Friday, September 17, 2010

Ms Office 2010

Microsoft Office 2010 is a productivity suite for Microsoft Windows, and the successor to Microsoft Office 2007. Office 2010 includes extended file format support, user interface updates, and a refined user experience. With the introduction of Office 2010, a 64-bit version of Office is available, although not for Windows XP or Windows Server 2003. Office 2010 does not support Windows XP Professional x64 Edition.
On April 15, 2010, Office 2010 was released to manufacturing, with those Volume Licensing customers who have Software Assurance being able to download the software from April 27, 2010. The suite became available for retail as well as online purchase on June 15, 2010.

Office 2010 marks the debut of free online versions of Word, Excel, PowerPoint, and OneNote, which work in popular web browsers (Internet Explorer, Mozilla Firefox, Google Chrome and Safari. A new edition of Office, Office Starter 2010, replaced the low-end home productivity software, Microsoft Works.

Microsoft's update to its mobile productivity suite, Office Mobile 2010, will also be released for Windows Phones running Windows Mobile 6.5 and Windows Phone 7. In Office 2010, every application features the Ribbon, including OneNote, Publisher, InfoPath, SharePoint Workspace (previously known as Groove), and the new Office Web Apps.

History and development

Development started in 2007 while Microsoft was finishing work on Office 12, released as Microsoft Office 2007. The version number 13 was skipped due to the aversion to the number 13.It was previously thought that Office 2010 (then called Office 14) would ship in the first half of 2009.

On January 10, 2009, screen shots of an Office 2010 alpha build were leaked by a tester.

On April 15, 2009, Microsoft confirmed that Office 2010 would be officially released in the first half of 2010. They announced on May 12, 2009 at a Tech Ed event, a trial version of the 64 bit edition.

An internal post-Beta build was leaked on July 12, 2009, newer than the official preview build and including a "Limestone" internal test application.

On July 14, 2009, Microsoft started to send out invitations on Microsoft Connect to test an official preview build of Office 2010. On August 30, 2009, the beta build 4417 was leaked on the internet via torrents.

The public beta has been available to subscribers of TechNet, MSDN and Microsoft Connect users as of November 16, 2009. On November 18, 2009, the beta was officially released to the general public at the Microsoft Office Beta website which was originally launched by Microsoft on November 11, 2009 to provide screenshots of the new office suite. Office 2010 Beta is a free, fully functional version, and will expire on October 31, 2010.

In a concerted effort to help customers and partners with deployment of Office 2010, Microsoft launched an Office 2010 application compatibility program with tools and guidance available for immediate download. On 5 February 2010, the official release candidate build, build 4734.1000, was available to Connect and MSDN testers. It was leaked to torrent sites. A few days after, the RTM Escrow build was leaked.

Microsoft announced the RTM on April 15, 2010 and that the final version was to have speech technologies for use with text to speech in Microsoft OneNote, Microsoft PowerPoint, Microsoft Outlook, and Microsoft Word. Office 2010 was to be originally released to business customers on May 12, 2010. Business customers with Software Assurance were able to get it since April 27, 2010 and other Volume Licensing customers were able to get it since May 1. MSDN and TechNet subscribers have been able to download the RTM version since April 22, 2010. The RTM version number was 14.0.4760.1000.

On June 15, 2010, Office 2010 was released to retail customers.

New features and Improvements
Office 2010 is more "role-based" than previous versions.[6] There are features tailored to employees in "roles such as research and development professionals, sales persons, and human resources." Borrowing from ideas termed "Web 2.0" when implemented on the Internet, Microsoft incorporated features of SharePoint Server in Office 2010.

Microsoft Office 2010 includes updated support for ISO/IEC 29500:2008, the International Standard version of Office Open XML (OOXML) file format. Office 2010 provides read support for ECMA-376, read/write support for ISO/IEC 29500 Transitional, and read support for ISO/IEC 29500 Strict.[27] In its pre-release (beta) form, however, Office 2010 only supported the Transitional variant, and not the Strict. The intent of the ISO/IEC is to allow the removal of the Transitional variant from the ISO/IEC compliant version of the OOXML standard. Microsoft Office 2010 supports OpenDocument Format (ODF) 1.1, which is an OASIS standard.

