News Feed

Apple Mac OS X iMessage Configuration for Additional Email Accounts

20140226we-apple-support-tips-500x500

Summary

It’s possible to setup iMessage to function with other email addresses. For example, if someone uses your email address (instead of your mobile phone number) to send you a text message (instead of sending you an email to your email address) it’s possible to configure iMessage to recognize that and deliver that text message to the iMessage program on your iOS device(s). This requires an existing Apple iMessage account.

Instructions

Follow these instructions to configure iMessage to function with an additional email address.

  1. Start iMessage on your Apple computer. Do this by clicking on the Messages icon in your Applications list.
  2. From the Messages menu, choose Preferences.
  3. Click on the Accounts tab.
  4. Choose your iMessage account listed in the left column.
  5. Click on the Add Email button on the right.
  6. Type the new email address in the space provided. Once entered, that address will be gray with a message next to it saying Email Sent. It will remain gray and unchecked until you confirm that you’re the owner of that account.
  7. A message will be sent to this new email address. Be sure to check your Junk folder in case it isn’t delivered directly to your inbox. To ensure proper delivery, you may want to add this email address to your contacts: appleid@id.apple.com
  8. You’ll receive an email in the email account for the address you just added in step #6 above. Click the link that says Verify Now >
  9. The link will send you to the My Apple ID page on Apple’s website. Login with your Apple ID cloud account. This step, and the previous two steps, ensure that you are the authentic owner of the email address and also of the Apple cloud account being used.
  10. You should get a message on screen that says, Email address verified.
  11. In iMessage Preferences, the new email address should no longer be gray, but instead be black with a checkmark next to it.

Apple Mac OS X Mavericks v10.9.2 Update Fixes SSL Security and Other Issues

20140226we-apple-computer-security-500x500

It’s Time to Update Your Apple Mac Computer

There’s an important security update available for your Apple Mac computer, assuming you’re using Apple OS X Mavericks v10.9.x. To update, go to the Apple menu (upper right corner) and then click on Software Update (second option from the top). You’ll need to restart the computer to complete the update. So, finish and save all work before starting.

Update Summary

The OS X Mavericks v10.9.2 Update is recommended for all OS X Mavericks users. It improves the stability, compatibility, and security of your Mac. (source)

Update Highlights:

  • Adds the ability to make and receive FaceTime audio calls
  • Adds call waiting support for FaceTime audio and video calls
  • Adds the ability to block incoming iMessages from individual senders
  • Includes general improvements to the stability and compatibility of Mail
  • Improves the accuracy of unread counts in Mail
  • Resolves an issue that prevented Mail from receiving new messages from certain providers
  • Improves AutoFill compatibility in Safari
  • Fixes an issue that may cause audio distortion on certain Macs
  • Improves reliability when connecting to a file server using SMB2
  • Fixes an issue that may cause VPN connections to disconnect
  • Improves VoiceOver navigation in Mail and Finder
  • Improves VoiceOver reliability when navigating websites
  • Improves compatibility with Gmail Archive mailboxes
  • Includes improvements to Gmail labels
  • Improves Safari browsing and Software Update installation when using an authenticated web proxy
  • Fixes an issue that could cause the Mac App Store to offer updates for apps that are already up to date
  • Improves the reliability of diskless NetBoot service in OS X Server
  • Fixes braille driver support for specific HandyTech displays
  • Resolves an issue when using Safe Boot with some systems
  • Improves ExpressCard compatibility for some MacBook Pro 2010 models
  • Resolves an issue which prevented printing to printers shared by Windows XP
  • Resolves an issue with Keychain that could cause repeated prompts to unlock the Local Items keychain
  • Fixes an issue that could prevent certain preference panes from opening in System Preferences
  • Fixes an issue that may prevent migration from completing while in Setup Assistant
  • Provides a fix for SSL connection verification

Connecting an iPad Mini, iPad Air, iPhone, or iPod to an External VGA Computer Display

20140225tu-mobile-technology-tips-500x500

Summary

This mobile technology tip provides you with what you need to know to connect an Apple mobile device to an external display.

