Tag: operating system issues

Windows 10 answers the problem of system sounds playing through that good sound sound system

This arrangement documented here will work with Windows 10 computers running the April Update (Build 1803) version of that operating system or newer versions.

I have just applied the latest feature update to my Windows 10 installation on my regular computer and it has come across with a feature that most of you will want to benefit from when you use your computer to play audio or video content.

This feature update called Windows 10 April Update or formerly Windows 10 Spring Update (Build number 1803 in the System dialog) implements the ability to determine which sound device a program uses. Some Win32 (traditionally-developed) programs, namely well-bred media editing and management programs or VoIP programs have the ability for a user to determine which sound device they want that program to use. But the Web browsers, along with Spotify or TuneIn Radio and most of the Microsoft Store apps don’t offer this ability.

HP Elitebook 2560p playing through Naim DAC-V1 USB DAC

Windows 10 April Update allows the speakers in this USB-based audio setup to play only the music while the audio alerts play through the laptop’s integrated speakers

This means that you could set things up so that the system sounds like that Windows error “ding” or the email alert sound don’t blast through the good sound system but play through the cheaper speaker setup like your laptop’s speakers. It is while Spotify or that other audio program plays through the good speakers or hi-fi system. Similarly, you may want that YouTube video or the game you are playing to have its sound come through your big TV’s speaker but don’t like the idea of the Windows audio prompts being a distraction by barging through those speakers.

Praise and worship at church

You can set things up so that the playout computer doesn’t play Windows audio alert sounds through PA systems like this church’s setup

This feature will be essential for those of you who use your computer with a PA system as an audio/video playout device and end up using baseline software that doesn’t offer the ability to manage the audio devices the software plays through. Here, you avoid having those PA speakers “magnifying” the audio prompts that Windows makes when a dialogue box pops up or new email comes in. Similarly, you could then have one audio-output device like headphones or low-powered speakers serve as a “cue” device that you use to verify or line-up the content you want to

Sound devices that you can send an app’s sound output through

play before you have it playing through the main speakers.

How do you go about this?

You would need to make sure that your computer is running with another sound device that is attached to the good sound system. This could be a separate sound card, USB sound module or DAC, or a Bluetooth audio adaptor. If you have the computer connected to a sound system equipped with Bluetooth, USB or similar audio functionality, you have effectively set up the secondary sound device. It also applies if you have connected it to the big TV or home-theatre setup using an HDMI cable.

Identifying the sound devices

Then you identify the two different sound devices – the one that you want as your “primary” device for monitoring audio prompts that Windows provides and the “secondary” one you want your multimedia content to play through.

The sound functionality that is built in to a laptop computer or a desktop computer’s motherboard will typically be represented by something like a Realtek, Intel HD Audio or similar chipset name. In most cases, this integrated-sound chipset serve the internal speakers in a laptop or a pair of cheap computer speakers connected to the audio sockets on a desktop computer’s motherboard.

Sony STR-DN1060 home theatre receiver press picture courtesy of Sony America

If you connect your computer to your monitor or TV through one of these home-theatre receivers using the HDMI connections on these sets, you will be using the separate HDMI audio subsystem facilitated by your computer’s graphics infrastructure for the sound that comes through the receiver

Display setups connected to your computer via HDMI or DisplayPort that have audio abilities will have those abilities seen as an audio function of the display infrastructure. Some of these cases like Intel integrated graphics chips will properly refer to the arrangement as “display audio” or “HDMI display audio” due to the function being separate from the computer’s main sound chipset. This arrangement also holds true if you are connecting HDMI audio devices like soundbars, HDMI audio adaptors and home-theatre receivers between your computer and your display using the HDMI cable.

Let’s not forget that USB or Bluetooth devices that use the Windows audio-device class drivers will still identify themselves by their device or chipset make and model. This is to avoid confusion that can exist if you connect multiple USB or Bluetooth audio devices to the same host computer.

Configuring your setup

Go to Settings (the gear icon in your Start menu) and click on the System option. Then click on the Sound menu on the left of the System menu page. Make sure the current sound device is the primary one that will drive your laptop, monitor or other cheaper speakers. Then click on “App volume and device preferences” to bring up the menu to determine which speakers Spotify or your other multimedia app will use.

If you added a new audio output device to your computer, Windows will automatically assume it is the default audio device. Here, if you want this device to be the secondary device, you would have to use the above-mentioned Settings – Sound panel to select the primary sound device to be the default device.

In my setup, I used my LG monitor which has an HDMI link and built-in speakers but yields laptop-quality sound as the primary sound device while a Motorola Bluetooth audio adaptor connected to an older boombox serves as the secondary sound device. Because I am using a traditional desktop PC, the Bluetooth link is facilitated through a USB Bluetooth modem.

