crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Did You Know About These Windows Features?

Does your business use Windows 10? If so, there are all sorts of hidden tips and tricks that can help you gain even more value from your workstations that are running Windows 10. Here are a few of these secrets and how they can help your staff save time.

Show the Desktop
Have you ever had so many applications open at the same time, to the point where all of them need to be closed just to see your desktop? In a business setting, this happens more frequently than you may prefer. Thankfully, there’s a simple way to view your desktop without minimizing or closing out everything that’s open. All you need to do is click on the little button in the bottom-right of your taskbar. It’s pretty easy to miss--it’s all the way to the right, past the time and date, on the right-hand side of your notifications. It will look like just a sliver, so keep your eyes peeled for it.

Rotate Your Screen
If you want to rotate your screen, you can use a simple keyboard shortcut to do so. Ctrl+Alt+D and the direction button for whatever way you want to rotate your screen 90 degrees. While this might not have much practical use, you might be able to use it to rotate an image or document that you’ve opened which isn’t in the upright position.

Right-Click the Start Menu Tiles and Taskbar
Right-clicking the tiles in the Start menu allows you to customize them. You can change their size, unpin them from the Start menu, and even turn off live tiles that you don’t want. Similarly, you can perform various activities by right-clicking the taskbar, including adding shortcuts, activating Cortana, and so much more.

For more hidden tips and tricks for Windows 10, be sure to subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 12 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips IT Services Best Practices Backup Hackers Hosted Solutions Business IT Support Small Business Malware Network Mobile Devices Hardware Email Software Smartphones Data Communication Windows Server Upgrade Business Continuity Mobile Device Management Virtualization Microsoft Office VoIP Efficiency Disaster Recovery Google Computer Miscellaneous Mobile Office Vendor Management Gadgets Holiday Social Media Quick Tips Innovation Windows 10 WiFi BYOD User Tips Mobile Computing Best Practice Bring Your Own Device Passwords Remote Monitoring Browser Smartphone Apple Users Spam Android Wireless Technology Trending Operating System Firewall Content Filtering Internet of Things Remote Computing Outsourced IT History Managed IT services Alert Going Green The Internet of Things Big Data Office Data Management Unified Threat Management Network Security Printer IT Solutions Save Money Lithium-ion Battery Information Technology Current Events IT Consultant Avoiding Downtime Maintenance Data Backup Hard Drives App Artificial Intelligence Customer Relationship Management Windows 8 Ransomware Tech Support Humor Analytics Facebook Managed IT Saving Time Gmail Application Virus Antivirus Employer-Employee Relationship Customer Service Hacking Computers Fax Server Digital Payment Outlook Health Collaboration Risk Management Marketing Excel Office Tips Retail Phishing Phone System IT service Business Growth Apps Proactive IT Training Computer Repair Mouse User Error Password Social Co-Managed IT Mobile Device VPN PowerPoint Two-factor Authentication Presentation Tablet Budget Automation Router Recovery Inbound Marketing iPhone Money Data Recovery Running Cable Administration Sports Hiring/Firing Mobility Printing End of Support Point of Sale Government LiFi Website Computing Statistics Help Desk Office 365 Document Management Net Neutrality Competition IBM Files Network Congestion Downtime File Sharing Applications Social Networking Search Display Virtual Desktop USB Business Owner Encryption Tip of the week Hacker User Programming Intranet Business Intelligence Analyitcs Education Specifications Safety Settings Hosted Solution Licensing Augmented Reality Chrome Wireless Data storage Cybercrime Piracy Save Time Cybersecurity Project Management Robot Halloween SaaS Smart Technology Entrepreneur Unified Communications Computer Accessories Downloads Undo Macro PDF People Networking 5G Scary Stories Distributed Denial of Service Multi-Factor Security Software Tips Company Culture Twitter Data Security Monitors Telephony Managed IT Service Deep Learning Gaming Console Touchscreen Google Calendar Domains Google Wallet Techology Fun Writing Break Fix Word Legislation IT Support Public Speaking Drones eWaste Buisness Disaster Resistance Cortana Social Engineering Private Cloud Dark Web Wearable Technology Identities Managed IT Services Backups Conferencing Environment CIO Adminstration IT Consulting Knowledge Public Cloud Solid State Drive 3D Alerts PC Care Software as a Service Samsung Data loss Legal Value Troubleshooting eBay Debate Data Breach Experience Compliance Sync Heating/Cooling Alt Codes Remote Support Leadership Technology Tips New Additions Crowdfunding Skype Streaming Media Consumers Print Server YouTube Text Messaging Scam Technology Laws Regulations Comparison Mobile Device Managment Typing Work Station Scheduling Congratulations LinkedIn IP Address Google Drive How To Law Firm IT Bandwidth Video Surveillance Unified Threat Management Black Friday Productivity Windows 8.1 Update Refrigeration Cryptocurrency Recycling Disaster Virtual Private Network Best Available Google Docs Flexibility Access Control Cyber Monday Travel Cost Management Bitcoin Digital Signature Memory Redundancy Laptop Bluetooth communications SharePoint Online Currency Hacks Documents Wi-Fi

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...