Shopping List

To make the connection, you’ll need the following:

Steps

Follow these steps to connect everything:

  1. Plug the VGA cable into the computer display.
  2. Plug the Lighting to VGA Adapter into the iPad (or similar device).
  3. Plug the USB Lighting Power Cord into the Adapter so the iPad continues to get a charge and then have the other end plugged into a power adapter.

Windows Computer Setup and Configuration Tasks Checklist for Rebuilding or Setting up New Computers

20131028mo-windows-computer-setup-and-configuration-tasks-640x360

Update

Click here for a revised version of the setup checklist.

Overview

When a computer is purchased new from the store, or if one is being rebuilt by having Windows reinstalled, there are some standard tasks that generally get performed. This page provides suggested guidelines for setting up a computer from the point of reinstalling Windows on a fresh hard drive, or when setting up a refurbished or new computer for the first time.

Time and Cost Required

This process takes about 3 hours of time cumulatively (of actual hands-on), but could span over several days if a person is doing other things while they wait for updates and other processes to complete.

  • For example, working on a computer 10 minutes in one sitting, then 20 minutes sometime later in the day, then 30 minutes later that day, etc. Perhaps 18 of these little sessions could add up to 3 hours total.
  • If data transferring is required, this will take additional waiting time for files to copy.
  • Additional time will be needed for installing software such as Microsoft Office, or office management software (financial, medical, etc.).

Preparation

These initial steps below assume an installation (upgrade) on an old computer that needs to be wiped off and setup again.

  • If Using Existing Drive. If you plan to erase a computer’s existing hard drive and perform a fresh installation of Windows, backup all data first and then install Microsoft Windows 7 [Buy] or Windows 8.1 operating systems. Choose to format the drive for a clean installation.
    • When to Choose This Option. This process is sometimes necessary if a system has become corrupted or infected with a virus.
  • If Replacing Hard Drive. If performing a hard drive replacement, perhaps due to a hard drive crash, remove the old drive and install new drive. If the old drive has crashed, it could be sent to a data recovery center if files need to be recovered.
    • When to Choose This Option. This process is sometimes necessary if your system is messed up and you’d like to take the opportunity to upgrade the drive while installing everything fresh. If your old drive is readable (but perhaps not bootable), you could use an external drive dock or drive enclosure to read files from it.
  • If Working on a New Computer. If you are beginning with a new or refurbished computer, create an image backup using a bootable CD copy of Acronis True Image. This will allow you to restore the computer to like-new condition in the event of a hard drive crash, virus infection, or other system malfunction.
    • Note: Some new computers allow you to create recovery media. If you have this option, then you might ignore the image backup with Acronis at the beginning of this process. However, it may still be useful to make an image backup after you’ve configured your computer and installed all the software described below. That way, a recovery would include all of this work.

Run or Save

When installing downloaded software, you’ll  have an option to Run or Save (and then Run). Saving the software first can be helpful because it’s a record of what’s been installed and it also makes it easier next time if you need to install the software again — or copy it for someone else to use (since these are free programs).

