crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Did You Know About These Windows Features?

Does your business use Windows 10? If so, there are all sorts of hidden tips and tricks that can help you gain even more value from your workstations that are running Windows 10. Here are a few of these secrets and how they can help your staff save time.

Show the Desktop
Have you ever had so many applications open at the same time, to the point where all of them need to be closed just to see your desktop? In a business setting, this happens more frequently than you may prefer. Thankfully, there’s a simple way to view your desktop without minimizing or closing out everything that’s open. All you need to do is click on the little button in the bottom-right of your taskbar. It’s pretty easy to miss--it’s all the way to the right, past the time and date, on the right-hand side of your notifications. It will look like just a sliver, so keep your eyes peeled for it.

Rotate Your Screen
If you want to rotate your screen, you can use a simple keyboard shortcut to do so. Ctrl+Alt+D and the direction button for whatever way you want to rotate your screen 90 degrees. While this might not have much practical use, you might be able to use it to rotate an image or document that you’ve opened which isn’t in the upright position.

Right-Click the Start Menu Tiles and Taskbar
Right-clicking the tiles in the Start menu allows you to customize them. You can change their size, unpin them from the Start menu, and even turn off live tiles that you don’t want. Similarly, you can perform various activities by right-clicking the taskbar, including adding shortcuts, activating Cortana, and so much more.

For more hidden tips and tricks for Windows 10, be sure to subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 17 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Privacy Business Management Managed Service Provider Tip of the Week Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Backup Best Practices IT Services Hackers Hosted Solutions IT Support Network Mobile Devices Hardware Business Email Malware Software Small Business Data Communication Smartphones Windows Server Upgrade Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Efficiency Disaster Recovery Google Computer Miscellaneous Mobile Office Gadgets Vendor Management Social Media Quick Tips Innovation Mobile Computing Holiday Windows 10 WiFi Best Practice Passwords User Tips BYOD Smartphone Bring Your Own Device Users Remote Monitoring Wireless Technology Trending Operating System Apple Spam Android History Internet of Things Alert The Internet of Things Going Green Content Filtering Remote Computing Big Data Firewall Office Managed IT services Unified Threat Management Network Security Browser IT Solutions Lithium-ion Battery Save Money IT Consultant Current Events Information Technology Avoiding Downtime Data Management Hard Drives App Customer Relationship Management Ransomware Analytics Windows 8 Facebook Printer Tech Support Gmail Humor Saving Time Artificial Intelligence Virus Outsourced IT Collaboration Maintenance Fax Server Outlook Health Office Tips Retail Phone System Phishing Marketing Excel IT service Business Growth Managed IT Data Backup Antivirus Customer Service Apps Hacking Application Computers VPN PowerPoint Risk Management Presentation Co-Managed IT Budget Automation iPhone Recovery Administration Running Cable Router Inbound Marketing Computer Repair Proactive IT Employer-Employee Relationship Social Digital Payment Password Mobile Device Training Files Competition Network Congestion File Sharing Social Networking Help Desk Downtime Data Recovery Two-factor Authentication User Error Display Tablet Search USB Virtual Desktop Business Owner Hacker Encryption Intranet Business Intelligence User Programming Project Management Analyitcs Money Cybersecurity Education Safety Augmented Reality Mobility Settings Licensing Piracy Wireless Hosted Solution Chrome Cybercrime Save Time Sports Data storage Point of Sale Hiring/Firing Robot Mouse Printing Document Management End of Support Website Net Neutrality LiFi Statistics IBM Fun Deep Learning Tip of the week Google Wallet Word Public Speaking Technology Laws Wearable Technology Writing Private Cloud Cortana Conferencing eWaste Drones Gaming Console Alerts Buisness PC Care Unified Threat Management Social Engineering Public Cloud Knowledge Value Identities Environment Virtual Private Network Backups eBay Remote Support CIO Leadership Samsung Skype Sync Experience Streaming Media Solid State Drive Troubleshooting New Additions Debate Redundancy Print Server Legal Heating/Cooling Text Messaging Work Station Consumers Crowdfunding Compliance LinkedIn Mobile Device Managment Alt Codes Adminstration Congratulations Law Firm IT 3D Video Surveillance IP Address Recycling YouTube Windows 8.1 Update Regulations Best Available Typing Disaster Networking Google Drive Refrigeration Bandwidth Specifications How To Cryptocurrency Scam Digital Signature Data Security Bluetooth Google Docs Cost Management Scheduling Memory Online Currency Flexibility Software Tips Laptop Bitcoin Techology Computer Accessories Wi-Fi communications Documents Halloween Hacks Entrepreneur Disaster Resistance Undo SaaS 5G Twitter Unified Communications PDF People Company Culture Managed IT Services Scary Stories IT Consulting Touchscreen Telephony Office 365 Data loss Computing Macro Data Breach Monitors Domains

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...