New features also include a built-in screen capture tool, a background removal tool, a protected document mode, new SmartArt templates and author permissions. The 2007 "Office Button" was replaced with a menu button that leads to a full-window file menu, known as Backstage View, giving easy access to task-centered functions such as printing and sharing. A notable accessibility regression from 2007 is that the menu button no longer follows Fitts's law. A modified Ribbon interface is present in all Office applications, including Office Outlook, Visio, OneNote, Project, and Publisher. Office applications also have functional jumplists in Windows 7, which would allow easy access to recent items and tasks relevant to the application. Features of Office 2010 include:

    * Ribbon interface and Backstage View across all applications
    * Background Removal Tool
    * Letter Styling
    * The Word 2007 Equation editor is common to all applications, replacing MS Equation 3.0
    * New SmartArt templates
    * New text and image editing effects
    * Screen Capturing and Clipping tools
    * Live collaboration functions
    * Jumplists in Windows 7
    * New animations in Powerpoint 2010

A new feature in Microsoft Office 2010 is the Social Connector. This allows users to write emails while keeping track of their family, friends, and colleagues by viewing status updates and past communication history with the individual. When users view their emails a name, picture, and title is available for the person they are contacting. Upcoming appointments can also be viewed with this new feature and users can request friends. The Social Connector does not work with Office x64 bit versions and Microsoft suggests to use the 32 bit products on their official forums and support. Sync features for Windows Mobile phones like email, contacts and other integration will also not work with x64 versions of Office 2010. There is no information if the final releases coming up in a few days will patch this feature. To date, many features and integrations are missing from the x64 version of Office 2010.

Removed features

The following features are removed from Microsoft Office 2010.

Removed from the entire suite

    * Microsoft Office Document Imaging application
    * Microsoft Office Document Scanning application
    * Office Diagnostics tool
    * Support for MSXML version 5
    * Research and Reference pane for Internet Explorer

Features removed from Microsoft Word

    * Smart Tag auto-recognition
    * Person Name smart tag
    * AutoSummary feature
    * Support for Word Add-in Libraries (WLL)

Features removed from Microsoft Access

    * Access Calendar ActiveX control
    * Replication Conflict Viewer
    * Data access pages

Features removed from Microsoft Outlook

    * ANSI offline Outlook data files (.ost) for Exchange synchronization
    * Calendar rebasing tool
    * DAV connectivity for HTTP account types
    * Exchange 2000 connectivity
    * Exchange Message Security feature support
    * Postmarks

Features removed from Microsoft PowerPoint

    * Macro recorder
    * Save as Web Page feature

Features removed from Microsoft Publisher

    * The ability to create new Web Publications

Wednesday, September 8, 2010

Networking in a Nutshell

Networking is a powerful tool and an integral part of business and professional development. Some people are natural networkers, although many of us find ourselves avoiding events because we don't know how to take advantage of them.

It's not all hard work. With the right method it can be an enjoyable and rewarding experience. Here are some ideas which you can use to help you get the most out of your network.

What is networking?


As described in the Collins dictionary, a network is an interconnected group or system. Therefore networking is the process of using a network or interconnected group to your advantage.


Why network?


Networking gives you the opportunity to gain insights into other businesses and contacts, and increase your exposure. At a networking occasion you are presented with the opportunity to tap into a wealth of information and experience in one room. A great asset of networking is that you never know what treasure is around the corner.

If time allows for it become involved with a networking organisation. This will open up even more opportunities. Budget and time permitting, organise to be a guest speaker or a sponsor as this will greatly increase exposure for you and your business.

How to network


This is perhaps the most daunting part of the process. Follow these tips to make it easier:

1. Make sure you have enough business cards to hand out and make sure you swap cards; this one of the most important items you can take from the event.

2. Look professional and dress accordingly.

3. Set out objectives for the evening. Are you looking to build your contacts or are you after a certain type of contact? Try and hit your objectives early, then you can generally mingle and increase your exposure.


If you do not find it easy to start a conversation pick a couple of current news topics you can use.

5. Take a colleague or business associate if turning up to an event on your own seems tough. Alternatively it could be a good opportunity to take a new business contact.

6. Take a look around the room – if it's not a seated event look for opportunities to enter conversations.

7. Manage your time and don't get stuck in one conversation. The room is full of ideas, so use the time wisely. Have a general rule of 15 minutes per contact.

8. Remember that everyone is there to network, so the person you are speaking to is also after knowledge and contacts. Think about what you can provide them. Even though you might not get an immediate return you might see potential in the future for a returned favour.

