Tag: computing tips

Windows 10 Tiles not functioning? You may have to restart Explorer

Article

Windows 10 Start Menu

If you are seeing blank tiles in this view, you may have to restart Windows Explorer

Windows 10 Tip: Fixing Live Tile Counts and Blank Tiles | Supersite For Windows

My Comments

If you are running Windows 10 and are enamoured by the “tiled interface” that is part of its Start Menu or Tablet Mode view, there are times where you may find it not working “up to scratch”.

With this interface, you may find that the Live Tiles that are regularly updated simply go blank or are stagnant. The normal response to this situation would be to restart your computer, which would then fix the problem.

Task Manager with Windows Explorer called out

The Windows Explorer process in Task Manager

On the other hand, you may only need to restart the Explorer process to fix this problem without the need to reboot your computer. This can also apply to other user-interface abnormalities.

Here, you run Task Manager by either right-clicking the Taskbar or holding your finger on the Taskbar in the case of a tablet or 2-in-1, then clicking Task Manager, or pressing Ctrl-Shift-ESC together on the keyboard. Then you find Windows Explorer in the list of processes. Right-click this item and click Restart and it won’t take long for it to come good.

Task Manager - Context menu with Restart called out

Click the Restart option on the context menu to restart Windows Explorer

At this point, the Windows Explorer process will recover and update the tiles including reloading the data that populates the tiles from its source rather than working of corrupted data.

Give your Windows 10 Mobile smartphone a unique name

Article

Nokia Lumia 950 press image courtesy of Microsoft

Nokia Lumia 950 – representative of Windows 10 Mobile – you can give it a distinct name

How to rename your Windows 10 Mobile handset | Windows Central

My Comments

Most desktop and mobile operating systems allow you to name your computing device so it is logically identifiable from others of the same platform.

This is important with identifying devices that are or to be connected on a Wi-Fi or Bluetooth network or dealing with applications and games that only identify participants by device name. It is also about managing your devices’ access to cloud services including social networks

This was available on Windows Phone but was so well hidden that most Windows Phone users didn’t know it existed. It is because, unlike other operating systems, Windows Phone didn’t ask you to name your device as part of the setup process.

But there are two ways to go about this.

Using your Windows Phone’s control surface

To change:

  1. Tap Start then All Apps, then tap Settings
  2. Tap on System
  3. Tap About, which brings up details about your device
  4. Tap “Edit Name” which allows you to change your device’s name
  5. Enter your phone’s new name in Device Name field and tap Save

To verify

  1. Tap Start then All Apps then tap Settings
  2. Tap on System
  3. Tap About which brings up details about your device including its new name

Your Windows phone tethered to your Windows computer

Prerequisites: USB data transfer cable that suits your Windows Phone and regular Windows computer

This process is similar to giving removeable storage like a USB memory key, SD card or optical disk a volume name which identifies it.

To change

  1. Connect your Windows Phone to computer using a USB data transfer cable and let Windows detect the phone.
  2. Open File Explorer (Windows Explorer)
  3. Discover your phone under Devices and Drives. This is alongside your computer’s hard disk and other storage devices connected directly to your computer and your phone’s icon should be there.
  4. Right-click your phone’s icon and select Rename
  5. Rename as if you are renaming a USB memory key, then press Enter

To verify

Disconnect and reconnect the Windows phone to verify the change is applied and double check in File Explorer

Setting up a “his-and-hers” computing environment

Sony VAIO Fit 15e on dining table

A large laptop that is commonly used in a “his-and-hers” computing environment

A common situation that I face when providing IT support for couples, families and similar households is providing a level of individual operation for each user who uses shared computer equipment. A typical situation is a couple who have desktop, laptop or tablet computers that they share with each other or a family who maintains the “family” computer that is used also by the children.

On the other hand, you may make sure each of you have your own computing devices that are set up with your own operating environments. This is more so with tablets or other ultra-portable computer equipment where you want to effectively “take it with you”.

