Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

10 Reasons to use Windows Small Business Server 2011

Protect Your Data. Stay Connected. Save Time and Money.

Get ready to take your business to the next level. With Windows Small Business Server 2011 Standard (SBS 2011 Standard) you can get business done faster, be more productive, and stay better connected. For a greater business capacity and a new competitive edge, the time for upgrading to Windows Small Business Server 2011 Standard is now.

Top Ten Reasons to Upgrade

Enjoy updated component technologies, increased data protection, and new tools to help you grow your business capacity.

1. Get a Comprehensive, All-in-One Solution:

Get the newest releases of all the SBS 2011 Standard technology components that are designed to deliver an optimal experience for small businesses in an affordable all-in-one solution. The solution suite includes Windows Server® 2008 R2 technologies, Microsoft® Exchange Server 2010 SP1, Microsoft SharePoint® Foundation 2010, and Windows Software Update Services. Also, Premium Add-on includes Windows Server 2008 R2 Standard and Microsoft SQL Server 2008 R2 for Small Business.

2. Simplify IT Management:

Manage common IT tasks and address technology issues before they occur with a unified view of the health and security of your computers and servers in the network from one administrative console.

3. Run Line of Business Applications:

Get access to the large Windows Server 2008 R2 ecosystem of applications as the SBS 2011 Standard is built on Windows Server 2008 R2 code base.

4. Stay Connected to the Business:

Provide your users the freedom to securely access all of their communications—e-mail, voice mail, instant messaging, and more—from virtually any platform, Web-browser, or device to get more done wherever they are with the integrated Exchange Server 2010 and Microsoft Outlook® Web Access (OWA) capabilities.

5. Access Business Information from Virtually Anywhere, Anytime:

Get direct, secure access to your files, calendars, tasks, and contacts through any common browser, from virtually anywhere.

6. Built-in document collaboration:

SBS 2011 Standard features Microsoft SharePoint® Foundation Services 2010 – the newest version of Microsoft Windows SharePoint Services. It powers exciting new features and capabilities that help you collaborate securely online—no matter where you are.

7. Simplify IT Management:

Reduce the cost of deploying and maintaining your network with streamlined setup and deployment for both the server and clients

8. Easy Migration:

Easily migrate to the new platform with enhanced migration tools, extensive pre-migration checks, and prescriptive guidance.

9. Simplified Back-up for Business Data:

Help protect your vital business information from loss with automatic backups and recover accidentally deleted files in the event of disaster. With easy-to-use interfaces and backup capabilities, you or your IT consultant can gain better control of your data, PCs, and network.

10. Keep your Network Healthy and Up-to-Date:

Help ensure the health of your network and keep your PCs and servers current with easy-to-read “green check” reports that give you a quick view of PC and server status, antivirus status, Microsoft software updates, and backup progress.

10 tips for speeding up Outlook

Takeaway: Does Outlook’s pokey performance have you gnashing your teeth with frustration? Try these simple fixes to give it a kick in the pants.

If you’ve used Microsoft Outlook for a while, you know that it can slow down… way down. In fact, when not looked after, Outlook can become nearly useless. Fortunately, there are several things you can do to make Outlook not only usable, but significantly improved. And none of these techniques requires a single configuration change to your Exchange server (IMAP or POP3).

Of course, some of these suggestions might seem to have a bit more “‘duh” factor than others. But you never know what level of skills you’re dealing with, so we’ll cover all the bases. In the end, you should have a much faster Outlook experience.

1: Update Windows

Many people don’t realize that with Windows updates, the updates for Microsoft Office are also “hidden.” But it’s not just the Office updates that can help speed up Outlook. Make sure you allow the updates to happen. Why? There are times when Microsoft might update Exchange. In some cases, those updates can either break or cause problems with the communication between Outlook and Exchange. Or Microsoft might issue a patch to the application to resolve a speed issue or security hole.

2: Download Complete Items

When you connect Microsoft Outlook with either IMAP or POP3, you should have Outlook set up to download the complete message (instead of just the header). If you do this, Outlook won’t have to sync with the server every time you click on a new item (as it will already be in the data file.) How you do this will depend upon which version of Outlook you’re using. But basically, you’re looking for the setting Download Complete Item Including Attachments.