9. Don't dismiss any opportunities – you never know where conversations might lead.


10. Set up future meetings at the event – it's much harder for people to reject you face-to-face.

What to do with the contacts


So, what happens to all those business cards? Firstly you need to categorise them. You can then enter them into an appropriate database which can be set up in Excel or Access. Your database should include information such as contact details, where you met the contact and any special interests or insights you might have gained during your conversation.

Make sure that all ideas are written down in your database and that actions are documented straight away. Networking is mentally and physically draining so notes will ensure the benefits are not lost.

You then need to work out what to do with them – do you have any immediate tasks?

Reaping the benefits


The most important part of networking is ensuring you are able to learn and grow from the experience. The more you gain the better. By setting up some tools you can make sure you don't miss any opportunities. Eventually what once seemed like the daunting process of networking becomes second nature and an important part of growing your business.

Are You Still Not Backing up Your Data?

Planning for a worst-case scenario isn't alarmist. It's common sense. By putting together a data back-up plan you can avoid a business catastrophe!



You should know this by now: Computers can and do fail. And nasty viruses can take down your system by creeping through your antivirus software

and firewall.

The problem is that you usually get no warning before it's too late.

This has happened to many. In extreme cases, it has put companies out of business. And the worst part is this: It's completely avoidable. By backing

up your data, you can retrieve all or most of what you lose.

Yes, there is a hassle involved. But you owe it to yourself — and your business — to take stock of your backup plan (or lack thereof) by reviewing

these tips.

Most Important: Back up Your Customer Databases and Payroll Records
What's the heart and soul of your company? People have different opinions, but certainly your customer or client database has to rank high.

Inside one or two data files are all the nitty-gritty details including what they buy, when they buy, how they pay and so forth. Contact lists also are

databases, and you might have yours combined with your customer list.


So, where would you be if you lost your database? How would you feel if you attempted to open your database and it wasn't there? Not good, I'll bet.

So you should be backing up.

Also mission-critical for backups are your employee payroll records. You don't want to lose the information that you have to report to the tax

department. Your employees don't want problems with them either. And they certainly don't want to be paid late.

Protect Your Registry Settings
You should be backing up all of your data. But if you don't, a third item you should have high on your priority list for regular backups is

your Windows Registry. This is the huge database that tells your computer how to run. Without it, you have an expensive paperweight.

Most backup programs allow you to back up the Registry automatically. If not, you can easily do it manually. Here's how:

• Click Start > Run.


• In the box, enter "regedit" (without the quotes). Click OK.

• In the Registry, click File > Export (or Registry > Export Registry File in Windows 98). Navigate to your backup medium. It will probably be drive

E:.

• Name the file and click Save.

You don't need to back up Windows or your applications, such as Microsoft Word. If the worst happens, you can always re-install them. But

information you create must be protected.

Store Your Backups Off-Site

To really be safe, the backup medium (tape, CD or DVD, etc.) should be removed from your site. If you are backing up to tape, for instance, and you

leave the tape cartridge in the machine, you'll be protected if the hard drive fails. But if the equipment is stolen, or the office burns to the ground, the

backup will be lost.

The safest procedure is to use a different tape or disk each day. Keep all but the current day's backups off-site — at your home, perhaps.

Forget About Doing Backups with Floppies
The earliest backup medium was the floppy. These are no longer practical. They hold hardly any data, so a large collection would be needed for a

backup. You would have to sit at the computer for hours, swapping the floppies in and out. Don't even think about it.

Tape has been the medium of choice for a number of years. Tapes are relatively slow, but the process can be automated. You can schedule the

backup for when you're sleeping.

Tape drives and the tapes to go with them are relatively expensive, too. And the software can be difficult. Tape is a great backup medium, once you

understand it. It has its drawbacks in terms of the time and work involved. But once you get a system running, it can go smoothly.

Here are some other options:

• Back up to a burner — a CD or DVD drive. Neither holds nearly as much data as a tape. If you decide to go this route, be sure your software allows

automated backups. A CD or DVD will work well if your data is not voluminous. CDs will hold up to 700 MB; most DVDs will hold 4.7 GB.

• Use a Zip or Jaz drive. These are made by Iomega. Zips hold 250 MB of data; Jaz holds 2 GB.


• Use an external hard drive. These hold a vast amount of data. They attach to the computer via high-speed connections such as USB 2.0 or FireWire.