But there is a goal where each person may want to “keep their space their space”. That is to have their preferred operating environment with their preferred user-interface customisations (wallpaper, button styling, etc), preferred email client, preferred Web bookmarks and other parameters maintained while they operate the equipment. As well, they may want to keep their communications with their social community private or prevent confusion with your communications. This is even though both or all of you will have the same relatives and friends that you maintain regular contact with.

Most of you may operate on a trust-based environment where you will want to know the passwords to each other’s accounts simply as a symbol of “our love for each other has nothing to hide”. This may not be applicable for those of you who are running or working in a business where confidentiality concerning business data is so important.

How do computer operating environments handle this?

Regular computers

Create multiple Microsoft.com accounts on your Windows 8 computer to achieve a unique user experience across all of your Windows 8 computers

Create multiple Microsoft.com accounts on your Windows 8 computer to achieve a unique user experience across all of your Windows 8 computers

Most “regular-computer” operating environments such as Windows, MacOS X and Linux allow multiple individual accounts to be created. These accounts support their own username and password and allow the computer to open up to a desktop environment that is personalised for each of the users. You even have concepts like separate user folders, desktop wallpapers and themes, or, in some cases, email clients that are peculiar to each user.

This functionality has been baked in to the “regular-computer” operating environment due to the fact that these machines are used by different employees in the workplace or are used to work with data that is confidential to a particular user.

Lenovo Yoga 2 Pro convertible notebook at Phamish St Kilda

Copy your Windows 8 user experience to that secondary convertible Ultrabook

Windows 8 and newer versions of the Windows operating system even takes this further by allowing you to create a Microsoft.com login account that you can take between different computers. Here, this allows you to use the same user credentials which will lead you to your same user environment on the different computers. For example, you could share use of different computer types such as a 15” mainstream laptop or an all-in-one desktop that lives at home and an Ultrabook or detachable tablet that you use while travelling or maintain as an “around the house” computer for example.

Last but not least Google implemented multiple-account operation on the ChromeOS platform which then adds most of the cheap Chromebooks to the list of devices that can support “his and hers” computing. This is through a blind update (version 37.0.2062.119) that should be in your Chromebook by 6 September 2014.

Mobile computing devices (tablets)

The tablet, typically the 10” tablet like the Apple iPad, is very much the only device that runs any mobile operating environment which ends up being shared by a couple or family.

Recent iterations of Android installed on tablets can support this kind of operation. This has been introduced to support “privileged operation environments” in the workplace. The same also holds true for tablets that are powered with the Windows 8 operating system.

The only tablet device that doesn’t support a true “his-and-hers” environment is the Apple iPad. This is bound to one Apple ID account, which affects use of the iTunes Store, the App Store and other Apple-provided apps and services. The passcode on these devices doesn’t even provide separate or unique login environments on these devices.

Email, Social Networks and Instant Messaging

Windows Live Mail client-based email interface

Windows Live Mail – an example of a client-based email interface

If these services are operated via a Web-based user interface, they can support “his-and-hers” operation as long as each user logs out of their account at the end of each session. This is more critical if both of you use the same provider.

Some client-side environments like email clients may allow you to have different sets of account credentials tied to particular system user accounts. But some other clients like a few mobile-platform or entry-level desktop clients or most social-network clients won’t allow you to keep service login parameters peculiar to a system user account. Here, you may have to log out of your account at the end of each session. As well, some client-side email programs may maintain only one address book or contact list that is available to all users.

Log out properly of Facebook by clicking "Log Out" in Settings

Log out properly of Facebook by clicking “Log Out” in Settings

On the other hand, you may be able to preserve separate email or social-network accounts by using a separate client-side program for each login. This may limit your ability to use application-driven functionality like “share this via email”. On the other hand, you could always have a practice of each user logging in to the client with their credentials for the duration of their session.