3: Archive your Inbox

I can’t tell you how many times I see clients with thousands upon thousands (and in some cases tens of thousands) of emails in their Inbox. This can cause serious issues, especially when using PST files. Instead of just letting those Inbox folders grow to outrageous proportions, set up auto archiving so that your Inbox retains only a portion of those emails. I like to tell clients to keep the current and previous months’ email in the Inbox and archive everything else. When you archive, you effectively create a new data file, so Outlook doesn’t have to strain against the weight of an oversize PST or OST file

4: Use Cached Exchange Mode

If you use Cached Exchange Mode in Outlook, you effectively take the data file from the server (PST) and cache it on your local machine (OST). This can go a long way toward speeding up your Outlook experience because Outlook doesn’t have to read its data file across a network. Instead, all it has to do is read the locally stored data file. This option (obviously) is available only when connecting Outlook with an Exchange server.

5: Compact your PST File

When the Outlook PST file gets out of hand, a built-in tool can keep the size of that file under control. One of the issues is that even when you delete email from your Inbox, the size of the PST file may remain the same. If you’re using Outlook 2010, you can go to Account Settings | Data Files and select the data file to be compacted. Once you’ve selected the file click Settings | Advanced | Outlook Data File Settings and click Compact Now. Depending on the size of your data file, this process can take some time.

6: Repair your PST File

Scanpst is often my go-to tool when Outlook is acting off kilter. It will scan through your data file and look for data inconsistencies and errors. Here’s the thing about Scanpst — it’s not always the easiest tool to find. Do yourself a favor and search through your C drive to locate the Scanpst.exe file. Make note of its location (usually within the Office installation folder). But be forewarned: This tool can cause PST files to become unusable. Make sure you back up that data file before you start the repair tool. Fortunately, should Scanpst find errors, it will prompt you to make a backup before it attempts to fix the errors.

7: Cut down on the published and shared calendars

Yes, it’s easy to publish and share your calendars with others. The problem is, the more you do it, the more drag you’re putting on Outlook. The more data Outlook has to share and pull down from the Internet, the slower it will perform. Sure, it’s fine to have one or two shared calendars (and even more if you have a lightning-fast data pipe). Just know that the more data you have to push and pull, the slower your connection will be.

8: Disable RSS

By default, Microsoft Outlook will sync RSS feeds from Internet Explorer to the RSS reader in Outlook. If you have a lot of RSS feeds bookmarked in Internet Explorer, that syncing could easily bring Outlook to a crawl. Disable this feature (if you don’t use Outlook as an RSS reader) from within Outlook 2010 by going to Options | Advanced and then unchecking both options under RSS Feeds.

9: Disable add-ins

How many times have you installed some program only to find it installed something else behind your back? This can happen to Outlook as well as Internet Explorer. Sometimes those add-ins can cause major Outlook slowdowns. To find out what add-ins you have installed in Outlook 2010, go to Options | Add-ins. Select COM Add-ins from the drop-down and click the Go button. The resultant window will list all add-ins available to Outlook. Search through this list and uncheck any that might seem suspect.

10: Fix ShoreTel Windows 7 Integration

If you use the ShoreTel Communicator, you might notice some issues when trying to open and use Outlook. The problem lies in an incompatibility issue between ShoreTel and Windows 7. The fix is simple. Open up the Task Manager and look for a process called Agent.exe. Right-click that entry and click Properties |Compatibility. Choose the Run This Program In Compatibility Mode For option and then select Windows XP (Service Pack 3).

Other Tricks?

There’s no reason why anyone should have to struggle with a bogged down Outlook that will have you pulling your hair out strand by strand. These tips should help you enjoy a much speedier and reliable Outlook experience.

What other methods have you found for improving Outlook performance? Share your suggestions with fellow TechRepublic members.

Top IT skills wanted for 2012

 

Takeaway: A new Computerworld survey indicates the nine IT skills that will be in demand in 2012.