Hard drives are fast, so the backup wouldn't take much time. But an external hard drive is relatively bulky, so you would get tired of taking it home.

Another Option to Consider: Backing up on an Internal Hard Drive
You could use a second internal hard drive, although that would mean leaving the backup in the office. Windows automatically accommodates multiple

hard drives. You could simply copy your data from the master hard drive to the second one, known as a slave.

If having two hard drives appeals to you, consider a RAID system. RAID stands for Redundant Array of Inexpensive Disks. These systems can be

complicated but a two-disk system is simple; you set it up as a mirror.

When you save something, it automatically saves to both drives. The second drive looks just like the first. So if one fails, you have a perfect copy. And

RAID will automatically switch you over to the working drive.

Some motherboards have RAID capability built in. If yours doesn't, a RAID card can be added to the computer.

However, a RAID system would leave your backup inside the computer. That leaves you vulnerable to fire or theft.

Need More Security? Consider an Online Backup Service
If you're especially concerned about safety, you might want to consider an Internet backup. There are many firms on the web that will store your data

for you, for a monthly fee. You can run the backup automatically.


Don't consider this route unless you have a high-speed internet connection. Backups by dial-up modem could tie up your phone lines for hours at a

time.

Also, Microsoft SharePoint offers the ability to store copies of your most-vital business documents in a secure area that you can access through the

Internet. SharePoint is available as part of Windows Server 2003.

Clear Computer History and Clear Browser History Tools

Whether you use your PC as a personal hub for online chatting, gaming, or writing your daily journal or whether you use your PC as a professional workstation for internet banking, online meetings with clients, daily scheduling and diary planning, your information is at risk. Whatever you use your PC for, you will, at least once a day, use your personal information, like your social security number, date of birth, home address and the like. If you are connected to the internet, hackers from all around the world have access to your personal files and information. Stop hackers in their tracks and install internet eraser software.

It is one thing for a family member to go through your personal files without your permission, but it is an entirely different thing when someone you do not know takes over you life with that same information. Identity hijacking is a growing business these days, and it is good for everyone to know that a huge percent of the information that these hijackers use come from the victims own personal computer. It is in your best interest to get and install good internet eraser software on your PC. This will make a huge difference in your life and will keep your information and the information of your family members safe and private, like it was meant to be.

Internet eraser software is a new state of the art security system for your PC. It works without you even knowing, it is protecting you every second of the day, while you are working on your computer. Whenever you type a word or letter on your keyboard your computer saves the information into a hidden directory. A directory that might be hidden to you, but if you know what you are looking for, like those hackers out there, you will find anything. Your information is not safe on your hard drive, and internet eraser software knows that. This is why it works covert, deleting all your personal information, which you don’t save on your hard drive, while you are working.

A lot of the newer internet eraser software comes with built in shredder device, so you can choose to totally destroy highly confidential records if you so wish. The shredder device was added to the internet eraser software because deleting is just not good enough, as your hard drive stores information under other information, which makes it retrievable to outside influences. You also get features like the cookie manager, stealth mode, scheduling and hot keys, so you can do everything you need to do with one click of a button. Start protecting your family today and install this state of the art software.

Clear Address Bar and Erase Address Bar Tools

With the growing amount of internet hackers popping up all over the world, it is getting much harder to keep your private life private, especially over the internet. It is one thing storing information on your computer and having a family member disrupt your privacy, but it is something totally different when you find out that someone you don’t know took over your identity. Protecting your privacy has just gotten a whole lot easier with the help of a new breed of software, named Internet eraser software. Internet eraser software is coming up in bundles all of the world, a bit like the hackers, only this specially made software is here to help you and will keep you and your family safe.

You might use your PC and the internet for working purposes, or might use the internet for banking, or studying, or chatting, or viewing certain web sites. The truth is that most of the sites you log into nowadays need personal passwords, especially your internet banking site, some sites need your social security number, date of birth, place of residence and things like that. What is really scary is that all the information you enter on your keyboard gets stored in files on your computer and if a hacker knows what he or she is doing, they can get all your information from those files, without you knowing anything. This is where internet eraser software comes handy.

This state of the art software can be preconfigured to erase any information instantly, as soon as it is used, so there is no trace of private information on your computer after you are done using it and there is no need to remember to delete your private information, as it is all automatic. Most internet eraser software also has options, which allow the user to manually erase information recorded or stored in the computer. So with this feature you can permanently delete unwanted files such as erase cache folder, clear history of the tracks of site visited from your computer.

