificates that are allowed to expire from inattention, administrators have their work cut out for them. By knowing what will happen, why it’s happening, and what you need to do, you won’t be surprised by these important policy changes.

What’s Happening?

On November 12, 2013, Microsoft announced that it’s deprecating the use of the SHA-1 algorithm in SSL and code signing certificates. The Windows PKI blog post “SHA1 Deprecation Policy” states that Windows will stop accepting SHA-1 end-entity certificates by January 1, 2017, and will stop accepting SHA-1 code signing certificates without timestamps after January 1, 2016. This policy officially applies to Windows Vista and later, and Windows Server 2008 and later, but it will also affect Windows XP and Windows Server 2003.

SHA-1 is currently the most widely used digest algorithm. In total, more than 98 percent of all SSL certificates in use on the Web are still using the SHA-1 algorithm and more than 92 percent of the certificates issued in the past year were issued using SHA-1.

Website operators should be aware that Google Chrome has started warning end users when they connect to a secure website using SSL certificates encrypted with the SHA-1 algorithm. Beginning in November 2014 with Chrome 39, end users will see visual indicators in the HTTP Secure (HTTPS) address bar when the site to which they’re connecting doesn’t meet the SHA-2 requirement. Figure 1 shows those indicators.

 

Figure 1: Visual Indicators in the HTTPS Address Bar

 

Google is doing this to raise end users’ awareness and to help guide other members of the Internet community to replace their SHA-1 certificates with SHA-2 certificates.

Why Is Microsoft Deprecating SHA-1?

SHA-1 has been in use among Certificate Authorities (CAs) since the U.S. National Security Agency (NSA) and NIST first published the specification in 1995. In January 2011, NIST released Special Publication 800-131A, “Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths.” This publication noted that SHA-1 shouldn’t be trusted past January 2016 because of the increasing practicality that a well-funded attacker or government could find a SHA-1 hash collision, allowing them to impersonate any SSL website.

Realizing that it’s highly unlikely that CAs and the industry at large will adopt more powerful encryption algorithms on their own, Microsoft is leading the charge by making Windows reject certificates using SHA-1 after January 1, 2017. Doing this will lead website operators to upgrade to stronger SHA-2 certificates for the betterment of all Windows users and the broader public key infrastructure (PKI) community. The Windows PKI blog post “SHA1 Deprecation Policy” noted that, “The quicker we can make such a transition, the fewer SHA-1 certificates there will be when collisions attacks occur and the sooner we can disable SHA1 certificates.”

In the end, the issue isn’t if SHA-1 encryption will be cracked but rather when it will be cracked.

What Do I Need to Do?

January 1, 2017, might seem like a long way away, but now is the time to understand the problem and how to mitigate it.

As per Microsoft’s SHA-1 deprecation policy, Windows users don’t need to do anything in response to this new technical requirement. XP Service Pack 3 (SP3) and later versions support SHA-2 SSL certificates. Server 2003 SP2 and later versions add SHA-2 functionality to SSL certificates by applying hotfixes (KB968730 and KB938397).

Web administrators must request new certificates to replace SHA-1 SSL and code-signing certificates that expire after January 1, 2017. As of this writing, that would probably affect only public SHA-1 certificates that were purchased with a long expiration date (three years or more) or long-duration certificates issued by internal SHA-1 CAs. Most third-party CAs will rekey their certificates for free, so you simply need to contact the CA to request a rekeyed certificate that uses the SHA-2 algorithm.

When ordering new SSL certificates, you should confirm with the CA that they’re being issued with the SHA-2 algorithm. New certificates with expiration dates after January 1, 2017, can only use SHA-2. Code-signing certificates with expiration dates after December 31, 2015, must also use SHA-2.

Note that the algorithm used in SHA-2 certificates is actually encoded to use SHA-256, SHA-384, or SHA-512. All of these are SHA-2 algorithms; the SHA number (e.g., 256) specifies the number of bits in the hash. The larger the hash, the more secure the certificate but possibly with less compatibility.

It’s important that the certificate chain be encrypted with SHA-2 certificates. (A certificate chain consists of all the certificates needed to certify the end certificate.) This means that any intermediate certificates must also use SHA-2 after January 1, 2017. Typically, your CA will provide the intermediate and root CA certificates when they provide the SHA-2 certificate. Sometimes they provide a link for you to download the certificate chain. It’s important that you update this chain with SHA-2 certificates. Otherwise, Windows might not trust your new SHA-2 certificate.