Cloud-based online storage

Most “cloud-based” online storage services like Dropbox can support different logins for each user and you can tie these different logins to a particular device-based login for most regular-computing platforms like Windows. But you can’t have two different service logins associated with one computer login unless you use premium or “business” variants of their services.

But you can create a “household” folder in these services which is shared by all of you, simply by having one account-holder create a folder and invite the other account-holders to have full access rights to that folder. The only limitation with this is that if a friend or relative outside the household wants to share resources with all of the household, they have to invite each Dropbox account to the folder they want to share.

App Stores and gaming league tables

Some operating environments like the Apple MacOS and iOS environments implement a “family-share” option for software bought through their app stores so that you can share the same content that you have purchased across multiple accounts. These features place a limit on the number of accounts you can share with, typically a number you can count on one hand.

Otherwise each user has to purchase their own content through the storefronts and only be able to use it themselves.

Operating environments that have their own gaming-league or similar functionality will typically bind your identity in that league to your user ID that is part of that operating environment.

NAS units

WD MyCloud EX2 dual-disk NAS

NAS units like the WD MyCloud EX2 can work well in a “his-and-hers” computing environment

You can create individual storage accounts on your network-attached storage to allow each member of your household to store their data on their own space in the network-attached-storage unit. Here, you also use the “public” spaces on the NAS to store and share data that is of common interest but doesn’t have a perceived disclosure risk like your file-based AV collection or, if the data is confidential to you both, you could create a private share that you grant the other accounts access to.

The multiple account feature would tie in well with the remote-access or “cloud” features that an increasing number of NAS units like the WD MyCloud EX2 are equipped with. This will maintain the “private data pools” and allow the remote access to these resources.

Some of you may want to use two or three different NAS units connected to the network so you can keep individual units as personal data stores, which may be of importance if each of you run your own enterprise or you want to set up a NAS for the teenager or young adult about to leave the “family nest”.

What can you do to achieve “his-and-hers” computing

Some of you may decide to have a one or more smaller devices that you personally use, like iPads or work-home computers but you may then have to identify devices that you want to operate on a shared basis like larger tablets, laptops or desktops. Here, you can set these up with separate accounts so you can have a unique operation experience for each of you.

If you have equipment that runs Windows 8 or newer variants of that operating system, you could then set up personal Microsoft.com accounts for each of you and use these to log in to your equipment, personalising the operating environment as you see fit. As well, if you are using programs that don’t “switch users” as you change accounts or can’t “switch users” with a program, get in to the habit of logging out when you have finished.

When managing your contacts, you may have to copy your “common” contacts between each others’ contact lists on your email and other messaging clients and keep these up-to-date as each contact changes their details.

Conclusion

Once you know how to set up a “his-and-hers” computing environment, you can be sure that you have the ability to share devices yet know how to keep your working environments “as you like it”.

Tips to avoid those mistakes that can easily happen with tablet and ultraportable computers in the living room

As the small computer form factors such as the tablets and ultraportables (Ultrabooks, etc) become popular, there is room to make mistakes with using them in the living room. This environment is where you are most likely to be when you are tired and wanting to relax and, in a lot of cases, you may be having a bit to drink.

These mistakes can end up with your equipment being out of action for a significant amount of time and could, at worst, cause irreparable damage. It is although the manufacturers are understanding the realities associated with the portable equipment and are making it more rugged.

Avoiding the risk of that device being sat on

A similarly-coloured iPad can be at risk of being sat on when on the couch

A similarly-coloured iPad can be at risk of being sat on when on the couch

For example, you could be using that iPad while lounging on the couch and you need to get up to visit the kitchen or bathroom or answer the door. Then you put that iPad on the couch as you get up. This can be a risky move for the device if one hasn’t got their eyes peeled for these devices.

In the living room, this can easily happen with most of us when we are tired or have had a bit too much to drink. It can be exacerbated with devices that have sleeves, wraps or other accessories that could blend in easily with the scatter cushions and other upholstery that exists at your house. Then you could end up easily sitting on that iPad that is on the couch as you find somewhere comfortable to sit and this can cause damage to that device.