Nearly 29 percent of the 353 IT executives who were polled in Computerworld’s annual Forecast survey said they plan to increase IT staffing through next summer. (That’s up from 23% in the 2010 survey and 20% in the 2009 survey.)

Here are the skills that the IT executives say they will be hiring for:

  1. Programming and Application Development61% plan to hire for this skill in the next 12 months, up from 44% in the 2010 survey. This covers the gamut from website development to upgrading internal systems and meeting the needs of mobile users.
  2. Project Management (but with a twist) The twist is that they’re not going to just be looking for people who can oversee and monitor projects. They also want people who can identify users’ needs and translate them for the IT staffers-the increasingly popular business analysts.
  3. Help Desk/Technical SupportMobile operating systems have added a new dimension to help desk and tech support.
  4. NetworkingThis demand is being fueled partially by virtualization and cloud computing projects. The survey also revealed that execs will be looking for people with VMware and Citrix experience.
  5. Business IntelligenceComputerworld interprets this uptick to a focus shift in many companies, from cost savings to investing in technology. That will be nice if it pans out that way.
  6. Data CenterVirtualization and the Cloud could also be behind the increased need for IT professionals with backgrounds in data center operations and systems integration.
  7. Web 2.0Tech skills centered around social media will be in demand, with .Net, AJAX and PHP as key back-end skills, with HTML, XML, CSS, Flash and Javascript, among others, on the front end.
  8. SecurityAlthough down from 32 percent in the 2010 survey, security stays a top concern of IT executives.
  9. TelecommunicationsThe survey indicates a demand for people with IP telephony skills, and for those familiar with Cisco IPCC call center systems.

Five Must-Have Apps For Your USB Stick

Takeaway: Don’t get caught out in the field without the tools you need. A USB stick equipped with a few essential apps might just save the day.

Ah, the USB stick — one of the IT admin’s best friends. It travels with you and helps you rescue machines, work magic, and make end users sigh with relief. Some of these USB apps you copy to the hard drive and install; others can be run from the USB stick itself. A few of them are full-blown operating systems that can help you completely recover a corrupted or infected platform.

Whatever the style and purpose, there are plenty of portable apps for the USB stick that can be hard to live without. Here are five tools I deem must-haves.

1: SystemRescueCD

SystemRescueCD  is the Linux distribution to have if you’re going to carry one around on a USB stick. With this distribution, you can recover partitions, recover data, image a disk, test a hard disk, edit configuration files, burn a disk, check for rootkits, run an antivirus scan, securely wipe a hard drive, and much more.

2: Portable Firefox

Portable Firefox is there when you need it. Sometimes, a Web browser is a necessity for solving a problem. But when the browser on the desktop won’t run, what do you do? You break out your portable edition of Firefox. This version of Firefox has all the great features you’re used to. In fact, some will be hard-pressed to figure out that Firefox is running from a USB stick.

3: ComboFix

ComboFix makes almost every recovery tool list for me. No admin kit is complete without this powerhouse. It is my go-to tool when I encounter some of the nastier viruses and rootkits. Almost without fail, if an antivirus can’t catch it, ComboFix can. Unlike common antivirus and anti-malware applications, ComboFix will display (upon completion of running) a detailed report of exactly what it took action on. Note: To run ComboFix, you’ll need to copy the .exe over to the computer and install it.

4: FileZilla Portable

FileZilla Portable is the one and only FTP client to carry around with you. Why would you need an FTP client? There will be times when you must load a file from a troubled computer to another machine. The easiest way to do this (when all other methods fail) is by using a portable FTP client. This is especially crucial when the file is too large to fit on a USB drive or if the file must be loaded to a remote machine you do not have physical access to. This application is run directly from the USB drive and isn’t installed on the PC.

5: Explorer++ Portable

Explorer++ Portable is a file manager with all the usual features you’ve grown to expect from a file manager. But why should you carry a file manager with you? Have you ever had to repair a machine where Explorer won’t run? Makes for a major challenge. Having a portable file manager gets around that issue with ease. And why not have a file manager with features like tabs, keyboard shortcuts, a customizable UI, drag-and-drop support, and merging and splitting? In the end, the file manager is one of the most important tools on a PC. Without it, a machine can easily become crippled.

