Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

Microsoft Launches Windows 8 Today

Microsoft kicks off Windows 8, on sale today

Microsoft hopes it can capture the imaginations of tech consumers again, as Apple has.

That was the subtext Thursday for a splashy launch of Microsoft’s Windows 8, the new operating system upgrade on sale today.

“What you’ve seen and heard should leave no doubt that Microsoft’s Windows 8 shatters perceptions of what a PC truly is,” said Microsoft CEO Steve Ballmer. “We’ve re imagined Windows and kicked off a new era for Microsoft and our customers.”

For the first time, the new Windows has a touch-screen interface, with movable tiles, instead of the traditional “Start Menu” and screen. For older computers that upgrade, the touch-screen will not be accessible, but the tiles can be accessed by mouse or touch-pad.

Microsoft says that 1 billion people use its Windows operating system, with 670 million on Microsoft’s Windows 7, which was introduced in 2009.

At Thursday’s launch party, PC partners — including Lenovo, Sony, Toshiba, Dell and Hewlett-Packard — showed off new computers sporting Microsoft’s Windows 8. Many of the laptops have splashy new designs with removable screens that morph into portable tablets.

Microsoft’s new operating system works on tablets and traditional PCs and laptops. Despite twin versions, Windows 8 and Windows RT, Microsoft is taking a notably different course than Apple by providing the same look and feel to both types of devices.

Apple still markets separate operating systems for Macintosh computers (OS X Mountain Lion) and for the iPhone, iPad and iPod Touch (iOS 6), even though some features are common to both operating systems.

“I think they did a really good job of reintroducing themselves to the consumer today, Microsoft, not just Windows,” says Michael Gartenberg, analyst for technology research firm Gartner.

He says part of Microsoft’s challenge is to explain to consumers why the radically different approach is better.

“Consumers have shown a willingness to learn. They learned how to use mice and keyboards. They learned how to use touch and pinch-to-zoom. They can learn how to do this, too,” he says.

Microsoft’s unified approach to the operating system is based on its belief that touch-screens will soon dominate PCs, says Ross Rubin, principal analyst at Reticle Research.

“Rather than come to market with another tablet operating system — seeing how (Google’s) Android has struggled in that space — they (Microsoft) decided to leverage the high shipping volumes of PCs every year in order to build developer support for a tablet operating system,” he says.

To View Full Article Click Here

What is new and improved with 802.11ac?

Wi-Fi_Logo.svg

Takeaway:  IEEE 802.11ac is the next generation wireless networking protocol as the successor of IEEE 802.11n.

What is 802.11?

IEEE 802.11 is a group of physical layer standards that provide the foundation for wireless networks.

802.11 Timeline:

  • 1997:  802.11 – 1 or 2 Mbps in 2.4 GHz spectrum (Legacy)
  • 1999:  802.11a – 54 Mbps in 5 GHz spectrum
  • 1999:  802.11b – 11 Mbps in 2.4 GHz spectrum
  • 2003:  802.11g –  54 Mbps in 2.4 GHz spectrum
  • 2009:  802.11n – 600 Mbps in 2.4 GHz and 5 GHz spectrum

802.11n vs. 802.11ac

802.11ac offers the freedom of a wireless network combined with the capabilities of Gigabit Ethernet.  In a 5.0 GHz spectrum, 802.11ac will provide up to 500Mbps (single) or 1000 Mbps (multi).  Final ratification for 802.11ac expected in December 2013.

table

 

Set Up Microsoft Exchange E-Mail on iPhone

Set Up Microsoft Exchange E-Mail on an Apple iPhone, iPad, or iPod Touch3

You can set up Exchange e-mail on an Apple iPhone, iPad, or iPod Touch. When you set up an Exchange account on your device, you’ll be able to access and synchronize your e-mail, calendar, and contacts. If you have a different device, or if you want to connect using POP or IMAP.

How do I set up Microsoft Exchange e-mail on an Apple iPhone, iPad, or iPod Touch?