Root certificates are a different story. These can actually be SHA-1 certificates because Windows implicitly trusts these certificates since the OS trusts the root certificate public key directly. A root certificate is self-signed and isn’t signed by another entity that has been given authority.

For the same reason, any self-signed certificate can use the SHA-1 algorithm. For example, Microsoft Exchange Server generates self-signed SHA-1 certificates during installation. These certificates are exempt from the new SHA-2 policy since they aren’t chained to a CA. I expect, however, that future releases of Exchange will use SHA-2 in self-signed certificates.

What About My Enterprise CAs?

If your organization has its own internal CA PKI, you’ll want to ensure that it’s generating SHA-2 certificates. How this is done depends on whether the CA is running Windows Server 2008 R2 or later and if your CA has subordinate CAs.

If you have a Server 2008 R2 or later single-root CA without subordinates, you should update the CA to use SHA-2. Doing so will ensure that subsequent certificates generated will use the SHA-2 algorithm. To check which hash algorithm is being used, you can right-click the CA and go to the General tab. If SHA-1 is listed, you can run the following certutil command to configure the CA to use the SHA-256 algorithm:

certutil -setreg ca\csp\CNGHashAlgorithm SHA256

You must restart the CertSvc service to apply the change. Now when you view the CA properties, you’ll see that the hash algorithm is SHA-256. All future certificates issued by this CA will use SHA-256, but keep in mind that existing certificates will still be using SHA-1. You need to renew any SHA-1 certificates issued by this CA to upgrade them to SHA-2 certificates.

If your CA is older than Server 2008 R2, you can’t upgrade the CA to use SHA-2. You’ll need to rebuild it with a newer version.

If your organization’s internal CA is multi-tiered with one or more subordinate CAs, you’ll need to reconfigure them to use SHA-2. This is done using the same certutil command just given on each subordinate or issuing CA. Keep in mind that if you use subordinate CAs, you’re not required to update the root CA to SHA-2 since that certificate is at the top of the certificate chain, but it won’t cause any problems if you do. You still need to renew any SHA-1 certificates issued by the subordinate CAs to upgrade them to SHA-2 certificates.

Take Action Now

Administrators and website operators should identify all the SSL certificates used in their organizations and take action, as follows:

  • SHA-1 SSL certificates expiring before January 1, 2017, will need to be replaced with a SHA-2 equivalent certificate.
  • SHA-1 SSL certificates expiring after January 1, 2017, should be replaced with a SHA-2 certificate at the earliest convenience.
  • Any SHA-2 certificate chained to an SHA-1 intermediate certificate should be replaced with another one chained to an SHA-2 intermediate certificate.

The following tools and websites are useful for testing and for further information about SHA-1 remediation:

  • Microsoft Security Advisory 2880823. This website discusses the deprecation policy for the SHA-1 hashing algorithm for the Microsoft Root Certificate Program.
  • Migrating a Certification Authority Key from a Cryptographic Service Provider (CSP) to a Key Storage Provider (KSP). The section “How to migrate a CA from a CSP to a KSP and optionally, from SHA-1 to SHA-2” in this TechNet web page provides detailed instructions for upgrading a CA to use SHA-2.
  • Gradually sunsetting SHA-1.” This Google Online Security Blog post explains how the transition to SHA-2 affects Chrome and details Google’s rollout schedule.
  • SHA-256 Compatibility. This GlobalSign web page lists OS, browser, server, and signing support for SHA-256 certificates.
  • DigiCert SHA-1 Sunset Tool. This free web application tests public websites for SHA-1 certificates that expire after January 1, 2016.
  • DigiCert Certificate Inspector. This tool discovers and analyzes all certificates in an enterprise. It’s free, even if you don’t have a DigiCert account.
  • Qualys SSL Labs’ SSL Server Test. This free online service analyzes the configuration of any SSL web server on the public Internet.

SharePoint Online

sponline

Share Point Online

SharePoint Online

You can also get SharePoint Online with Office 365.  SharePoint Online delivers the powerful features of SharePoint without the associated overhead of managing the infrastructure on your own. Flexible management options ensure that you still retain the control you need to meet the compliance requirements of your organization. You can purchase SharePoint in the cloud as a standalone offering or as part of an Office 365 suite where you could also get access to Exchange, Lync, the Office clients and web apps.

Cross device availability

Easily access and interact with your SharePoint news feed, wherever you go using the SharePoint mobile apps available across various devices.

Easy to Manage

You can get setup in virtually no time! The powerful admin console allows your organization to easily manage capabilities, policies and security for all the content and features within SharePoint. Automated maintenance of the servers ensure that you are always up to date with the latest features with minimal downtime.