6: PortableApps

You might have noticed some of these apps link directly to the PortableApps site. That is a tool designed to make your life much easier. You can install PortableApps on your USB drive and then have a user-friendly system to add and remove apps to and from that USB drive with ease. I highly recommend this application for any and all IT admins.

Tips for Supporting iOS 7

ios7

September 18, 2013 was the official release of iOS 7.  Complementary to iOS 7 are several support questions for corporate-owned iOS devices, including Bring Your Own Device (BYOD) and Corporate Owned Personally Enabled (COPE) devices.

COPE devices are corporately compliant prior to distribution to employees; this allows consistency and higher security for all enterprise devices.

There may be a few problems when upgrading to iOS 7 such as older iPhone/iPad devices may not support iOS 7 and not all features are available on all devices or in all countries. 

Here are some tips for supporting iOS 7 in the enterprise. 

Implement VPP

Apple now offers a Volume Purchase Program (VPP) for business.  VPP can retain volume licenses for Apps and Books.  Download Apple’s VPP Guide.

Third-Party iOS Apps

Configuring third-party apps can be completed in iOS 7,  Mobile Device Management (MDM) distributes the third-party configuration and the developer needs to enables it.

Test and Troubleshoot

The most important step before deploying in-house developed enterprise app(s) is to test and troubleshoot.  Testing and troubleshooting will save time and resources after deployment.

Per App VPN

Per app VPN ensures that only managed app data travels through VPN.  iOS 7 apps can automatically be connected to VPN when launched.  Also, for security purposes this tool will separate corporate data and personal data.

 

Rogue Anti-Virus Software Explained

What Is Rogue Anti-virus Software?

It is almost unheard of in this day and age to be online without using anti-spyware and anti-virus software to safeguard your computer against viruses and other malicious code. It’s not surprising to see the prevalence of rogue anti-virus software.

Also called scareware, or rogue security software, or smitfraud, this type of software is also most commonly defined as malware—it is designed specifically to damage or disrupt your computer system. In this case, not only is the software going to disrupt your system, it’s going to try and trick you into making an unsecure credit card purchase.
Rogue anti-virus programs usually appears in the form of a fake Windows warning on your computer system that reads something like, you have a specific number of viruses on your computer (usually in the hundreds) and that this software has detected those viruses. To get rid of these viruses, you’re prompted to buy the full-version of the antivirus software (which is really rogue antivirus software).

The good news is that you probably do not have a computer that is infested with hundreds of viruses as the rouge software claims. The bad news is that the rogue antivirus software itself is on your computer and you must remove it. Removal is hindered as rouge software can lock the control panel and the the Add/Remove Programs function to prevent you from removing it easily.

Other things that may be disrupted by the rogue software include being unable to visit reputable and valid anti-virus and malware Web sites, being able to install legitimate antivirus software and also being unable to access your desktop.

The rogue software wants to stop users from removing the program and proceeding with the purchase instead. It’s important to remember that by purchasing the “claimed full version to remove the viruses” you will be submitting your personal information to unscrupulous persons and may also end up being a victim of credit card or identity theft.

Common names of rogue antivirus software include; AntiVirus (2007, 2008, and 2009), MS-Antispyware, XP AntiVirus (2007, 2008, and 2009), Home Antivirus 2009, SpyWareGuard, Malware Cleaner, Extra Antivirus, AV AntiSpyware, SpywareProtect2009, WinPC Defender as well as many other names.

How Does a Computer Get Infected with Rogue Antivirus Programs?
The reason these rogue anti-virus programs are successful (for the malicious coders) is because the warning screens very closely resemble legitimate Windows warning screens, plus the rouge software program names closely resemble or sound like legitimate antivirus programs.

When you load an infected Web site you might see a warning screen pop up and think that it is a legitimate Windows warning. Users unknowingly are tricked into downloading the software because they believe the warning to be a legitimate Windows messages.