Setup Process

  1. Network Connection. Ideally you’ll want to connect to a fast Ethernet wired Internet connection since there are quite a few large downloads and updates. If that’s not available, then use a wireless connection. When Windows detects a new network connection has been established, it will ask you to define it as public, work, or home. Choose Work in most circumstances, even if you’re on a home network. The Home setting assumes you’d like to share files and printers.
    • Network Adapter Note: If you’re setting up an older refurbished computer using the reinstallation CD, it may be necessary to cross reference the computer serial number to obtain the original system configuration information as well as the network card drivers. Alternatively, if you have a USB to Ethernet adapter with software on CD, you can use that to get connected, and then use the manufacturer’s system information scanner to determine the current configuration.
    • Video Adapter Note: After installing the network card drivers, the next software download needed is the specialized video card drivers if available. This will help the video card run faster and provide you with greater control over video. You can obtain this from the manufacturer’s website.
  2. Shortcut to This Page. Since you’ll be returning to this list repeatedly, it would be helpful to have a shortcut on the desktop to this page.
  3. Make, Model, and Serial Number. It’s important to make a record of the computer serial number because this helps in uniquely identifying the system and looking up pertinent support documents online if needed.
  4. Computer Name. Change the computer name by right clicking on Computer and going to Properties. Typically the default computer name will be something the manufacturer configured.
  5. Remote Access. Install the full version of Teamviewer and configure it for remote access. This allows for the remote management and monitoring during lengthy updates and software installation. When you’re completely done setting up the computer, remove the full version and setup TeamViewer QS (Quick Start) for any future support needs.
  6. Power Options. Change power options for maximum performance and turn off automatic sleep. This ensures ongoing access when remotely checking on lengthy software installations and updates. Once setup is complete, power management can be set to a more energy efficient configuration.
  7. Start to Desktop. Windows 8.1 includes the option to start to the desktop. Right click on the task bar and on the Navigation tab choose/click the option, “When I sign in or close all apps on a screen, go to the desktop instead of Start.”
  8. Recovery Media. Dell and other manufacturers offer an option to create recovery media. A USB flash drive is smaller and faster for this purpose, although DVDs may be less expensive. Since the recovery media is something hopefully you’ll never need, you may not want to spend $15 to $20 on a USB flash drive for this purpose.
    • It’s helpful to have a Lightscribe drive and compatible media for labeling these disks. A Lightscribe system can use the laser to etch text and graphics onto a disc. This is preferred to printing to a disc surface. Otherwise, a sharpie marker and regular media will do.
  9. Windows 8 Start Screen. If you’re working with Windows 8 it will be helpful to organized the Start Menu. You can do this by clicking and dragging icon/tiles as well as right click to resizing them and see customize options. You can right click and then using Control+Left Click, select many tiles, then reduce their size all at one time. Some people may find it helpful to have the Desktop tile/icon set to the maximum size and placed in the top left position for easy access.
    • Depending on the brand of computer, there may be a variety of vendor specific apps included with the computer. These, as well as the Windows 8 specific apps, are probably not going to be used frequently. Until a decision is made about whether to keep them on the Start Menu or not, it’s possible to reduce their tile/icon size and group them.
    • For most users, it’s useful to have programs grouped into at least two categories: Windows 8 Apps and Windows Apps. The difference is that Windows 8 Apps fill the screen and have a minimalist interface — typically no familiar text drop-down menu at the top of the screen and no familiar window sizing options in the upper right. This is because they are designed to be optimized for tablet and smartphone where screen real-estate is a premium and multiple windows aren’t practical. Some people may want to avoid these altogether and only use the desktop-optimized Windows apps that are familiar.
  10. Maintenance User Account. Create a local Maintenance account for system administration tasks. This is helpful for troubleshooting or if the user’s primary account becomes corrupted for some reason.
  11. Visitor User Account. Create a local Visitor account with standard access for limited use. This can significantly reduce future service calls if younger people, friends, family, and other visitors use an account with “Standard” access rights. It restricts what the account can do and also helps put a firewall around the account if a virus tries to launch or install.
  12. Other User Accounts. Create user accounts for each user of the computer or a shared account, depending on user preference.
    • Separate Accounts. Separate user accounts are nice for computers being used by several individuals where each person may want their own Internet bookmarks/favorites, personalized organization of folders, and other customizations. Windows is increasingly becoming custom tailored for each user who has logged in. This will import contacts, calendar, email, files, and settings from the web.