Enterprise grade reliability and standards

Safeguard your data by hosting it in geographically distributed data centers with continuous data backup, premier disaster recovery capabilities and a team of experts monitoring the servers around the clock.

Office 365 FastTrack and adoption offer

FastTrack is the onboarding service benefit included for qualified Office 365 customers. Microsoft onboarding experts will provide personalized assistance ensuring the service is ready to use company-wide.

To see all the features that are included, view the detailed service descriptions.

If you are interested in SharePoint Online please contact us at 856-745-9990.

Office 365 ProPlus

billionphotos-1669715

ProPlus

ProPlus

Your Office instantly, wherever you go. Get the latest tools for productivity, collaboration, compliance, and BI—powerful, flexible, and delivered fast, with smooth upgrades.
 

Best experience virtually anywhere

With Office in the cloud, you always have the latest versions of your familiar Office applications right where you need them. Working on your iPhone or Android phone? Use Office Mobile to view and edit files.3 Using your tablet? Access Office through a browser to create and edit documents. And when you’re away from your own desk, you can stream Office to any Internet-connected PC.1 You get one familiar experience across all your devices, and your files are always up to date.

The flexibility to deploy and manage on your terms

Deploy the way that’s best for you—on-premises with your own tools, or with assistance from the Office 365 online service. And you can run Office 365 ProPlus side by side with earlier Office versions, so your workers can make a smooth transition. Upgrades are smooth, too, because your customizations are respected and add-ins and data files are loaded automatically. Plus, you can monitor the health and performance of your Office in real time across your organization.

Enhanced security for email and advanced compliance tools

Protecting the privacy and security of your data is essential. With Office 365, you can simplify compliance. Team members can access project-related email and documents right from their email. You can help your users avoid sending email with sensitive information to unauthorized recipients by using policy tips in email. Recording and archiving meetings, including IM conversations, is easy for IT. Plus you can scan Excel spreadsheets for errors, and view an audit trail of changes.

Advanced Business Intelligence tools that are easy to use

No matter how good your data, you need insight to make it work for you. Gain insight fast by giving everyone powerful BI tools that are easy to use. With Office 365 ProPlus you can streamline integration and manipulation of large volumes of data from various sources and perform rapid analysis. For more insight, explore different views of data in a pivot table or pivot chart with a click, and bring data to life by compiling data, charts, and graphs into one interactive visualization.

If you are interested in Office 365 ProPlus or would like to sign up for a trial please click here or contact us at 856-745-9990.

End of Support for Microsoft Windows Server 2003

end windows server 2003

 

A large number of businesses still run Microsoft MSFT -1.71% Windows Server 2003 and it’s unlikely they all will upgrade before Microsoft Corp. ends support on July 14, 2015, say analysts. Companies that don’t upgrade increase their cyber security risks because the company will no longer issue security updates and these systems will be more vulnerable to hackers.

Businesses worldwide run an estimated 23.8 million physical and virtual instances of Windows Server 2003, according to data released by Microsoft in July 2014. Analysts say the technology is more prevalent in industries such as health care, utilities and government. Yet it’s also still used in about 7% of retail point of sale systems, according to a report Thursday by Trend Micro Inc.4704.TO -1.11%

“Microsoft does not plan to extend support for Windows Server 2003 and encourages customers who currently run Windows Server 2003 and have not yet begun migration planning to do so immediately,” said Vivecka Budden, a Microsoft spokesperson, in an email.

South Jersey Techies offers various migration options to include Windows Server 2012 R2, Microsoft Azure, hosting partners and Office 365.

“It is going to be difficult to get this done in time,” said David Mayer, practice director of Microsoft Solutions at Insight Enterprises Inc.NSIT -1.12%, a provider of IT hardware, software and services.

Many of these same industries were impacted by the end of service for the Windows XP operating system on April 8.  Microsoft broadcasts these sorts of moves years in advance, so it shouldn’t come as a surprise to anyone. But, the product was stable and for many companies there simply wasn’t incentive to update.

“In general, everyone has been slow to migrate, especially those with servers that are running applications,” said Rob Helm, vice president of research at Directions on Microsoft consulting firm.

The problem in industries such as health care and utilities is that companies run legacy apps written by vendors who still require Windows Server 2003. For example, there are smaller vendors in health care that have not kept up with development and application modernization, said a health-care CIO who asked not to be identified. A hospital may have an inventory of 100 to 500 different applications and many applications will still require Windows Server 2003, he added.