You might also be on a Web site trying to view a video and a screen may pop-up telling you that you need to download a codec to view the file. The window prompting you to download the codec looks legitimate, however you are not going to download a codec—instead you will receive one of the many rogue antivirus software programs.

In April of this year, it was also reported that systems that had been previously infected with Conficker, found this worm had began installing rogue antivirus programs on infected machines. In the early cases this turned out to be a rogue application called SpywareProtect2009. Kaspersky researchers reported this was a typical rogue program that offered to clean the computer for $49.95.

Lastly, if you use file sharing networks you also risk downloading a rogue antivirus as it can be easily hidden inside a legitimate program—that you may or may not be legitimately downloading.
How to Spot Rogue Antivirus Warnings

For the most part, you need to look at the windows that are popping up and the name of the program being shown. If you know the program name of the antivirus and spyware software you use, then seeing a different name in the warning window is the first clue. Also, Windows itself doesn’t warn you of a virus. Legitimate warnings on your system would come from the anti-virus program you have installed, not a random Windows operating system style pop-up window. A great resource for learning how to spot these malicious programs through fake warning messages can be found on bleepingcomputer.com. This page lists the text of some of the more common false warning screens, including the following:

Malware Cleaner: Trojan detected! A piece of malicious code was found in your system that can replicate itself if no action is taken. Click here to have your system cleaned by Malware Cleaner.

AV AntiSpyware: Spyware Alert! Your computer is infected with spyware. It could damage your critical files or expose your private data on the Internet. Click here to register your copy of AV AntiSpyware and remove spyware threats from your PC.
How Do I Get Rid of Rogue Antivirus Programs?

It can be a difficult task to get rogue anti-virus programs off your computer. To complicate the matter, there are many variations of this malicious program and not all variants can be removed in the same way. This is not something that novice computer users may be able to deal with on their own.

Also, due to the popularity of these infections and people searching for answers on how to remove the program a number of scam programs also exist that lead users to believe it will remove the infection. Yes, these programs that claim to rid your system of Antivirus 2009 (or whichever variant you have been infected with) will scan your system and then prompt you for a credit card number so you can download a full version to remove the infection. Sound familiar? It should. This is a vicious cycle that users can unwittingly become trapped in.

Still, the good news is that in many instances you can get rid of the rouge antivirus program without wiping and formatting your hard drive. If you are already infected and you cannot access legitimate security related Web sites, you will need to download the following programs from a second computer and burn them to CD to run on the infected computer.

WARNING: Before running any of the following programs, you should turn off System Restore (you won’t be able to use System Restore as this deletes all restore points). If you don’t turn it off, the programs may not be able to access those system files to clean them. If you are infected the System Restore is not going to return you to an earlier uninfected date anyway. You can turn it back on after you have successfully removed the rouge antivirus program.

The quickest way, and first thing to try is to download Malwarebytes Anti-Malware to get rid of the rogue antivirus. On it’s own this will usually rid your computer of the problem. If Malwarebytes didn’t have the desired results, or you simply want to do a total and complete system clean, you will want to use a combination of CCleaner, Malwarebytes, Asquared, and SpyBot Search and Destroy. These programs all offer freeware versions.

NOTE: In some cases, the rogue anti-virus may block one or more of these legitimate programs. If this is the case, you will need to open the folder where you installed the program on your hard drive and rename the executable file (.exe) to anything other than the program’s name. (e.g. rename mbam.exe to aaa.exe).

Once you have run all the programs, be sure to go back and run CCleaner a final time to get rid of dead registry links from having the rouge antivirus removed. Continue to run the registry option of this program until no problems are found.