    • Shared Account. For people who are sharing the same files, email account, Internet bookmarks/favorites, and may want to collaborate on projects, having a shared account is okay and it doesn’t require a logout and login before using the computer (if changing from one user to another).
    • Default Account. This is a good time to remove any default user account that came with your computer. For example, some refurbished computers may come with an account called User or User1.
  13. Remove Unnecessary Software. If applicable (for new computers from retail stores), remove any unnecessary demo or trial versions of software. Extra programs can slow down the computer. If you’re working on a refurbished computer, it may only have Windows installed and a minimal set of hardware drivers. This is actually an advantage.
  14. Mozilla Firefox. Install the Mozilla Firefox browser. It’s important to have alternative browsers available as a backup in case the primary browser fails, doesn’t perform properly, or becomes infected.
  15. Google. Make Google the default search engine and startup for Internet Explorer. MSN with Bing is the default. Using MSN as a startup page takes longer to load because of all the images and ads.
  16. Google Chrome. Install the Google Chrome browser. It’s important to have alternative browsers available as a backup in case the primary browser fails, doesn’t perform properly, or becomes infected.
  17. AntiVirus. Install Microsoft Security Essentials if you have Windows 7. This is already included with Windows 8.
  18. Windows Live Essentials. Install the Windows Live Essentials software bundle which includes programs for video editing, photo editing, email, and more. This is already included with Windows 8.1.
    • When the installation is complete, click the Done button.
    • After a short while, the Microsoft Service Agreement will show up. Click Accept.
    • Next, the “Have we met before?” login window will show up. Close the window by clicking the “X” in the upper right corner. When asked, “Are you sure you want to cancel?” click the Yes button.
    • Next, the “Sign in to Windows Live Messenger” window should appear. Click on the blue “Options” text link. Under Sign-in, General, remove the check mark next to “Start Messenger when I log on to my computer.” Click Okay. Close the window by clicking the “X” in the top right corner.
    • If you see a browser message at the bottom of your browser window about the “Windows Live ID Sign-in Helper” add-on from Microsoft…” click the Enable button.
  19. Adobe Flash. Install Adobe Flash. This is already included with Windows 8. When installing Adobe Flash, you can remove the check mark next to “Yes, install Google Chrome as my default browser…”
  20. Adobe Reader. Install Adobe Reader. If you need to display asian and extended language fonts, click here for instructions. When installing Adobe Reader, you can remove the check mark next to “Yes, install Google Chrome as my default browser…”
  21. Microsoft Silverlight. Install Microsoft Silverlight for viewing animation, videos, and other web-based programs.
  22. Windows Updates. Install any needed Windows updates. You’ll find Windows Update under the Start Menu – not listed under any folders, but listed in the top list of programs. It may be necessary to run Windows Update again, and keep checking Windows updates repeatedly until all updates are installed. Be sure to updates for all Microsoft products. This requires clicking on the appropriate link in the update window.
    • Bing Desktop. Choosing to install updates for all Microsoft products will include Bing Bar and Bing Desktop. Install these and then once they are installed, disable them. During the Bing Desktop installation, remove all checkmarks for the various Bing options.
    • Bing Bar. Once Bing Bar is installed, click the settings gear icon, and choose to not run Bing Bar when Windows starts. Then exit Bing Bar by right clicking the program icon in the bottom of the screen and choosing Exit.
    • Skype. Be default, Skype will be listed among the standard Widows updates. Right click and choose to ignore this unless the person needs Skype.
  23. Avast AntiVirus. Install Avast AntiVirus software or another top rated antivirus and Internet security program. It’s important to have a program that also helps prevent attacks through phishing or malicious websites. So, a more comprehensive paid program is probably worth is. Avast offers a paid version, as do the other programs out there.
  24. Product Support Shortcut. Most manufacturers have a method for obtaining detailed support, software, downloads, and documentation for your specific computer. The Dell Support Page, for example, lets you enter the Service Tag or Express Service Code for a computer, and then provides a web page (with the serial number in the address) showing your product configuration and support materials. You can save a link to this page on the desktop for easy access in the future. Putting this on the desktop in the Maintenance user account is best.
  25. Remove TeamViewer and Install TeamViewerQS. The most recent versions of TeamViewer are persistent (they run when Windows starts) and by necessity they retain the password for unattended access (if that is configured). While this is secure, a more secure practice is to remove the full version of TeamViewer and replace it with the QuickStart version found on the download page under the heading, “For the instant customer: TeamViewer QuickSupport.” This will allow the computer owner to request support whenever needed, but the password will be randomly generated.