  1. Tap Settings > Mail, Contacts, Calendars > Add Account.
  2. Tap Microsoft Exchange.
  3. You don’t need to enter anything in the Domain box. Enter the information requested in the Email,Username, and Password boxes. You need to enter your full e-mail address in the Email and Usernameboxes (for example, tony@contoso.com).
  4. Tap Next on the upper-right corner of the screen. Your iPhone will try to find the settings it needs to set up your account. Go to step 7 if your iPhone finds your settings.
  5. If your iPhone can’t find your settings, you’ll need to manually look up your Exchange ActiveSync server name. For instructions for how to determine your Exchange ActiveSync server name, see the Finding My Server Name section below.
  6. In the Server box, enter your server name, and then tap Next.
  7. Choose the type of information you want to synchronize between your account and your device, and then touch Save. By default, Mail, Contacts, and Calendar information are synchronized.
    Caution:
    If you’re prompted to create a passcode, tap Continue and enter a numeric passcode. If you don’t set up a passcode, you can’t view your e-mail account on your iPhone. You can set up a passcode later in iPhone Settings.

Finding My Server Name


If your email program isn’t able to automatically find your Exchange ActiveSync server name, you may need to look it up.

  1. Sign in to your e-mail account using Outlook Web App. For help signing in, see How to Sign In to Outlook Web App.
  2. If you’re connecting to an Exchange mailbox, your Exchange ActiveSync server name is contained in the address bar in your browser when you are signed in to Outlook Web App, but without the leadinghttps:// and without the trailing /owa. For example, if the address you use to access Outlook Web App is https://mail.contoso.com/owa, your Exchange ActiveSync server name is mail.contoso.com.
  3. If you’re unable to connect to your mailbox using the information earlier in this section, you can try using the server name value that you can view in Outlook Web App options. Do the following:
    1. In Outlook Web App, click Options > See All Options > Account > My Account > Settings for POP, IMAP, and SMTP access.
      Note:
      Although you’re not setting up a POP3 account, you will use this value to determine your Exchange ActiveSync server name.
    2. Under POP setting, view the value for Server name.
    3. Try setting up your email using the server name listed on your options page. For example if the value for Server name under POP setting is mail.contoso.com, try using mail.contoso.com as your Exchange server name.

What else do I need to know?

  • If you’re prompted to create a passcode and don’t create one, you won’t be able to send and receive e-mail.

Ten Top Microsoft Office Tips

The ten most popular Microsoft Office tips

Takeaway:  Susan Harkins lists ten most popular Office tips published in the Windows and Office Blog, and the now inactive Office Blog.MS_Office_2007_Logo.svg

When considering tips to share, think about ease-of-use and efficiency. A few naturally rise to the top as your favorites. For your commemoration, here are 10 of 2012’s most popular posts from both the Office Blog, which was deactivated in mid-2012, and the current Windows and Office Blog. Thank you for reading, and thank you for sharing your thoughts and enhancements with one another throughout the year.

1: A quick Word trick for typing text into a scanned document

The response to this limited technique surprised me. It’s something only a few will use, but if you’re one of those few, it can be a big help! I was pleasantly surprised at the positive response it received and the way readers enhanced the technique.

2: Use Word macros to save your place in a document

These two short macros make quick work of bookmarking work areas in a Word document. When the built-in navigation techniques just don’t get the job done for you, consider these macros or one of the alternative methods that readers shared.

3: A quick and dirty way to compare columns of Excel data

This quick Go To comparison solution is great for a one-time task. Comparing Excel data is a common task, and I receive frequent questions for solutions. This solution is a great one to add to your bag of tricks.

4: Demystify Excel’s PivotTable feature with this simple method

Sometimes a great tip doesn’t offer a specific solution, but rather guides you to using a feature more efficiently and effectively. Users tend to ignore Excel’s pivot table feature because they don’t really understand it – hence this blog post offers some quick insight into how to use this feature without mind-bending tricks.

5: Create a dynamic Excel chart and make your own dashboard

This blog post is one of my favorites. I enjoyed sharing the technique, but more than that, I loved the way the readers jumped in to help one another with a step I accidentally omitted in the instructions. TechRepublic readers rock!

6: A quick Excel keyboard trick for selecting large ranges

This technique uses Go To ([F5]) in an unusual way – to anchor two cells, creating a range. The ensuing conversation shared a number of great selection tips!

7: Three tips for rounding Excel time values

Using the right function can help you round up your rounding woes. Excel offers three rounding functions and knowing them all will round out your skills nicely. (Okay, I promise to stop that.)

8: Three things you must do when you inherit an Excel workbook

I review a lot of workbooks, so this blog was one of my favorites to write. In my experience, performing these three quick tasks when inheriting a workbook can speed up your troubleshooting time. Fortunately, it sparked some insightful conversation into what others do.