Most internet eraser software also comes with a built in shredder feature, which has been a very popular feature because it allows you to instantly shred all unwanted files that you can’t leave lying around on your hard drive. When you delete a file from your hard drive that file is still available on your hard drive, only it is covered by other files, but it can be retrieved with the right internet eraser software. The shredder feature on the internet eraser software gets rid of the file to the point where it is virtually impossible to retrieve.

Some other internet eraser software sports features like stealth mode, cookie manager, scheduling and emergency key, which gives you everything you need in one small, easy to use package. So don’t run the risk of getting your identity stolen from under your nose, get internet eraser software and keep your identity a secret. You have everything to lose if you don’t act now.

Privacy Eraser and Disk Cleaner Tools

Are you always looking to protect your family? Will you do anything to keep them safe and secure their future, giving them everything they need? Well, this sounds like most parents, but even if you are single you would still hate to wake up one day and find all of your money gone, wouldn’t you? Don’t get robbed, get internet eraser software.

That’s right! We are not talking about the physical world, but rather the cyber world. Everything you do nowadays is done online. Bank queues are far too long, so online banking came about to provide convenience for customers. It also provided convenience for internet hackers. Internet eraser software makes sure that your passwords and codes used for private sites or any financial institution are not able to be used by anyone else.

How internet eraser software works is simple. Most people don’t realize that every little bit of information typed into your computer is secretly stored even when you delete the original files. This very important information that is only for your eyes can be found by those looking to steal money from you or infect your computer. With good internet eraser software you will not need to worry anymore.

There are many features to protect your system and your information. The internet eraser software will delete your search engine history from your computer permanently, as well as the cookies you choose which will make sure that passwords are not remembered. Your internet browser cache, history, address bar history, duplicate files, and junk files will all be erased. You can also delete the history of your Media Player and your Real Time Player. Most internet eraser software’s also supports Internet Explorer, Opera, Firefox, and Netscape and it deletes any porn sites history too.

Internet eraser software is also perfect for an office, where many computers all have people downloading and using different important passwords and usernames. Internet cleaner software will make sure that your computer systems are kept clean and free from the reach of hackers.

Make sure you have an internet software tool on your PC to ensure that your computer and your family are safe as well as your personal and private details. Now you can do internet banking easily and with confidence and pay for items securely online. However, before downloading any internet eraser software, spend a little time to compare several internet eraser software programs and download the best one which comes with many added features.

Porn Removal and Porn Remover Tools

The internet brings with it many advantages and disadvantages. The main advantage is that you can do lots of work sitting in the comfort of your home, without having to roam from office to office. Insurance, finance, purchase of products, pursuing an education, playing at casinos and many other things can be done at home with the help of the internet. However though there are many advantages, the internet poses numerous disadvantages too.

The main disadvantage of the internet is that the sites that you visit while browsing through the internet tend to get downloaded in secret files of the computer. With this, without your actually knowing about it, you may have some illicit images and information stored in the computer. Unauthorized people may gain access to information not meant for their eyes.

There is a remedy for this problem; make it a point to download some software in the computer where your privacy, job, family and business are protected. With the help of this internet eraser software in the computer, you can be sure that unwanted images and information does not get recorded or stored in the computer. In addition to all this, the internet eraser software helps delete unwanted files permanently with the help of its shredder feature. The reason the files get shredded with this internet eraser software is that it is not enough just deleting files. There are numerous tools in the internet which can retrieve deleted files.

This internet eraser software also helps you clear your search history for Google and Yahoo toolbar search history. It also helps clear the browser search bar history, With this, sites which had been visited will not be accessible to others.

A very important files users may not know much about is a file that stored secretly in the computer called Index.Dat files, these files store and record all your internet surfing history, what is more frustrating is that these files are hidden and can’t be located, and are difficult to delete manually. With the help of the Internet eraser software, it is possible to clear the content of these files to protect your privacy and security.

When surfing the internet, all the URLs that you visit are stored in a cache folder. So when you want to erase this cache folder from the computer, it can be done easily through the internet eraser software. Many people tend to clear history of the tracks of the sites visited clearing the browser history. However, while doing so, the files get hidden, and can be deleted only by using internet eraser software. The internet eraser software can erase all encrypted information found in the computer through internet surfing.