Electric utilities, for example, widely use Windows Server 2003. There hasn’t been much movement to upgrade those systems, said Patrick C. Miller, founder of the nonprofit Energy Sector Security Consortium and a managing partner at The Anfield Group, a security consulting firm. Instead, utilities are working to better secure and isolate those systems.

“I’m concerned about directory services such as application authentication and user permissions,” said Mr. Miller. “If you compromise an Active Directory server, you get access to everything.”

For now, analysts are recommending that companies work out their risk of exposure and make plans to first migrate those applications that will be most difficult. Companies should make plans to harden servers that can’t be updated. That might entail putting those systems on an isolated network, where they’d be less prone to outside attack, said Mr. Helm.

To protect and upgrade your home or business

 please contact us 856-745-9990 or click here.

 

Microsoft Office for iPad is here!

ipad-office

Edit, work, create, and get more done from your iPad, for free

ipad-office3

Four new, free apps are available on your iPad®. With both Microsoft OneDrive and Dropbox access, online storage—and access to your files—is always just a click away on your iPad. The new Microsoft Office apps give you the ability to flat out get more done.

  • With the new Microsoft Word app, you can edit, create, and save your docs, wherever work takes you
  • The new Excel app lets you analyze your data on the fly
  • Build and deliver your presentations—right from your tablet or phone—with the new PowerPoint app
  • The new Microsoft OneNote app helps you work collaboratively and stay organized on the go

With these apps, you can now access, edit, and save directly to your Dropbox account. You can even open and edit files that have already been saved in Dropbox.

Adding Dropbox is easy.  When you are in any of the new apps, follow these simple steps:

1. Tap on the arrow in the top left, then tap Open
2. Tap “Add a Place”
3. Select Dropbox

To get the Office apps for iPad®, open www.appstore.com/microsoftoffice from your iPad’s web browser.

 

Important: Internet Explorer Vulnerability

IEIMPORTANT INFORMATION: US-CERT and UK security agencies warn users to stop using Internet Explorer because of the severity in this security hole that has been used in “limited, targeted attacks”.

United States Computer Emergency Readiness Team released an alert on April 28, 2014 regarding vulnerabilities in Microsoft’s Internet Explorer.  Internet Explorer versions 6 through 11 are susceptible to be victims of attacks to exploit the Remote Code Execution Vulnerability.

US-CERT Vulnerability Note VU#22292

Microsoft Security Advisory 2963983

Workarounds:

Basic protection includes the installation of Anti-malware software, enabling a Firewall and applying all Windows/Microsoft updates.  In addition to basic protection, we recommend taking extra preventative steps listed below.  It is not necessary to apply all of the following workarounds, apply one to help protect your system and data.

Enable Enhanced Protection Mode

    1. Open IE 10 or IE 11.
    2. Click the Tools menu and select Internet Options.
    3. In the Internet Options window, click the Advanced tab.
    4. Scroll down the list of options until you see the Security section, click the checkbox to Enable Enhanced Protected Mode.  For IE 11 in a 64-bit version of Windows, you also need to click the checkbox to “Enable 64-bit processes for Enhanced Protected Mode”.
    5. Restart IE to force the new settings.

Change Access Control List and unregister VGX.DLL:

32-Bit Systems:

      1. Open elevated Command Prompt (Run as Administrator)
      2. Run the following command:
        “%SystemRoot%\System32\regsvr32.exe” -u “%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll”
      3. Click OK to close Dialog Box confirming un-registration has succeeded.

64-Bit Systems:

      1. Open elevated Command Prompt (Run as Administrator)
      2. Run the following command(s) separately:
        “%SystemRoot%\System32\regsvr32.exe” -u “%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll” “%SystemRoot%\System32\regsvr32.exe” -u “%CommonProgramFiles(x86)%\Microsoft Shared\VGX\vgx.dll”
      3. Click OK to close Dialog Box confirming un-registration has succeeded.

Windows XP and all other users.

For all user(s) that cannot follow recommendations from Microsoft are urged to use a different web browser.  For secure download(s) of Google Chrome or Mozilla Firefox, please follow the links provided.

For assistance with Changing IE Settings or Install a new Browser

 please contact us 856-745-9990 or click here.

 

Popular Tools in Excel 2013

Excel 2013 has easy access tools that generate professional-looking results quickly.  There are several new features with the new version that should not be overlooked.

Flash Fill

Flash Fill identifies and adapts to basic formatting to automatically input your data.  This tool performs several tasks such as merging information from multiple columns, adding formatting to current column and fixing anomalies with data.  Flash Fill will recognize and apply the selected format to your data but if data differs from row to row, it will not format correctly.