A good idea to avoid this situation would be to place the portable computing device on the coffee table or side table when you want to get up from that chair or sofa. Personally, I would make this easier by having side tables that have enough room to rest at least one 10” tablet like an iPad or avoiding the temptation to forego the coffee table or similar tables in the name of minimalist living.

The book-style cover offers extra protection for tablets in the living room

As well, the covers that you can get for the iPad and other tablet computers that open and close like a book also work well in keeping spilt drinks from damaging these computers and are a must when you use them in the lounge room. Here, you simply close these covers when you put the computer on that table.

Similarly, decorating the accessory covers or the backs of the tablet or ultraportable computer devices in an individual manner can allow one to make a device easily identifiable from the others especially when there are many of these in a common area. I would find this more important with popular devices like the iPad which use a consistent style and interface and also find this important where a particular brand or model of this device is favoured by most of your family or friends. I made a reference to this practice when I reviewed the Toshiba Satellite L730 which was available in white.

Reducing the risk of drinks being spilt in to that ultraportable computer

As well, ultraportable notebook computers can be at risk of drinks being spilt in to them when they are left open on the coffee table. This is more so with drinks that are in tall containers like bottles, tumblers or wine glasses.

Here, a good practice would be to close up these computers when they are not in use there. In the case of the detachable-keyboard “hybrid” convertible, these computers could be assembled before you close them up to keep drinks out of them.

Further on, a laptop wrap may also work wonders in protecting these computers from being damaged by drink spillage on the coffee table.

Avoiding the romantic candlelight mistake when using notebook computers

Candles and portable computers - a bad mix

Candles and portable computers – a bad mix

As for laptops, notebooks and similar computers, the area behind the screen can be a death trap for these computers when it comes to using those candles to set up that romantic environment. This is a greater risk with wide candles including tea-lights rather than the tall “taper-style” candles that are typically used with a candlestick and the risk is greatly exacerbated when you swing the laptop lid outwards.

This was highlighted by an incident that happened with some close friends where the husband was downloading pictures from a digital camera on to his laptop and his wife, who just so loves that romantic candlelit look, set up some candles at his work table. There happened to be a small candle just behind the computer in the blind space behind the screen and this scorched the display unit in that computer.

The blind spot that exists behind a laptop and is risky when it comes to candles

The blind spot that exists behind a laptop and is risky when it comes to candles

In these situations, check that there are no candles behind the computer before you open it up and keep an eye on those candles that are on your work table. Especially pay attention to the blind spot behind your computer and make sure any candles in that area are fully visible.

It may be better to make sure that if you want to set up those candles around the laptop, that any lit candles stay on the side of the computer or towards the centre of the dining table.

Conclusion

By reading this, you can avoid placing your equipment at risk of damage when you use it in that lounge area whether you are working or relaxing.

Don’t forget that the Browser Choice Screen is your one-stop Web browser port-of-call

Previous Coverage – HomeNetworking01.info

Understanding The Browser Choice Screen (EN, FR)

Web site

Browser Choice Screen – http://browserchoice.eu

My Comments

Previously, I have covered the Browser Choice Screen, which was par of Microsoft’s anti-trust settlement with the European Commission concerning Internet Explorer. This was to be for consumer and small-business Windows setups in the European Union where people were to be offered a choice of Web browser for their operating environment.

But I still see this menu Web page as a “one-stop” port-of-call for people anywhere in the world who want to install new Web browsers or repair a damaged Web-browser installation. This resource came in handy when I was repairing a houseguest’s computer that was damaged by a “system-repair” Trojan Horse. Here, I could know where to go to collect the installation files for the Firefox Web browser that I was to repair so I can restore their Web environment.

If you are creating a system-repair toolkit on a USB memory key, you may visit this resource to download installation packages for the Web browsers to that memory key. Or you can create a shortcut file to this site and store it on the memory key b