Additional Optional Setup

The following options are less critical and will likely be unique to each user’s preference and needs.

  1. Apple QuickTime. Install the Apple Quick Time Player software. Choose QuickTime 7.7.5 for Windows (or later).
  2. Apple iTunes. Install iTunes if you would like to have the Apple iTunes store and software for purchasing and playing music, reading books, watching movies, etc. You may want to use this if you have an iPod, iPhone, or iPad.
  3. Google Picasa. Install Google Picasa photo editing software.
  4. VLC Video Player. Install the VLC Player for playing a variety of video formats.
  5. Audacity. Install Audacity if audio recording and editing are desired.
  6. Libre Office. Install Libre Office if you’d like a free alternative to Microsoft Office.
  7. Microsoft Office. Purchase Office 365 for a cost of $100 a year for up to five computers. This isn’t required, but may be necessary if you absolutely need to use Microsoft Office software products.
  8. Additional Software. Install software for printers, scanners, and other peripherals.

Following the Twitter Rules of Use Guidelines to Avoid Account Suspension

Accounts on Twitter perceived to be used only for promoting a single website through manual or automated methods may be suspended. Beow are the Twitter rules as of 20 February 2014. (Source: Twitter)

* * *

Below are the Twitter rules as of 20 February 2014. (Source: Twitter)

Our goal is to provide a service that allows you to discover and receive content from sources that interest you as well as to share your content with others. We respect the ownership of the content that users share and each user is responsible for the content he or she provides. Because of these principles, we do not actively monitor and will not censor user content, except in limited circumstances described below.

Content Boundaries and Use of Twitter

In order to provide the Twitter service and the ability to communicate and stay connected with others, there are some limitations on the type of content that can be published with Twitter. These limitations comply with legal requirements and make Twitter a better experience for all. We may need to change these rules from time to time and reserve the right to do so. Please check back here to see the latest.

  • Impersonation: You may not impersonate others through the Twitter service in a manner that does or is intended to mislead, confuse, or deceive others.
  • Trademark: We reserve the right to reclaim usernames on behalf of businesses or individuals that hold legal claim or trademark on those usernames. Accounts using business names and/or logos to mislead others may be permanently suspended.
  • Private information: You may not publish or post other people’s private and confidential information, such as credit card numbers, street address or Social Security/National Identity numbers, without their express authorization and permission.
  • Violence and Threats: You may not publish or post direct, specific threats of violence against others.
  • Copyright: We will respond to clear and complete notices of alleged copyright infringement. Our copyright procedures are set forth in the Terms of Service.
  • Unlawful Use: You may not use our service for any unlawful purposes or in furtherance of illegal activities. International users agree to comply with all local laws regarding online conduct and acceptable content.
  • Misuse of Twitter Badges: You may not use badges, such as but not limited to the Promoted or Verified Twitter badge, unless provided by Twitter. Accounts using these badges as part of profile photos, header photos, background images, or in a way that falsely implies affiliation with Twitter may be suspended.

Abuse and Spam

Twitter strives to protect its users from abuse and spam. User abuse and technical abuse are not tolerated on Twitter.com, and may result in permanent suspension. Any accounts engaging in the activities specified below may be subject to permanent suspension.