Windows - System - Sound menu for app-based audio device selection

Spotify set up to play

Next to the app you wish to direct the sound output for, click on the drop-down box in the Output column. At the moment, this will say “Default”, but use this to select the output device you want to have the app come through such as the USB DAC or Bluetooth speaker.

Here, I tested the setup with a Win32 app in the form of the Windows Media Player and it does work properly even though that program provides the ability for users to determine the sound output device that they use. Then I tried it with a UWP (Microsoft Store) app in the form of Spotify’s Windows 10 port and this worked reliably. Subsequently, I also found that this setup worked with Google Chrome when playing a YouTube video. Through these tests, I made sure that the Windows sounds were playing through the primary speakers.

You may have to run totally different browsers if you want the sound from one Webpage to pass through one device while the sound from another Webpage passes through another. This can be of concern if, for example, you are running a YouTube playlist or something similar as background music while you are playing a Web-based social-media game.

Going back to normal operation

To get back to your normal settings, click the “Reset” button in the “App volume and device preferences” window to have all the sound sources work through your default devices.

You may find that some media content may stop if you switch audio devices while it is running. If you do use this ability to maintain a “cue” device and a “main” or “front-of-house” device for playout purposes, you will have to pause the media file before you switch audio devices or simply restart the media content after you switch.

Other abilities

There is the ability to determine which input device an app uses which can be good for Web-based, Microsoft Store or similar apps that don’t provide an option for you to choose which microphone device you are to use. This can come in handy if you want to use a more accurate microphone with Cortana, courseware apps or baseline notetaking apps rather than your 2-in-1’s built-in microphone.

In this case, you choose the Input device you want to use for each program or Web browser rather than choosing the Output device.

What improvements could be provided

This feature could be taken further through the use of a “Default Multimedia Audio Device” definition that is expressly used for media-player software and/or a “Default Game Audio Device” definition used for games.This could then allow a user to have an audio device work as the one to use for multimedia or gaming purposes while another is used for the system sounds. It can then lead to the ability to create an “audio device ladder” for each audio device class where connection of certain audio devices like headphones, HDMI-equipped TVs or USB DACs overrides other audio devices in a particular order.

Another issue that will crop up with this new ability that Windows 10 April Update provides is sending different audio content to different “jacks” served by the same audio infrastructure. It may come about through cheaper computer designs that only have one audio chipset for HDMI, internal-speaker and audio-jack output rather than allowing for a separate audio function that is part of a graphics infrastructure to support HDMI digital audio.

Conclusion

Now you are able to make sure that your Windows computer’s multimedia software can play through the speakers that would suit it best without having the various audio prompts that the Windows shell or office software creates blasting their way through those speakers.

Controlling Wi-Fi and Bluetooth on your iOS 11 device

Articles

If you can’t manage your iOS 11 device’s WiFi or Bluetooth from the Control Center, you may have to go to the Settings App.

iOS Control Centre’s Wireless Toggles Don’t Turn Off Wireless Radios | Lifehacker Australia

My Comments

Apple has just rolled out iOS 11 as an update for your iPhone’s or iPad’s operating system and, as expected with “.0” versions of operating systems’ major functionality updates, there will be a few bugs and issues here and there. This is typically due to Apple, like other software vendors, rushing the major-functionality version of the software out the door to satisfy the vendor’s marketing team’s needs. In this case, the goal here is to get the new iPhone X and new iPhone 8 range, which will be loaded with this operating-system version, ready to sell to the crowds queueing outside the Apple stores and mobile phone retailers on the day they are released i.e. 22 September for the iPhone 8 and 8 Plus, and 3 November for the iPhone X.

One of these is the inability to manage Wi-Fi and Bluetooth from the Control Center on your iOS device even though the buttons do exist there to enable and disable this function. Here, you may want to disable one or both of these functions for your privacy when in the vicinity of Wi-Fi networks you don’t trust, to save battery runtime when you are not connected to a Bluetooth peripheral or a Wi-Fi network or simply as part of troubleshooting a Wi-Fi network or Bluetooth peripheral connection.

The symptom shows up in the form where pressing the Wi-Fi or Bluetooth icons in the Control Center has no effect on the Wi-Fi or Bluetooth functionality. But you can work around this by going to the Settings app on your iOS device. Then you tap on WiFi or Bluetooth to select the appropriate function you want to control.

Disable the appropriate function by sliding the switch to the Off position whereupon you will see no references to Bluetooth or Wi-Fi activity and the green marker will disappear. Or enable the appropriate function by sliding the switch to the On position where you will see the green marker appear and references to the Bluetooth or Wi-Fi activity appear.

Of course, keep an eye on the Settings app for newer “point-release” versions of the iOS operating system and update your iOS device with these newer versions as they arrive. Here, these versions will typically rectify bugs, security exploits or weaknesses that become knowledge to Apple.