9: Launch Word with the most recently used document

Reader response sometimes surprises me, as it did for this easy technique. I hadn’t expected so many great alternatives from the readers.

10: Run a list of rolling credits at the end of your PowerPoint presentation

I’m glad a PowerPoint technique made the top list, but it wasn’t because the readers loved my technique. Mostly, the conversation centered on the typo I missed, and then my lack of proper contrition for said typo. It was fun while it lasted.

Top IT skills wanted for 2012

 

Takeaway: A new Computerworld survey indicates the nine IT skills that will be in demand in 2012.

Nearly 29 percent of the 353 IT executives who were polled in Computerworld’s annual Forecast survey said they plan to increase IT staffing through next summer. (That’s up from 23% in the 2010 survey and 20% in the 2009 survey.)

Here are the skills that the IT executives say they will be hiring for:

  1. Programming and Application Development61% plan to hire for this skill in the next 12 months, up from 44% in the 2010 survey. This covers the gamut from website development to upgrading internal systems and meeting the needs of mobile users.
  2. Project Management (but with a twist) The twist is that they’re not going to just be looking for people who can oversee and monitor projects. They also want people who can identify users’ needs and translate them for the IT staffers-the increasingly popular business analysts.
  3. Help Desk/Technical SupportMobile operating systems have added a new dimension to help desk and tech support.
  4. NetworkingThis demand is being fueled partially by virtualization and cloud computing projects. The survey also revealed that execs will be looking for people with VMware and Citrix experience.
  5. Business IntelligenceComputerworld interprets this uptick to a focus shift in many companies, from cost savings to investing in technology. That will be nice if it pans out that way.
  6. Data CenterVirtualization and the Cloud could also be behind the increased need for IT professionals with backgrounds in data center operations and systems integration.
  7. Web 2.0Tech skills centered around social media will be in demand, with .Net, AJAX and PHP as key back-end skills, with HTML, XML, CSS, Flash and Javascript, among others, on the front end.
  8. SecurityAlthough down from 32 percent in the 2010 survey, security stays a top concern of IT executives.
  9. TelecommunicationsThe survey indicates a demand for people with IP telephony skills, and for those familiar with Cisco IPCC call center systems.

Five Must-Have Apps For Your USB Stick

Takeaway: Don’t get caught out in the field without the tools you need. A USB stick equipped with a few essential apps might just save the day.

Ah, the USB stick — one of the IT admin’s best friends. It travels with you and helps you rescue machines, work magic, and make end users sigh with relief. Some of these USB apps you copy to the hard drive and install; others can be run from the USB stick itself. A few of them are full-blown operating systems that can help you completely recover a corrupted or infected platform.

Whatever the style and purpose, there are plenty of portable apps for the USB stick that can be hard to live without. Here are five tools I deem must-haves.

1: SystemRescueCD

SystemRescueCD  is the Linux distribution to have if you’re going to carry one around on a USB stick. With this distribution, you can recover partitions, recover data, image a disk, test a hard disk, edit configuration files, burn a disk, check for rootkits, run an antivirus scan, securely wipe a hard drive, and much more.

2: Portable Firefox

Portable Firefox is there when you need it. Sometimes, a Web browser is a necessity for solving a problem. But when the browser on the desktop won’t run, what do you do? You break out your portable edition of Firefox. This version of Firefox has all the great features you’re used to. In fact, some will be hard-pressed to figure out that Firefox is running from a USB stick.

3: ComboFix

ComboFix makes almost every recovery tool list for me. No admin kit is complete without this powerhouse. It is my go-to tool when I encounter some of the nastier viruses and rootkits. Almost without fail, if an antivirus can’t catch it, ComboFix can. Unlike common antivirus and anti-malware applications, ComboFix will display (upon completion of running) a detailed report of exactly what it took action on. Note: To run ComboFix, you’ll need to copy the .exe over to the computer and install it.

4: FileZilla Portable

FileZilla Portable is the one and only FTP client to carry around with you. Why would you need an FTP client? There will be times when you must load a file from a troubled computer to another machine. The easiest way to do this (when all other methods fail) is by using a portable FTP client. This is especially crucial when the file is too large to fit on a USB drive or if the file must be loaded to a remote machine you do not have physical access to. This application is run directly from the USB drive and isn’t installed on the PC.