  • Serial Accounts: You may not create multiple accounts for disruptive or abusive purposes, or with overlapping use cases. Mass account creation may result in suspension of all related accounts. Please note that any violation of the Twitter Rules is cause for permanent suspension of all accounts.
  • Targeted Abuse: You may not engage in targeted abuse or harassment. Some of the factors that we take into account when determining what conduct is considered to be targeted abuse or harassment are:
    • if you are sending messages to a user from multiple accounts;
    • if the sole purpose of your account is to send abusive messages to others;
    • if the reported behavior is one-sided or includes threats
  • Username Squatting: You may not engage in username squatting. Accounts that are inactive for more than six months may also be removed without further notice. Some of the factors that we take into account when determining what conduct is considered to be username squatting are:
    • the number of accounts created
    • creating accounts for the purpose of preventing others from using those account names
    • creating accounts for the purpose of selling those accounts
    • using feeds of third-party content to update and maintain accounts under the names of those third parties
  • Invitation spam: You may not use Twitter.com’s address book contact import to send repeat, mass invitations.
  • Selling usernames: You may not buy or sell Twitter usernames.
  • Malware/Phishing: You may not publish or link to malicious content intended to damage or disrupt another user’s browser or computer or to compromise a user’s privacy.
  • Spam: You may not use the Twitter service for the purpose of spamming anyone. What constitutes “spamming” will evolve as we respond to new tricks and tactics by spammers. Some of the factors that we take into account when determining what conduct is considered to be spamming are:
    • If you have followed and/or unfollowed large amounts of users in a short time period, particularly by automated means (aggressive following or follower churn);
    • If you repeatedly follow and unfollow people, whether to build followers or to garner more attention for your profile;
    • If your updates consist mainly of links, and not personal updates;
    • If a large number of people are blocking you;
    • If a large number of spam complaints have been filed against you;
    • If you post duplicate content over multiple accounts or multiple duplicate updates on one account;
    • If you post multiple unrelated updates to a topic using #, trending or popular topic, or promoted trend;
    • If you send large numbers of duplicate @replies or mentions;
    • If you send large numbers of unsolicited @replies or mentions in an aggressive attempt to bring attention to a service or link;
    • If you add a large number of unrelated users to lists in an attempt to bring attention to an account, service or link;
    • If you repeatedly create false or misleading content in an attempt to bring attention to an account, service or link;
    • Randomly or aggressively favoriting Tweets through automation in an attempt to bring attention to an account, service or link;
    • Randomly or aggressively Retweeting accounts through automation in an attempt to bring attention to an account, service or link;
    • If you repeatedly post other users’ account information as your own (bio, Tweets, url, etc.);
    • If you post misleading links (e.g. affiliate links, links to malware/click jacking pages, etc.);
    • Creating multiple misleading accounts in order to gain followers;
    • Selling followers;
    • Purchasing followers;
    • Using or promoting third-party sites that claim to get you more followers (such as follower trains, sites promising “more followers fast,” or any other site that offers to automatically add followers to your account);
  • Pornography: You may not use obscene or pornographic images in either your profile photo, header photo, or user background.

Your account may be suspended for Terms of Service violations if any of the above is true. Please see our help pages onFollowing rules and best practices and Automation rules and best practices for a more detailed discussion of how the Rules apply to those particular account behaviors. Accounts created to replace suspended accounts will be permanently suspended.

Accounts engaging in any of these behaviors may be investigated for abuse. Accounts under investigation may be removed from Search for quality. Twitter reserves the right to immediately terminate your account without further notice in the event that, in its judgment, you violate these Rules or the Terms of Service.

We may revise these Rules from time to time; the most current version will always be at twitter.com/rules.

Have Questions?

Check out our complete list of articles outlining our policies, guidelines, and best practices.

To report an account for violation of the Twitter Rules, please use our forms.

Saving a Microsoft Word Document as a JPG Image File

Summary

Widows users will need to find a program that allows you to save PDF files as JPG images. Apple users can follow the instructions below using features already available on Apple Mac computers.

Instructions

For users on an Apple computer, follow these steps to create a JPG image file from a Microsoft Word document.

  1. In Word, save the document as a PDF file.
  2. Open the PDF file using the Apple Preview utility.
  3. In Preview, from the File menu, choose Export.
    1. Format. From the Format drop-down menu, you can choose JPEG as the file format you are exporting to.
    2. Quality. For the Quality setting, moving the slider further to the right increases the quality, but also the file size. Typically having it set to the notch just below maximum quality is okay.
    3. Resolution. The Resolution setting also determines the quality of the image. Setting resolution to 400 with Quality on Maximum would produce a JPEG image of about 3MB for an 8.5×11 inch page. Setting resolution to 200 with Quality on the notch below maximum will produce a JPEG image file of about 590kb while retaining almost the same visual quality. So, you may need to adjust this slightly for the quality you need.