Making sure your business laptop’s fingerprint reader works with Windows 10

Fujitsu Lifebook S-Series SH771 ultraportable

You may have a problem with the fingerprint readers on these business laptops after you upgrade the operating system to Windows 10

Those of you who had purchased a business laptop equipped with a fingerprint reader may find that this feature doesn’t work with Windows 10. The situation can be very difficult if you had participated in the Windows 10 free-upgrade program that happened from 2015 to 2016 and you may have foregone the use of this security feature after that upgrade.

What can you do?

Remove the existing fingerprint-authentication software from the laptop

Use the Windows 10 Add/Remove Programs option to remove the fingerprint-reader software that the manufacturer supplied with your laptop computer. It may also mean that you have to remove the password vault program that came with your laptop computer and you were using to keep your Website passwords with.

The reality is that some of the business laptops came with software installations where a third-party fingerprint-management program was part of the package. This may be due to the fingerprint reader not having driver software that could work directly with Windows at the time the machine was released or the program offering more “enterprise-friendly” features than what Windows and a baseline password vault could offer for the business laptop’s user class.

If you still value the feature set provided by the fingerprint-management program or depend on its compatibility with certain other management software, it may be a good idea to look for and download the latest versions of that software.

Update the fingerprint-reader’s driver software

HP Elitebook 2560p business notebook fingerprint reader

The fingerprint reader on this HP Elitebook may be able to run the same driver software as one installed on some Lenovo ThinkPads

You would then have to update your fingerprint reader’s driver software to the latest version that can work with Windows 10. This is because the newer driver software takes advantage of the application programming interfaces associated with Windows 10’s Hello authentication mechanism.

Some laptops may require you to update their software relating to their BIOS / firmware and chipset before you progress any further. This is a process you would have to do from your laptop manufacturer’s support Website.

One way would be to open Device Manager in Windows 10 and identify then select the fingerprint reader’s entry in the device list. This will be listed under the Biometric Devices class of devices. Right-click that device and choose “Properties”. Click the “Driver” tab and select the “Update Driver” option to make sure it is up-to-date.

Or you could visit your laptop manufacturer’s support Website and download the latest version of the fingerprint reader’s driver software. Then you install that software, whereupon you may have to reboot your computer as part on the install process.

Sometimes a particular laptop manufacturer may not have the updated driver for the fingerprint reader that is integrated in to their business laptop. Here, you may have to do a Google search for details regarding the make and model of your business laptop and how to enable that machine’s fingerprint reader in Windows 10. This is because a particular fingerprint-reader subsystem may be used by two or more manufacturers in their product lines during a particular point in time. For example, the Lenovo website hosts the Validity Fingerprint Common Driver for Windows 10 which has been found to support most of the fingerprint scanners integrated in HP business laptops like the Elitebook 2560p.

On the other hand, you may find that the latest version of the driver software that they host is the Windows 8.1 version. Here, you can get by with this version for your Windows 10 computer thanks to the use of similar APIs.

Set your laptop up for Windows 10 Hello authentication

The next step will be to set up for Windows 10 Hello – the authentication framework that Windows 10 uses for advanced authentication methods like biometric authentication.

Here, you go to SettingsAccountSign In Options. Then you will have to create a PIN number, which is what you use when you log in to your machine. If you log in to Windows using your Microsoft Account credentials, you will need to create a PIN number, which will become a machine-specific alternative credential.

There will be an option to sign in with your fingerprint which will be enabled thanks to the newer drivers that you installed. Click on that button to sign in with the previously-mentioned PIN if you have created that or to create a new PIN number, before you enrol your fingerprints as your sign-in credentials.

If you still want to “swipe in” to your favourite Websites with your finger, you would need to acquire the latest version of the password manager that came with your computer like HP SimplePass, Softex OmniPass or a similarly-competent password vault that uses fingerprint recognition out of the box.

Conclusion

What this means now is that you don’t have to see the fingerprint scanner on your business laptop computer as being redundant just because you have upgraded your computer to Windows 10.

Assistance Journal–Dealing with a laptop’s Wi-Fi that failed after a Windows 10 upgrade

Lenovo Yoga 2 Pro convertible notebook at Phamish St Kilda

If you find that your computer doesn’t work as it should after an operating-system upgrade, check for newer device drivers from the system’s manufacturer

I had become part of a “men’s shed” community which encourages men to get together and engage in meaningful activities while being a chance for them to open up to each other easily. Here, it became a point where I could “put my skills on the table” and one of the men came to me about an underperforming laptop.

After I had gone through and removed some bloatware and updated the display-card driver on that laptop, the man approached me about this same notebook not connecting to his home network’s Wi-Fi segment since he upgraded it to Windows 10 as part of Microsoft’s free-upgrade program. I had noticed that it could connect to other Wi-Fi networks including the community’s own Wi-Fi network but he mentioned that it wouldn’t list his home network’s ESSID at all.