5: Explorer++ Portable

Explorer++ Portable is a file manager with all the usual features you’ve grown to expect from a file manager. But why should you carry a file manager with you? Have you ever had to repair a machine where Explorer won’t run? Makes for a major challenge. Having a portable file manager gets around that issue with ease. And why not have a file manager with features like tabs, keyboard shortcuts, a customizable UI, drag-and-drop support, and merging and splitting? In the end, the file manager is one of the most important tools on a PC. Without it, a machine can easily become crippled.

6: PortableApps

You might have noticed some of these apps link directly to the PortableApps site. That is a tool designed to make your life much easier. You can install PortableApps on your USB drive and then have a user-friendly system to add and remove apps to and from that USB drive with ease. I highly recommend this application for any and all IT admins.

Tips for Supporting iOS 7

ios7

September 18, 2013 was the official release of iOS 7.  Complementary to iOS 7 are several support questions for corporate-owned iOS devices, including Bring Your Own Device (BYOD) and Corporate Owned Personally Enabled (COPE) devices.

COPE devices are corporately compliant prior to distribution to employees; this allows consistency and higher security for all enterprise devices.

There may be a few problems when upgrading to iOS 7 such as older iPhone/iPad devices may not support iOS 7 and not all features are available on all devices or in all countries. 

Here are some tips for supporting iOS 7 in the enterprise. 

Implement VPP

Apple now offers a Volume Purchase Program (VPP) for business.  VPP can retain volume licenses for Apps and Books.  Download Apple’s VPP Guide.

Third-Party iOS Apps

Configuring third-party apps can be completed in iOS 7,  Mobile Device Management (MDM) distributes the third-party configuration and the developer needs to enables it.

Test and Troubleshoot

The most important step before deploying in-house developed enterprise app(s) is to test and troubleshoot.  Testing and troubleshooting will save time and resources after deployment.

Per App VPN

Per app VPN ensures that only managed app data travels through VPN.  iOS 7 apps can automatically be connected to VPN when launched.  Also, for security purposes this tool will separate corporate data and personal data.

 

Rogue Anti-Virus Software Explained

What Is Rogue Anti-virus Software?

It is almost unheard of in this day and age to be online without using anti-spyware and anti-virus software to safeguard your computer against viruses and other malicious code. It’s not surprising to see the prevalence of rogue anti-virus software.

Also called scareware, or rogue security software, or smitfraud, this type of software is also most commonly defined as malware—it is designed specifically to damage or disrupt your computer system. In this case, not only is the software going to disrupt your system, it’s going to try and trick you into making an unsecure credit card purchase.
Rogue anti-virus programs usually appears in the form of a fake Windows warning on your computer system that reads something like, you have a specific number of viruses on your computer (usually in the hundreds) and that this software has detected those viruses. To get rid of these viruses, you’re prompted to buy the full-version of the antivirus software (which is really rogue antivirus software).

The good news is that you probably do not have a computer that is infested with hundreds of viruses as the rouge software claims. The bad news is that the rogue antivirus software itself is on your computer and you must remove it. Removal is hindered as rouge software can lock the control panel and the the Add/Remove Programs function to prevent you from removing it easily.

Other things that may be disrupted by the rogue software include being unable to visit reputable and valid anti-virus and malware Web sites, being able to install legitimate antivirus software and also being unable to access your desktop.

The rogue software wants to stop users from removing the program and proceeding with the purchase instead. It’s important to remember that by purchasing the “claimed full version to remove the viruses” you will be submitting your personal information to unscrupulous persons and may also end up being a victim of credit card or identity theft.

Common names of rogue antivirus software include; AntiVirus (2007, 2008, and 2009), MS-Antispyware, XP AntiVirus (2007, 2008, and 2009), Home Antivirus 2009, SpyWareGuard, Malware Cleaner, Extra Antivirus, AV AntiSpyware, SpywareProtect2009, WinPC Defender as well as many other names.

How Does a Computer Get Infected with Rogue Antivirus Programs?
The reason these rogue anti-virus programs are successful (for the malicious coders) is because the warning screens very closely resemble legitimate Windows warning screens, plus the rouge software program names closely resemble or sound like legitimate antivirus programs.

When you load an infected Web site you might see a warning screen pop up and think that it is a legitimate Windows warning. Users unknowingly are tricked into downloading the software because they believe the warning to be a legitimate Windows messages.

You might also be on a Web site trying to view a video and a screen may pop-up telling you that you need to download a codec to view the file. The window prompting you to download the codec looks legitimate, however you are not going to download a codec—instead you will receive one of the many rogue antivirus software programs.