Here are additional removal resources:
bleepingcomputer.com: How to remove Extra Antivirus
bleepingcomputer.com: How to uninstall and remove AV AntiSpyware
bleepingcomputer.com: How to uninstall and remove WiniBlueSoft
bleepingcomputer.com: How to uninstall and remove HomeAntivirus 2009
bleepingcomputer.com: How to uninstall and remove Antivirus 2009 (Antivirus 09)
bleepingcomputer.com: How to uninstall and remove PAntispyware09
bleepingcomputer.com: How to uninstall and remove Virus Sweeper
bleepingcomputer.com: How to uninstall and remove WinPC Antivirus
Kaspersky Technical Support and Knowledge Base: How to disinfect rogue spyware

DID YOU KNOW…

In December 2008 it was reported that a Google sponsored link pointed to a malicious Web site where users were redirected to a spoofed CNET Download.com site with offers to download a “spyware free” copy of Winrar. This file included the rogue antivirus program “AntiSpyware2008” (Source)

To read the original article in it’s entirety Click Here

Preparing Your IT Network For A Severe Storm

South Jersey Techies wanted to provide you with some suggested preparations to safely secure your workstations and networks from any storm damage.

Suggestions for Storm Preparations in Your Office:

  • Time to do backups of all data: Make back-ups of all data processing software, files, records, etc.  and transport back-ups off-site, via disk, USB drive or in the cloud.
  • Document the layout: Get all of the network addresses, the router and firewall configurations.
  • Shut off all sensitive electrical equipment, such as computers.
  • Ideally all electronic devices should be unplugged or plugged into surge protectors.
  • Review inside storage arrangements and relocate all important materials and equipment to safe areas away from windows.
  • Update call lists and contact info: All key personnel need to register their updated cell numbers, home email addresses, and physical addresses.
  • Leave before you need to: Don’t get stuck in traffic, airports, train stations and in queues. Give yourself ample time.

If you need your data backed up or are unsure as to the last time a backup occurred, please contact our Support Team.  We are here to help ensure that your data is safe and that you are able to be up and operating as soon as the storm passes. Our Support Team can be reached at (856) 745-9990 or by emailing us at support@sjtechies.com.

Suggestions for Storm Preparations in Your Home:

  • Monitor National Weather Service forecasts at http://weather.gov .
  • Bring outdoor objects, such as lawn furniture, garbage cans and other loose items, inside the house or tie them down securely.
  • Make backups of computer data (consider storing in the cloud or on a USB drive), keep computers or other sensitive electronic devises plugged into a surge protector or unplug entirely.
  • If you have a sump pump for your basement, make sure it’s working.
  • If the power goes off, unplug appliances like refrigerators and freezers and sensitive electronic equipment like TVs and computers so that they won’t overload when power is restored.
  • Keep family supplies on hand, such as:
    • Water, one gallon per day, per person
    • Food, non-perishable food (keep a manual can opener handy) and pet supplies, if needed
    • Medications, contact lenses, glasses and first aid kit
    • Batteries, flashlights and battery operated radios
  • Keep cell phones charged while possible, and if possible, have extra charged cell phone batteries.
  • Keep copies of any important documents either scanned or digitally saved on a USB drive, off-site or in a plastic bag.
  • Car filled up with gas; keep some water, food, first aid kits, contacts, blankets and pet supplies in the car as well.

If you have any issues or questions, please feel free to contact our support team by email at support@sjtechies.com or telephone at (856) 745-9990.

Hosted Dedicated Server Virtualization

Virtual Dedicated Server Can Replace On-Premise Hardware

A virtual dedicated server  is a virtual machine provided by an internet hosting company.  Unlike normal hosting plans, which put many customers’ accounts on a single server, a Virtual Dedicated Server is reserved exclusively for the account and usage of a single customer.  This means that the Virtual Dedicated Server customer has exclusive rights to their server’s bandwidth, memory and storage space and performance is not affected by traffic and the usage patterns of other customers.

When you purchase a Virtual Dedicated Server, you are actually leasing a server box that is configured and set up according to your preferences, but remain at a remote data center. A Virtual Dedicated Server Server account provides you with a dedicated IP address and full control of server usage and software installation, with admin (root) access to the server.

A Virtual Dedicated Server can be used for a variety purposes, including gaming servers, database management and traffic-intensive websites. Dedicated servers are particularly useful for companies and individuals who run very-high-traffic websites or applications and who need the bandwidth, versatility and consistent performance of a dedicated box. You may install anything you want on a dedicated server, as long as the installed material does not violate the restrictions listed on in the license agreement.