Subsequently I came around to his home to see the problem for myself and noticed that my Android phone could see the home network’s SSID but not this laptop. I used Windows Device Manager, part of the Windows operating system, to identify what kind of Wi-Fi adaptor was being used in that laptop and had previously researched this problem as something that could be driver-related.

Windows 10 Device Manager

Device Manager – a catalogue of all of the hardware in your computer

After that, I had hunted down a newer device driver for the Wi-Fi adaptor from the computer manufacturer’s Website and downloaded it to the computer. Then I ran the updated driver’s installation program and, after this update was performed and the computer restarted, Windows 10 properly listed the home network’s Wi-FI ESSID. I selected that SSID then used the WPS “push-to-connect” function to fully connect the laptop to the home network and it worked properly.

I even completed an Internet-connection “acid test” of having the client load a social-network session and check that it reflected the latest activity. By loading a site that is frequently updated with changing information, it avoids the Web browser loading material held in its cache which can be common with a site that doesn’t change frequently which makes me think that the Internet connection is working properly.

If you find that something like your computer’s Wi-Fi functionality misbehaves after an operating system upgrade, identify the kind of device performing the function using Windows Device Manager or a similar tool. Then track down the latest driver software from the computer’s, adaptor’s or chipset’s manufacturer and install that software. Typically this can fix the problem once and for all or make the hardware work better with the operating system.

Windows 10 Tiles not functioning? You may have to restart Explorer

Article

Windows 10 Start Menu

If you are seeing blank tiles in this view, you may have to restart Windows Explorer

Windows 10 Tip: Fixing Live Tile Counts and Blank Tiles | Supersite For Windows

My Comments

If you are running Windows 10 and are enamoured by the “tiled interface” that is part of its Start Menu or Tablet Mode view, there are times where you may find it not working “up to scratch”.

With this interface, you may find that the Live Tiles that are regularly updated simply go blank or are stagnant. The normal response to this situation would be to restart your computer, which would then fix the problem.

Task Manager with Windows Explorer called out

The Windows Explorer process in Task Manager

On the other hand, you may only need to restart the Explorer process to fix this problem without the need to reboot your computer. This can also apply to other user-interface abnormalities.

Here, you run Task Manager by either right-clicking the Taskbar or holding your finger on the Taskbar in the case of a tablet or 2-in-1, then clicking Task Manager, or pressing Ctrl-Shift-ESC together on the keyboard. Then you find Windows Explorer in the list of processes. Right-click this item and click Restart and it won’t take long for it to come good.

Task Manager - Context menu with Restart called out

Click the Restart option on the context menu to restart Windows Explorer

At this point, the Windows Explorer process will recover and update the tiles including reloading the data that populates the tiles from its source rather than working of corrupted data.

Regular operating systems and their vulnerability to security threats

Article

Which Is More Vulnerable To Viruses And Hackers: Windows 10 or Mac OS X? | Gizmodo

My Comments

Lenovo ThinkPad X1 Carbon Ultrabook

The Lenovo ThinkPad X1 Carbon – an example of a laptop based on a regular computing platform

During the 2000s, the personal computing scene focused on so-called “regular” personal computers i.e. desktop and laptop computers that ran a desktop-grade operating system. The main platforms were the Windows platform heralded by Microsoft and with hardware made by plenty of other manufacturers and the Macintosh platform that was made by Apple. Of course, there were a few personal computers that ran one of many open-source Linux distributions which were effectively UNIX.

There was the issue of security risks magnified due to an increased amount of personal and business computing time spent online through the Internet. In most cases, especially with the Windows platform, these risks were mitigated using a desktop or endpoint security program installed on the client computer. Although I have constantly seen the Apple Macintosh platform at risk of security exploits, that platform wasn’t at risk because there were fewer computer users using that platform.

Enter Windows Vista. This operating system had improved security features like operating as a regular user unless necessary but these were tacked on to the Windows XP codebase. This led to poor performance and computer users saw the value of switching to the Apple Macintosh platform for regular computing needs with some even using Apple’s iWork office tools as a way simply to dump Microsoft.

This led to the Apple Macintosh platform becoming more vulnerable due to its increased popularity and the use of “write once run anywhere” code like Java. Apple had to pull their finger out to improve the Macintosh platform’s security and, like Microsoft, engage in regular software updates and patches.

Improvements

Major upgrades for pennies’ worth or free

Windows 10 Start Menu

Windows 10 – a free upgrade from Windows 7 or Windows 8.1

Microsoft and Apple had even started to offer newer iterations of their operating systems to home users and small businesses at prices that would represent chump change or, later on, offer these iterations for free.