In April of this year, it was also reported that systems that had been previously infected with Conficker, found this worm had began installing rogue antivirus programs on infected machines. In the early cases this turned out to be a rogue application called SpywareProtect2009. Kaspersky researchers reported this was a typical rogue program that offered to clean the computer for $49.95.

Lastly, if you use file sharing networks you also risk downloading a rogue antivirus as it can be easily hidden inside a legitimate program—that you may or may not be legitimately downloading.
How to Spot Rogue Antivirus Warnings

For the most part, you need to look at the windows that are popping up and the name of the program being shown. If you know the program name of the antivirus and spyware software you use, then seeing a different name in the warning window is the first clue. Also, Windows itself doesn’t warn you of a virus. Legitimate warnings on your system would come from the anti-virus program you have installed, not a random Windows operating system style pop-up window. A great resource for learning how to spot these malicious programs through fake warning messages can be found on bleepingcomputer.com. This page lists the text of some of the more common false warning screens, including the following:

Malware Cleaner: Trojan detected! A piece of malicious code was found in your system that can replicate itself if no action is taken. Click here to have your system cleaned by Malware Cleaner.

AV AntiSpyware: Spyware Alert! Your computer is infected with spyware. It could damage your critical files or expose your private data on the Internet. Click here to register your copy of AV AntiSpyware and remove spyware threats from your PC.
How Do I Get Rid of Rogue Antivirus Programs?

It can be a difficult task to get rogue anti-virus programs off your computer. To complicate the matter, there are many variations of this malicious program and not all variants can be removed in the same way. This is not something that novice computer users may be able to deal with on their own.

Also, due to the popularity of these infections and people searching for answers on how to remove the program a number of scam programs also exist that lead users to believe it will remove the infection. Yes, these programs that claim to rid your system of Antivirus 2009 (or whichever variant you have been infected with) will scan your system and then prompt you for a credit card number so you can download a full version to remove the infection. Sound familiar? It should. This is a vicious cycle that users can unwittingly become trapped in.

Still, the good news is that in many instances you can get rid of the rouge antivirus program without wiping and formatting your hard drive. If you are already infected and you cannot access legitimate security related Web sites, you will need to download the following programs from a second computer and burn them to CD to run on the infected computer.

WARNING: Before running any of the following programs, you should turn off System Restore (you won’t be able to use System Restore as this deletes all restore points). If you don’t turn it off, the programs may not be able to access those system files to clean them. If you are infected the System Restore is not going to return you to an earlier uninfected date anyway. You can turn it back on after you have successfully removed the rouge antivirus program.

The quickest way, and first thing to try is to download Malwarebytes Anti-Malware to get rid of the rogue antivirus. On it’s own this will usually rid your computer of the problem. If Malwarebytes didn’t have the desired results, or you simply want to do a total and complete system clean, you will want to use a combination of CCleaner, Malwarebytes, Asquared, and SpyBot Search and Destroy. These programs all offer freeware versions.

NOTE: In some cases, the rogue anti-virus may block one or more of these legitimate programs. If this is the case, you will need to open the folder where you installed the program on your hard drive and rename the executable file (.exe) to anything other than the program’s name. (e.g. rename mbam.exe to aaa.exe).

Once you have run all the programs, be sure to go back and run CCleaner a final time to get rid of dead registry links from having the rouge antivirus removed. Continue to run the registry option of this program until no problems are found.

Here are additional removal resources:
bleepingcomputer.com: How to remove Extra Antivirus
bleepingcomputer.com: How to uninstall and remove AV AntiSpyware
bleepingcomputer.com: How to uninstall and remove WiniBlueSoft
bleepingcomputer.com: How to uninstall and remove HomeAntivirus 2009
bleepingcomputer.com: How to uninstall and remove Antivirus 2009 (Antivirus 09)
bleepingcomputer.com: How to uninstall and remove PAntispyware09
bleepingcomputer.com: How to uninstall and remove Virus Sweeper
bleepingcomputer.com: How to uninstall and remove WinPC Antivirus
Kaspersky Technical Support and Knowledge Base: How to disinfect rogue spyware

DID YOU KNOW…

In December 2008 it was reported that a Google sponsored link pointed to a malicious Web site where users were redirected to a spoofed CNET Download.com site with offers to download a “spyware free” copy of Winrar. This file included the rogue antivirus program “AntiSpyware2008” (Source)

To read the original article in it’s entirety Click Here

Hosted Dedicated Server Virtualization

Virtual Dedicated Server Can Replace On-Premise Hardware

A virtual dedicated server  is a virtual machine provided by an internet hosting company.  Unlike normal hosting plans, which put many customers’ accounts on a single server, a Virtual Dedicated Server is reserved exclusively for the account and usage of a single customer.  This means that the Virtual Dedicated Server customer has exclusive rights to their server’s bandwidth, memory and storage space and performance is not affected by traffic and the usage patterns of other customers.