EFF1

Recommended Charts

rcRecommended Charts identifies data guides the user to choose the best chart type for their data.  The main objective of using a chart is to highlight your work in a significant way.

      1. Open the Excel Spreadsheet needed to create a chart.
      2. Select the Insert Tab.
      3. Select the Recommended Charts button to see suggested charts.

Recommended PivotTables

rptRecommended PivotTables are interactive tables that can analyze data, compare data and detect patterns/relationships.  In previous versions, PivotTables were too complex.

      1. Open the Excel Spreadsheet needed to create a table.
      2. Select the Insert Tab.
      3. Select the Recommended Charts PivotTables to see suggested tables. 

Quick Analysis

Quick Analysis is an additional way to generate a chart for data. To generate a chart to highlight your work in a significant way, select the data and click the Quick Analysis Icon.

Untitled

Timelines

Timelines let you filter through PivotTables, similar to a slicer.  The timeline will be embedded alongside the Pivot Table.

  1. Select the PivotTable.
  2. Click the contextual Analyze Tab.
  3. Select Insert Timeline (in the Filter Group).
  4. Then select OK.
  5. In the upper-right corner you can select years, quarters, months or days.

Excel_New_Ftrs.FigE

Cloud Support

Cloud Support by Microsoft allows users to save Excel files to SkyDrive or SharePoint site.  Saving to SkyDrive or a SharePoint site allows users to review and edit files from any device with an Office 365 subscription.

Apps for Excel

appsMicrosoft offers Apps for Excel to enhance what you can do with Excel.  Categories for Apps include Content Management, Financial Management, Productivity, Workflow and Process Management and many more. 

Present Online

Present Online is a way to share workbooks and allows others to update it.  Present Online requires the installation of Lync (if you have Office Professional Plus; Lync is already installed).

  1. Sign into Lync.
  2. Open all workbooks you need to share. (Close workbooks you do not want to share).
  3. In Excel, click the File Tab.
  4. In the left pane, choose Share.
  5. Click Present Online.
  6. Click Present.
  7. Select a Lync meeting or create a new one.
  8. Click OK.

 

Tips to Troubleshoot Outlook

microsoft-outlook

Microsoft Outlook can connectivity issue with Microsoft Exchange.  Troubleshooting and fixing these issues can range from a simple reboot to creating a new mail profile.

Restart Outlook and/or Computer

Many connectivity problems with Outlook can be resolved by simply restarting Outlook and/or the Computer.

  1. Restart Outlook.
  2. After restarting Outlook, verify connectivity.
  3. If there are still connectivity problems, restart Computer.
  4. Once computer is up and running, verify connectivity in Outlook.

Outlook3

Offline Mode

 Outlook 2010 and newer:

  1. Click the Send/Receive tab.
  2. Locate the Work Offline button.
  3. Click the Offline button. 

Outlook 2007 and older:

  1. Click File Menu.
  2. Uncheck the Offline box.

At the bottom of your Outlook Window there will be a “Trying to Connect” prompt.  If  Outlook is “Connected” the problem is solved.

Rebuild PST or OST File

OST File

  1. Close Outlook.
  2. Open the Control Panel.
  3. Select Mail icon.
  4. In the next window, click Data Files.
  5. Locate your data file, select and click Open File Location.
  6. Locate the data file using Windows Explorer.
  7. Rename the file extension from .OST to .OLD
  8. Close these windows and open Outlook

PST File

  1. Search for scanpst.exe using Windows Explorer.
  2. Double click scanpst.exe to run the application.
  3. In the next window, click Browse.
  4. Locate your .pst file.
  5. Click Start.
  6. Scanpst will scan the data file eight times.  
  7. If the scan finds errors, there will be a prompt to repair. For backup purposes, check the Make Backup Of Scanned File Before Repairing box.
  8. Click Repair.
  9. Close these windows and open Outlook

outlook2

Repair Software Install

  1. Open Control Panel.
  2. Click Programs and Features.
  3. Scroll down and highlight the Microsoft Office installation.
  4. Click Change.
  5. Select Repair.
  6. Click Continue.
  7. Allow the repair to complete.
  8. Reboot your computer. 

outlook

Recreate Mail Profile

  1. Open Control Panel.
  2. Click Mail.
  3. Select Show Profiles.
  4. Click Add.
  5. Name the new profile.
  6. Follow the steps for the Outlook Account Setup Wizard.
  7. Verify the new profile and set as the default or delete old profile.