Apple started the ball rolling with Mac OS X for pennies’ worth starting with OS X Lion and for free starting with Mavericks. Subsequently Microsoft used Windows 8 to facilitate a software upgrade for pennies’ worth and used Windows 10 to instigate a free software upgrade program.

The major upgrades typically had security improvements like creation of app stores and newer secure codebases.

Blind updates for security patches

A way software developers keep their software going strong is to deliver updates and patches that rectify software bugs and allow the software to improve in performance. The delivery of these updates is being used to harden the software against known security exploits, often as soon as these holes are discovered.

Windows Update - one stop shop for software patches along with automatic delivery

Windows Update – one stop shop for software patches along with automatic delivery

This process typically involved users finding patches or newer code on the developer’s Website but Microsoft and Apple have put an end to this. Initially they set up a “one-stop-shop” program for downloading these updates including any peripheral-driver updates but have improved on this by providing for “blind updating”. This is where the operating system automatically downloads and installs these patches as soon as they become available.without you needing to do anything except, perhaps, reboot the computer when prompted.

Microsoft and Apple are even working on having these patches become effective once they are installed without you needing to reboot your computer. This is being achieved in the newer operating-system variants and with some newer patches.

The option for secure boot

Apple implemented in the Macintosh standard firmware a way to only let MacOS X boot on their Macintosh computers and this provided a sense of security because it can only allow these computers to run Apple-authorised code.

Microsoft and Intel are now implementing this through UEFI and Secure Boot which allows for authorisation of operating systems and pre-boot software that runs on a computing device. This has been considered controversial because it would wrest control of the computer from uses who may want to deploy Linux, especially a custom Linux distribution or wish to run with a dual-boot setup.

App stores and walled gardens

Windows 10's own app store

Windows 10’s own app store

Another weapon that Microsoft and Apple are deploying comes from the world of mobile computing where mobile operating systems implement an “app store” which is a one-stop software “shopping mall”.

Like a suburban shopping mall with its physical goods, these app stores have tight controls on who can sell their software there. Here, the software has to be provided by an identifiable developer and approved and audited by the operating system developer who runs that app store.

There is also a requirement for the software to be sandboxed and have access to certain parts of the operating system rather than having full run of your computer.

Another factor that is also considered important is that if an application “does the right thing” by its users and the operating-system vendor, it is typically highly recommended or featured such as being given an “editor’s choice” or put in the “spotlight”. This gives the program increased exposure which attracts more installations and more purchases. As well, there are user-review mechanisms where people can uprate or downrate the software.

But both the Macintosh and Windows platforms require the ability to work with established software deployments that are typically installed via removable media or a download from the developer’s site. This is due to their legacy where people installed software from floppy disks or CDs or downloaded software from bulletin boards and download sites.

Windows 10 is providing a way to harden things further when it comes to this software in the form of Device Guard. This is a form of sandboxing which allows only certain programs to run on a computer but is made available to the Enterprise Edition only. It is because the process for setting up this whitelist would be considered very difficult for householders, small businesses and community organisations.

Steam - one of the most common games managers

Steam – one of the most common games managers

For games, major games studios are implementing their own app stores and games delivery systems in order to allow for cross-platform game and supporting-content delivery. Here, they want regular-computing gaming to have that same level of confidence associated with console or mobile gaming. This is although Apple and Microsoft deliver games through their app stores. The best example of this is Valve’s Steam online games shop but there are others like EA’s Origin.

Conclusion

What is happening is that for both the Windows and Macintosh computing platforms, they are being made more secure and malware-resistant and it is becoming a race between Apple and Microsoft to keep the regular computing environment as safe as a mobile computing environment.

Simplified hand-switching for pointing devices

What is the problem?

Work needs to be done to make it easier for left-handed and right-handed users to use the same computer

Work needs to be done to make it easier for left-handed and right-handed users to use the same computer

A feature that I notice is sorely missing from Windows is the ability to switch between left-handed and right-hand use of the mouse without having to go to the Control Panel and select the Mouse option there.

It would be OK for a person who has a normal hand to “switch” the computer to work to their hand using this method, but would be difficult in some circumstances.

One of these circumstances would be where a computer is shared amongst multiple users with one of the users being left-handed and others being right-handed. Examples of these include workplace, school or public-access computers or computers shared amongst members of a household including houseguests such as the common “his ‘n’ hers” setup.

Windows mouse control panel

Mouse Control Panel dialog – Windows 7

Another circumstance is where a user has to switch between left-handed and right-handed operation as part of a physiotherapy requirement for their hands or simply to keep their hands supple. It is something that is becoming common with older people who want to stay active with their hands.

But having to head to the Control Panel or similar preference settings in your operating system each time you have to do this can bewilder people who don’t have much confidence with technology.

