Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
- Office Telemetry reports on Office 2013 docs and apps- If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data. Continue Reading 
- Save WIM file space with WIMBoot in Windows 8.1 update- With Windows 8.1 Update 1, it's possible to boot desktops directly from a WIM file. Follow these steps to create WIMBoot images and save disk space. Continue Reading 
- How to perform a Windows XP upgrade to Windows 8.1- As organizations must now implement a Windows XP upgrade to Windows 8.1, they should understand that Windows 8 and 8.1 aren't identical and use the Windows 8.1 Upgrade Assistant. Continue Reading 
- 
						
- Use Excel's IF statement to track, save on IT support contract costs- Warranty tracking for enterprise software can be an odious task, but if you know how to use the IF statement in Microsoft Excel, you could save money. Continue Reading 
- If you're not using Windows Sysinternals tools, you should be- Windows Sysinternals tools can make work a lot easier for IT administrators, but many people don't even know the suite exists. Get with the program! Continue Reading 
- 
					Definitions to Get Started- What is end-user experience monitoring (EUEM)?
- What is PC as a service (PCaaS)?
- What is Microsoft Windows 10?
- What is the Windows Management Instrumentation Command-line (WMIC) utility?
 - What is Microsoft Windows Assessment and Deployment Kit (Windows ADK)?
- What is a remote desktop and how does it work?
- What is Microsoft Windows System Image Manager (SIM)?
- What is BitLocker?
 
- AppX file- AppX is the application distribution file format that was introduced with Microsoft Windows 8.Continue Reading 
- key-value pair (KVP)- A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.Continue Reading 
- Access- is for IT professionals, business leaders and developers who want to take a strategic approach to end-user computing. We cover the forward-thinking tactics and technologies needed to provide users with the tools they need to do their jobs.Continue Reading