crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Did You Know About These Windows Features?

Does your business use Windows 10? If so, there are all sorts of hidden tips and tricks that can help you gain even more value from your workstations that are running Windows 10. Here are a few of these secrets and how they can help your staff save time.

Show the Desktop
Have you ever had so many applications open at the same time, to the point where all of them need to be closed just to see your desktop? In a business setting, this happens more frequently than you may prefer. Thankfully, there’s a simple way to view your desktop without minimizing or closing out everything that’s open. All you need to do is click on the little button in the bottom-right of your taskbar. It’s pretty easy to miss--it’s all the way to the right, past the time and date, on the right-hand side of your notifications. It will look like just a sliver, so keep your eyes peeled for it.

Rotate Your Screen
If you want to rotate your screen, you can use a simple keyboard shortcut to do so. Ctrl+Alt+D and the direction button for whatever way you want to rotate your screen 90 degrees. While this might not have much practical use, you might be able to use it to rotate an image or document that you’ve opened which isn’t in the upright position.

Right-Click the Start Menu Tiles and Taskbar
Right-clicking the tiles in the Start menu allows you to customize them. You can change their size, unpin them from the Start menu, and even turn off live tiles that you don’t want. Similarly, you can perform various activities by right-clicking the taskbar, including adding shortcuts, activating Cortana, and so much more.

For more hidden tips and tricks for Windows 10, be sure to subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 20 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Best Practices Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Mobile Devices Software IT Support Business Small Business Hardware Network Data Communication Server Smartphones Upgrade Windows Business Continuity VoIP Mobile Device Management Efficiency Microsoft Office Computer Disaster Recovery Google Virtualization Vendor Management Miscellaneous Innovation Mobile Office Gadgets Social Media Holiday Outsourced IT Android Quick Tips Passwords Smartphone BYOD User Tips Mobile Computing WiFi Network Security Data Backup Browser Windows 10 Managed IT services Best Practice Bring Your Own Device Spam Ransomware Remote Monitoring The Internet of Things Internet of Things Apple Users Remote Computing Tech Term Wireless Technology Alert Trending Operating System Data Management Firewall Content Filtering Artificial Intelligence History Data Recovery Gmail Going Green Save Money Encryption App Customer Relationship Management Unified Threat Management Managed IT Printer Tech Support Analytics IT Solutions Lithium-ion Battery Big Data Information Technology Current Events IT Consultant Office Avoiding Downtime Antivirus Maintenance Document Management Cloud Computing Hard Drives Applications Windows 8 Paperless Office Router Employer-Employee Relationship Humor Facebook Saving Time Virus Compliance Automation Fax Server Office Tips Digital Payment Mobile Device Retail Outlook Health Phishing VPN Risk Management IT service Chrome Business Growth Marketing Excel Managed IT Services Website Phone System Customer Service Hacking Computers Apps Collaboration Application Two-factor Authentication Cybersecurity Mouse Budget Data Security Net Neutrality Social User Error Regulations Recovery Co-Managed IT Money Bandwidth PowerPoint Social Networking Running Cable Licensing Tablet Infrastructure Wi-Fi Unified Communications Inbound Marketing iPhone Office 365 Administration Augmented Reality Password Project Management Government Training Computer Repair Presentation Proactive IT Mobile Security Point of Sale Search USB Files Virtual Desktop Mobility Twitter Business Owner Company Culture Help Desk Hacker Programming Tip of the week IBM User Analyitcs Education File Sharing Wearable Technology Safety Specifications Settings Flexibility Hosted Solution Alerts Cost Management Display Wireless Data storage Save Time Cybercrime Robot Scam Hiring/Firing Vulnerability Printing Intranet Productivity Business Intelligence End of Support HIPAA LiFi Recycling Computing Data loss Statistics Redundancy Competition Network Congestion Piracy Internet Exlporer eWaste Downtime Sports Smart Technology Enterprise Content Management Network Management Knowledge Environment CIO Networking Migration Downloads Solid State Drive Distributed Denial of Service Legal Samsung IoT Windows 10 Hotspot Experience Troubleshooting Debate Heating/Cooling Alt Codes Chatbots Machine Learning Multi-Factor Security Gaming Console Touchscreen Managed IT Service Consumers Crowdfunding Star Wars Language YouTube Typing Techology Identity Private Cloud Google Calendar Software Tips Break Fix IP Address Google Drive Utility Computing Server Management Computing Infrastructure How To Refrigeration Cryptocurrency Disaster Disaster Resistance Public Cloud Legislation Dark Web Conferencing Google Docs Healthcare Cooperation Adminstration 3D Bitcoin PC Care Digital Signature IT Consulting Motherboard Sync Data Warehousing Value Memory Hard Drive Patch Management Staff Laptop eBay communications Remote Support Hacks Leadership Modem Mobile Device Managment Software as a Service Skype IT Support Microsoft Excel Streaming Media New Additions Documents Cache Operations Print Server Halloween Data Breach Text Messaging Entrepreneur Work Station Undo Cookies Technology Tips LinkedIn Blockchain 5G Scheduling Congratulations PDF People Management Virtual Private Network Law Firm IT Scary Stories Virtual Reality Technology Laws Video Surveillance Nanotechnology Windows 8.1 Update Travel Comparison Best Available Permissions Monitors Enterprise Resource Planning IT Technicians SaaS Unified Threat Management Deep Learning Domains Google Wallet Screen Reader BDR Black Friday Assessment Fraud Fun Writing Mobile Mirgation Bluetooth Access Control Word Public Speaking Drones Smart Tech Online Currency Identity Theft Cyber Monday Managing Stress IT Management Cortana Social Engineering Buisness Business Technology Storage Telephony SharePoint Computer Accessories Identities Backups Macro Connectivity

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...