April 1st, 2016 by Michael Sauers

Explore a speculative digital world without screens in this fanciful demo, a mix of near reality and far-future possibility. Wearing the HoloLens headset, Alex Kipman demos his vision for bringing 3D holograms into the real world, enhancing our perceptions so that we can touch and feel digital content. Featuring Q&A with TED’s Helen Walters.

Posted in Tech, video Tagged with: , ,

June 30th, 2015 by Michael Sauers

Wondering about how the Windows 10 upgrade is going to work, how much it’s going to cost, or if your existing hardware will work? Microsoft has the answers to those questions and more at the Windows 10 Q&A page.

Posted in Tech Tagged with: ,

November 27th, 2014 by Michael Sauers

Microsoft Outlook 2000 One Day Course

Posted in Books Tagged with: , ,

October 19th, 2014 by Michael Sauers

My lovely wife got me a keyboard for my birthday: The Microsoft Universal Mobile Keyboard. It’s bluetooth and works with Android, iOS and Windows. It’s also very lightweight, compact, and comes with a detachable cover/tablet stand. This is going to come in very handy.

Microsoft Universal Mobile Keyboard 2

Microsoft Universal Mobile Keyboard 1

Posted in Tech Tagged with: , ,

October 16th, 2014 by Michael Sauers

In my Windows 10 presentation yesterday a question was asked about the Windows 10 Technical Preview having a keylogger. I said it did and that I remember clicking through a EULA as part of the install. Well, I happened to have taken a photo of the screen I recall clicking OK on and here it is:

Windows 10 Technical Preview EULA

As you can guess, I did not click on the “learn more,” “privacy,” or “Customize” links so I can’t say exactly what’s there. However, the important line is the fifth one which said you’re helping to improve Microsoft by “sending us info.” And yes, that includes a keylogger. If you’d like more info on just why there’s a keylogger, check out the ‘Microsoft clears the air on Windows 10 “keylogger”‘ article from Den of Geek.

Posted in Tech Tagged with: , , ,

October 15th, 2014 by Michael Sauers

The first technical preview of Windows 10 (yes, they’re skipping Windows 9) has been released and Michael has been testing it. Join us for a tour of Windows 10 with a look at the new features and the differences you’ll need to be aware of whether you’re currently using Windows Vista, 7, or 8.1.

For more information, to register for upcoming NCompass Live events, or to listen to recordings of past events, go to the NCompass Live Webpage.

Posted in Tech Tagged with: , , ,

October 7th, 2014 by Michael Sauers

Win10 LaptopHave a spare machine you can use to test Windows 10? If so, you can head on over to http://preview.windows.com and sign up for the Windows Insider Program. Once you’re registered you’ll be able to download the needed file to create your installation media.

Posted in Tech Tagged with: , ,

October 3rd, 2014 by Michael Sauers

Two videos this week. The first is the very short intro to Windows 10 and the second is the full live presentation from September 30th.

Posted in Tech, video Tagged with: ,

October 2nd, 2014 by Michael Sauers

I’ve got the technical preview of Windows 10 up and running on some spare hardware. The process was painless on a Core 2 Duo with only 2GB of RAM and took less than 15 minutes including logging into my Microsoft account and the syncing of settings. Here are my screenshots showing features that differ from Win 8.1. (Not shown: The fact that you can resize the start menu vertically and additional tiles will expand it to the right.)

This slideshow requires JavaScript.

Posted in Tech Tagged with: , ,

April 28th, 2014 by Michael Sauers

IE BugThis new remote code execution vulnerability effects pretty much every version of IE…

Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11.

The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.

We are actively working with partners in our Microsoft Active Protections Program (MAPP) to provide information that they can use to provide broader protections to customers. For information about protections released by MAPP partners, see MAPP Partners with Updated Protections.

Microsoft continues to encourage customers to follow the guidance in the Microsoft Safety & Security Center of enabling a firewall, applying all software updates, and installing antimalware software.

Read the full alert and learn what you can do about it (other than STOP USING IE) @ Microsoft Security TechCenter.

Posted in 1 Tagged with: , ,