There are ways that Apple, Microsoft and the open-source community could facilitate this.

What are the possible solutions?

Hot-key selection

One would be to use something like a hot-key combination or a simultaneous-mouse-button combination to switch between the operating modes. This could be an option that one could enable in the preferences settings for the pointing devices.

Having this feature would earn its keep with shared computers, workplace computers and public-access computers because users only need to press a certain key combination or operate the mouse buttons in a certain way to “switch hands”. It would also earn its keep with users who find navigating dialog boxes very bewildering and intimidating.

Maurice Tejado wrote an “add-on” utility for Windows (available through CNET Download.com) that allows you to “switch hands” using a hot-key routine.

Set preferences on a pointing-device basis

Another way that could work even better would be to set the operating mode for different pointing devices. Here, you could have two mice connected with one sitting on the left hand side of the keyboard and one on the right hand side. Or you could resolve to use your laptop’s integrated trackpad as a “left-hand” device and a Bluetooth mouse as a “right-hand” device or vice versa. Here, you could set one device to be left-handed while another device is right-handed.

Some laptops like some of the Toshiba / Dynabook business-laptop range and a significant number of Lenovo ThinkPads implement two pointing devices. One is in the form of the thumbstick mounted on the keyboard while the other is the trackpad below the keyboard. In these cases, there is a separate set of “select” buttons for each of these pointing devices. Here, having pointing-device-specific hand-selection as outlined here would come in to its own with these computers so you could have the thumbstick set for right-hand use and the trackpad for left-hand use.

This function is supported by some desktop Linux distributions but isn’t supported on Windows or Mac OS X. But there is a third-party free utility that can support this in the form of EitherMouse which supports multiple pointing devices in use at the same time with different settings.  This can cater also for users who are slow with trackballs and trackpads but quick with mice.

How can this be done better?

Having to use add-on programs to achieve this goal can become awkward, especially when it comes to computer performance and stability and operating systems could go better by baking this kind of functionality in to their pointing-device code.

As well, some computer users and IT departments don’t have confidence in the use of add-on programs because of the fact that these programs can be poorly written or can contain questionable code that can jeopardise computer stability and security. This is more so with those of us who had passed through the “bulletin-board” / “download-site” / “CD-ROM” era of computing where there was a lot of poor-quality software for download.

Rather, operating system developers could write this functionality in to a subsequent version of their products to answer these needs more effectively and especially cater towards older users who are still using today’s technology.

Updated to cover experience with Lenovo ThinkPad and Toshiba laptops that are equipped with two pointing devices. This includes the Lenovo ThinkPad X1 Carbon Ultrabook (2015) and the Toshiba Tecra R950 (2012) that are suitably equipped.

Why is that program failing to start?

Just recently, I was talking with a friend from the church that I go to and she was telling me that iTunes for Windows was failing to start on her computer. This happened after Apple rolled out an update for that music management system which also works as a bridge to one’s iPhone or iPad.

What I suggested for her to do in this case was to use Windows Control Panel to uninstall the software, then to visit Apple’s Website to reinstall iTunes. She thought that she would lose her music library and other settings associated with the program but, after she reinstalled iTunes as I had suggested, the program worked properly and she had access to her music library.

Most software programs rely on many different library and support files for them to work properly and these are typically delivered as part of an installation or software-update routine. But all it takes is the main executable file or one of these files to be corrupted and not carrying expected data for the program to fail to start or to run abnormally and slowly. As well, an increasing amount of software is dependent on resources held by other programs for it to perform certain functions.

How could these files be corrupted especially after an update? They can be corrupted by glitches in an Internet or network connection as the file is drawn down from the download server. Similarly, a hard disk may be starting to “lose it” and carry corrupted data especially as it becomes more fragmented and full of different data and this happens more as an update procedure substitutes older runtime files for newer files which may be larger or loads extra runtime files.

But a complete uninstall and reinstall routine allows the program to reconstruct all of its files that it needs to work with and rebuild all of the data associated with its settings that affect how it runs.

In some cases, identifying a program that is failing to start or affecting other programs and performing a complete uninstall / reinstall routine on that program may fix these problems. As well, it can cause a program to run more smoothly and quickly.

Why do I describe non-Apple operating systems and hardware as being open-frame?

Sony VAIO Fit 13a convertible Ultrabook at Rydges Hotel Melbourne

Windows 8 – open-frame as can be

I make references to computer systems or mobile devices based on platforms like Windows, Linux or Android as being “open-frame”.

This is compared to Apple’s computer systems and mobile devices which are focused around hardware and software interfaces are peculiar to that manufacturer’s devices. As well, it takes a long time for Apple to integrate a common hardware or software standard in to a platform although other platforms are already implementing the standard; or an accessory or peripheral vendor has to go through hoops to have a device considered “fit” to work with Apple’s products.