Virtualization is the perfect solution for applications that are meant for small-to medium scale usage.

For more information on Dedicated Virtual Servers please contact our support team by email at sales@sjtechies.com or by telephone at (856) 745-9990.

Business Case For Supporting Employee Use of Social Media

What’s your company’s policy on employees using social media in the workplace?

Many companies today are still fearful of employees using social media, especially while at work. Employer concerns range from loss of productivity, industry espionage, confidentiality breaches, and public complaints about the company and/or its managers. As a result, some companies have requested access to employee (or potential employee) Facebook profiles, as well as blocked access to social networking sites while at the office.

In contrast, other companies — for example RingCentral — encourage employee engagement on social media. There are multiple benefits to embracing employees using social media in the workplace, as illustrated by the below infographic from SilkRoad, a cloud-based social talent management solution. At RingCentral, we prefer that employees get involved with our social media channels, and we encourage them to share news about the company through their personal social networks. To prevent any confusion, we implemented a social media corporate policy that clarifies the dos and don’ts of participating in social networks as a RingCentral employee. The net net? The benefits of employees on social networks far outweigh the negatives.

Is your company supportive of employees using social media?

Microsoft Offers $40 Windows 8 Pro Upgrade

We set out to make it as easy as possible for everyone to upgrade to Windows 8. Starting at general availability, if your PC is running Windows XP, Windows Vista, or Windows 7 you will qualify to download an upgrade to Windows 8 Pro for just $39.99 in 131 markets. And if you want, you can add Windows Media Center for free through the “add features” option within Windows 8 Pro after your upgrade.

When you use Windows.com to purchase an upgrade to Windows 8 Pro, the Windows 8 Upgrade Assistant makes upgrading simple by walking you through the upgrade process step-by-step from purchase to download and then of course installation.

The Windows 8 Upgrade Assistant will check to make sure your PC is ready for Windows 8. It will provide a detailed compatibility report that lets you know of anything you may have to address before or after the upgrade and outlines actions to take.

It will also inform you of any application or device compatibility issues. It will ask you what you want to keep from your current Windows installation. You will be able to upgrade from any consumer edition of Windows 7 to Windows 8 Pro and bring everything along which includes your Windows settings, personal files, and apps. If you are upgrading from Windows Vista, you will be able to bring along your Windows settings and personal files, and if you are upgrading from Windows XP you will only be able to bring along your personal files. Of course, if you want to start fresh, you can choose to bring nothing along. Or if you prefer to format your hard drive as part of your upgrade experience, you can do so as long as you boot from media and then format your hard drive from within the setup experience for installing Windows 8, not prior to it.

Once you purchase your upgrade, the Windows 8 Upgrade Assistant kicks off your download. It has a built-in download manager that allows you to pause and continue your download at any time as well as a check to ensure your download completes successfully.

After your download finishes, you can choose to proceed with the upgrade (“Install now”) or install later either from your desktop or by creating your own media. If you choose to create your own media, you will be able to create your own bootable USB or .ISO file which can be burned onto a DVD for upgrade and backup purposes. If you prefer, you also have the option of purchasing a backup DVD for $15 plus shipping and handling.

We believe that your upgrade experience in Windows 8 will be a breeze by offering a faster experience, a single upgrade path, and compatibility from prior versions of Windows. We’ve continued to listen to our customers and have expanded the ability to download to over 100 countries and 37 languages. We have simplified the Windows upgrade experience with the Windows 8 Upgrade Assistant which supports you during your upgrade with everything from selecting your language to pausing your download to built-in compatibility checks – it’s seamless. And if you’re an enthusiast you will have the flexibility to download and control how you upgrade.

If you prefer to shop at a local store, a packaged DVD version of the upgrade to Windows 8 Pro will be available for $69.99 during this promotion.

This upgrade promotion for Windows 8 Pro both online and at retail runs through January 31st, 2013.

Oh, and by the way – if you’re not upgrading from a prior version of Windows and are building your own PC or installing Windows 8 in a virtual machine or a separate partition, you will be able to purchase and install the Windows 8 and Windows 8 Pro System Builder product.

CALL US NOW!