When you purchase a Virtual Dedicated Server, you are actually leasing a server box that is configured and set up according to your preferences, but remain at a remote data center. A Virtual Dedicated Server Server account provides you with a dedicated IP address and full control of server usage and software installation, with admin (root) access to the server.

A Virtual Dedicated Server can be used for a variety purposes, including gaming servers, database management and traffic-intensive websites. Dedicated servers are particularly useful for companies and individuals who run very-high-traffic websites or applications and who need the bandwidth, versatility and consistent performance of a dedicated box. You may install anything you want on a dedicated server, as long as the installed material does not violate the restrictions listed on in the license agreement.

Virtualization is the perfect solution for applications that are meant for small-to medium scale usage.

For more information on Dedicated Virtual Servers please contact our support team by email at sales@sjtechies.com or by telephone at (856) 745-9990.

Microsoft Offers $40 Windows 8 Pro Upgrade

We set out to make it as easy as possible for everyone to upgrade to Windows 8. Starting at general availability, if your PC is running Windows XP, Windows Vista, or Windows 7 you will qualify to download an upgrade to Windows 8 Pro for just $39.99 in 131 markets. And if you want, you can add Windows Media Center for free through the “add features” option within Windows 8 Pro after your upgrade.

When you use Windows.com to purchase an upgrade to Windows 8 Pro, the Windows 8 Upgrade Assistant makes upgrading simple by walking you through the upgrade process step-by-step from purchase to download and then of course installation.

The Windows 8 Upgrade Assistant will check to make sure your PC is ready for Windows 8. It will provide a detailed compatibility report that lets you know of anything you may have to address before or after the upgrade and outlines actions to take.

It will also inform you of any application or device compatibility issues. It will ask you what you want to keep from your current Windows installation. You will be able to upgrade from any consumer edition of Windows 7 to Windows 8 Pro and bring everything along which includes your Windows settings, personal files, and apps. If you are upgrading from Windows Vista, you will be able to bring along your Windows settings and personal files, and if you are upgrading from Windows XP you will only be able to bring along your personal files. Of course, if you want to start fresh, you can choose to bring nothing along. Or if you prefer to format your hard drive as part of your upgrade experience, you can do so as long as you boot from media and then format your hard drive from within the setup experience for installing Windows 8, not prior to it.

Once you purchase your upgrade, the Windows 8 Upgrade Assistant kicks off your download. It has a built-in download manager that allows you to pause and continue your download at any time as well as a check to ensure your download completes successfully.

After your download finishes, you can choose to proceed with the upgrade (“Install now”) or install later either from your desktop or by creating your own media. If you choose to create your own media, you will be able to create your own bootable USB or .ISO file which can be burned onto a DVD for upgrade and backup purposes. If you prefer, you also have the option of purchasing a backup DVD for $15 plus shipping and handling.

We believe that your upgrade experience in Windows 8 will be a breeze by offering a faster experience, a single upgrade path, and compatibility from prior versions of Windows. We’ve continued to listen to our customers and have expanded the ability to download to over 100 countries and 37 languages. We have simplified the Windows upgrade experience with the Windows 8 Upgrade Assistant which supports you during your upgrade with everything from selecting your language to pausing your download to built-in compatibility checks – it’s seamless. And if you’re an enthusiast you will have the flexibility to download and control how you upgrade.

If you prefer to shop at a local store, a packaged DVD version of the upgrade to Windows 8 Pro will be available for $69.99 during this promotion.

This upgrade promotion for Windows 8 Pro both online and at retail runs through January 31st, 2013.

Oh, and by the way – if you’re not upgrading from a prior version of Windows and are building your own PC or installing Windows 8 in a virtual machine or a separate partition, you will be able to purchase and install the Windows 8 and Windows 8 Pro System Builder product.

CALL US NOW!