Android - also open-frame

Android – also open-frame

Computer systems that are based on an “open-frame” environment has the ability for one to connect peripheral devices easily to it no matter who the hardware or software vendor is. An example of this includes smartphones and tablets implementing a microUSB Type-AB socket for charging or transferring data.

Open-frame computer systems can attach themselves to a network or quickly discover and benefit from or share network resources using commonly-available standards that aren’t particular to one particular vendor. As well, the companies behind the platforms are quick to meld support for most. if not all. of these common standards and specifications in to the next major version of their software platforms and will nurture these standards through their platform’s lifecycle.

Naim UnitiServe - provides music va UPnP AV / DLNA to equipment independent of vendor

Naim UnitiServe – provides music va UPnP AV / DLNA to equipment independent of vendor

There are many examples here that I could mention.

One example is a Windows 7 or Windows 8 computer or an Android smartphone can quickly associate with a WPS-capable Wi-Fi wireless network segment at the click of a button on the wireless router as what happened when I stayed with some friends up in Sydney and when I stayed with another friend up in Ballarat. In both instances, I brought in my Samsung Android smartphone and a Windows-based review-sample laptop  to these locations and brought them on to the hosts’ networks to benefit from their Internet access.

DLNA collections listed as sources on the TV

DLNA content collections listed as sources on a Samsung Smart TV

Another example is to have the ability to discover multimedia content held on a network-attached storage device or media-server software using UPnP AV / DLNA standards which many manufacturers and software developers offer. I have seen this demonstrated many times with setups based around different manufacturers and software developers and, one time, this provided a simple on-ramp for a couple to show travel pictures to the mother-in-law.

Sony SBH-52 Bluetooth headphone adaptor NFC tie clip

Touch your NFC-capable phone on the clip to pair it with the headphone adaptor

Yet another example is my Sony SBH-52 Bluetooth headphone adaptor that quickly pairs with my Samsung Android phone when I touched them together in a same vein as a Braven Bluetooth wireless speaker that I reviewed. In some cases, this even applies to the ability for Android users to exchange contact details with each other or Windows 7/8 computers via Bluetooth or NFC.

How I see the personal-computing scene for both regular (desktop) and mobile applications is that there will be balkanisation taking place between Apple and the rest of the field and this has been underscored in the computer press as simply “the cult of Apple”.

Setting up a “his-and-hers” computing environment

Sony VAIO Fit 15e on dining table

A large laptop that is commonly used in a “his-and-hers” computing environment

A common situation that I face when providing IT support for couples, families and similar households is providing a level of individual operation for each user who uses shared computer equipment. A typical situation is a couple who have desktop, laptop or tablet computers that they share with each other or a family who maintains the “family” computer that is used also by the children.

On the other hand, you may make sure each of you have your own computing devices that are set up with your own operating environments. This is more so with tablets or other ultra-portable computer equipment where you want to effectively “take it with you”.

But there is a goal where each person may want to “keep their space their space”. That is to have their preferred operating environment with their preferred user-interface customisations (wallpaper, button styling, etc), preferred email client, preferred Web bookmarks and other parameters maintained while they operate the equipment. As well, they may want to keep their communications with their social community private or prevent confusion with your communications. This is even though both or all of you will have the same relatives and friends that you maintain regular contact with.

Most of you may operate on a trust-based environment where you will want to know the passwords to each other’s accounts simply as a symbol of “our love for each other has nothing to hide”. This may not be applicable for those of you who are running or working in a business where confidentiality concerning business data is so important.

How do computer operating environments handle this?

Regular computers

Create multiple Microsoft.com accounts on your Windows 8 computer to achieve a unique user experience across all of your Windows 8 computers

Create multiple Microsoft.com accounts on your Windows 8 computer to achieve a unique user experience across all of your Windows 8 computers

Most “regular-computer” operating environments such as Windows, MacOS X and Linux allow multiple individual accounts to be created. These accounts support their own username and password and allow the computer to open up to a desktop environment that is personalised for each of the users. You even have concepts like separate user folders, desktop wallpapers and themes, or, in some cases, email clients that are peculiar to each user.

This functionality has been baked in to the “regular-computer” operating environment due to the fact that these machines are used by different employees in the workplace or are used to work with data that is confidential to a particular user.

Lenovo Yoga 2 Pro convertible notebook at Phamish St Kilda

Copy your Windows 8 user experience to that secondary convertible Ultrabook

Windows 8 and newer versions of the Windows operating system even takes this further by allowing you to create a Microsoft.com login account that you can take between different computers. Here, this allows you to use the same user credentials which will lead you to your same user environment on the different computers. For example, you could share use of different computer types such as a 15” mainstream laptop or an all-in-one desktop that lives at home and an Ultrabook or detachable tablet that you use while travelling or maintain as an “around the house” computer for example.

Last but not least Google implemented multiple-account operation on the ChromeOS platform which then adds most of the cheap Chromebooks to the list of devices that can support “his and hers” computing. This is through a blind update (version 37.0.2062.119) that should be in your Chromebook by 6 September 2014.

Mobile computing devices (tablets)

The tablet, typically the 10” tablet like the Apple iPad, is very much the only device that runs any mobile operating environment which ends up being shared by a couple or family.

Recent iterations of Android installed on tablets can support this kind of operation. This has been introduced to support “privileged operation environments” in the workplace. The same also holds true for tablets that are powered with the Windows 8 operating system.

The only tablet device that doesn’t support a true “his-and-hers” environment is the Apple iPad. This is bound to one Apple ID account, which affects use of the iTunes Store, the App Store and other Apple-provided apps and services. The passcode on these devices doesn’t even provide separate or unique login environments on these devices.

Email, Social Networks and Instant Messaging

Windows Live Mail client-based email interface

Windows Live Mail – an example of a client-based email interface

If these services are operated via a Web-based user interface, they can support “his-and-hers” operation as long as each user logs out of their account at the end of each session. This is more critical if both of you use the same provider.

Some client-side environments like email clients may allow you to have different sets of account credentials tied to particular system user accounts. But some other clients like a few mobile-platform or entry-level desktop clients or most social-network clients won’t allow you to keep service login parameters peculiar to a system user account. Here, you may have to log out of your account at the end of each session. As well, some client-side email programs may maintain only one address book or contact list that is available to all users.

Log out properly of Facebook by clicking "Log Out" in Settings

Log out properly of Facebook by clicking “Log Out” in Settings

On the other hand, you may be able to preserve separate email or social-network accounts by using a separate client-side program for each login. This may limit your ability to use application-driven functionality like “share this via email”. On the other hand, you could always have a practice of each user logging in to the client with their credentials for the duration of their session.

Cloud-based online storage

Most “cloud-based” online storage services like Dropbox can support different logins for each user and you can tie these different logins to a particular device-based login for most regular-computing platforms like Windows. But you can’t have two different service logins associated with one computer login unless you use premium or “business” variants of their services.

But you can create a “household” folder in these services which is shared by all of you, simply by having one account-holder create a folder and invite the other account-holders to have full access rights to that folder. The only limitation with this is that if a friend or relative outside the household wants to share resources with all of the household, they have to invite each Dropbox account to the folder they want to share.

App Stores and gaming league tables

Some operating environments like the Apple MacOS and iOS environments implement a “family-share” option for software bought through their app stores so that you can share the same content that you have purchased across multiple accounts. These features place a limit on the number of accounts you can share with, typically a number you can count on one hand.

Otherwise each user has to purchase their own content through the storefronts and only be able to use it themselves.

Operating environments that have their own gaming-league or similar functionality will typically bind your identity in that league to your user ID that is part of that operating environment.

NAS units

WD MyCloud EX2 dual-disk NAS

NAS units like the WD MyCloud EX2 can work well in a “his-and-hers” computing environment

You can create individual storage accounts on your network-attached storage to allow each member of your household to store their data on their own space in the network-attached-storage unit. Here, you also use the “public” spaces on the NAS to store and share data that is of common interest but doesn’t have a perceived disclosure risk like your file-based AV collection or, if the data is confidential to you both, you could create a private share that you grant the other accounts access to.

The multiple account feature would tie in well with the remote-access or “cloud” features that an increasing number of NAS units like the WD MyCloud EX2 are equipped with. This will maintain the “private data pools” and allow the remote access to these resources.

Some of you may want to use two or three different NAS units connected to the network so you can keep individual units as personal data stores, which may be of importance if each of you run your own enterprise or you want to set up a NAS for the teenager or young adult about to leave the “family nest”.

What can you do to achieve “his-and-hers” computing

Some of you may decide to have a one or more smaller devices that you personally use, like iPads or work-home computers but you may then have to identify devices that you want to operate on a shared basis like larger tablets, laptops or desktops. Here, you can set these up with separate accounts so you can have a unique operation experience for each of you.

If you have equipment that runs Windows 8 or newer variants of that operating system, you could then set up personal Microsoft.com accounts for each of you and use these to log in to your equipment, personalising the operating environment as you see fit. As well, if you are using programs that don’t “switch users” as you change accounts or can’t “switch users” with a program, get in to the habit of logging out when you have finished.

When managing your contacts, you may have to copy your “common” contacts between each others’ contact lists on your email and other messaging clients and keep these up-to-date as each contact changes their details.

Conclusion

Once you know how to set up a “his-and-hers” computing environment, you can be sure that you have the ability to share devices yet know how to keep your working environments “as you like it”.