 

Considerations for 64-bit editions of Office 2013

(Source: Microsoft TechNet)

Updated: July 23, 2013

Summary: Explains the benefits and drawbacks of deploying 64-bit Office, and why we recommend the 32-bit version of Office 2013 for most users.

Applies to:  Office 2013 | Office 365 ProPlus 

Audience: IT Professionals

As more and more personal computers run 64-bit versions of Windows, it’s tempting to deploy the 64-bit version of Office 2013 to match. One benefit is that 64-bit Office allows users to work with larger sets of Excel and Project data. But, there are compatibility drawbacks for those users because Office add-ins and solutions might not work. That’s why 32-bit Office 2013 is recommended for most users.

Important:
Are you installing Office at home? Learn how to choose between 32-bit and 64-bit Office and how to install the 64-bit version of Office 2013 from Office.com. No matter where you install Office 2013 or Office 365 ProPlus from, the 32-bit version is always recommended.

32-bit Office is recommended for most users

We recommend the 32-bit version of Office, because it is more compatible with most other applications, especially third-party add-ins. This is why the 32-bit version of Office 2013 is installed by default, even on 64-bit Windows operating systems. On these systems, the 32-bit Office client is supported as a Windows-32-on-Windows-64 (WOW64) installation. WOW64 is the x86 emulator that enables 32-bit Windows-based applications to run seamlessly on 64-bit Windows systems. This lets users continue to use existing Microsoft ActiveX Controls and COM add-ins with 32-bit Office.

64-bit Office has advantages that benefit only specific kinds of users and workloads

There are several cases in which you should consider deploying 64-bit Office 2013. Here are several examples:

  • Excel expert users who work with complex Excel worksheets can benefit from using 64-bit Office 2013. This is because 64-bit Office doesn’t impose hard limits on file size. Instead, workbook size is limited only by available memory and system resources. On the other hand, 32-bit Office is limited to 2 gigabytes (GB) of virtual address space, shared by Excel, the workbook, and add-ins that run in the same process. (Worksheets smaller than 2 GB on disk might still contain enough data to occupy 2 GB or more of addressable memory.) You can learn more in Excel specifications and limits and Data Model specifications and limits.
  • Users who use Project 2013 also benefit when they use Project files over 2 GB, especially when they are dealing with many subprojects to a large project.
  • In-house Office solution developers should have access to the 64-bit Office 2013 for testing and updating these solutions.
  • Office 2013 offers enhanced default security protections through Hardware Data Execution Prevention (DEP). (DEP) is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. For 64-bit installs, DEP will always be enforced for Office applications. On 32-bit installs, you can configure DEP by using Group Policy settings.

Review the requirements for deploying Office 64-bit

In addition to reviewing the Office 2013 system requirements, we recommend that you review these sections before you deploy 64-bit Office:

64-bit Office only works on 64-bit Windows

You can install the 64-bit Office only on 64-bit versions of Windows 7, Windows 8, Windows 8.1, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2.

Running 32-bit and 64-bit versions of Office on the same computer isn’t supported

Office 2013 doesn’t support running side-by-side installations of 64-bit and 32-bit versions of Office. For example, you can’t install Office 2010 32-bit side-by-side with Office 2013 64-bit. This applies to both Windows Installer (MSI) and Click-to-Run installations of Office 2013. If you try to do this, you’ll receive an error message and be prevented from continuing.

When you upgrade to Office 2013, the architecture versions must be the same for the old and new version

When you deploy the MSI-based version of Office 2013, you can only upgrade Office to the same architecture. For example, you can upgrade from Office 2010 32-bit to Office 2013 32-bit, and you can upgrade from Office 2010 64-bit to Office 2013 64-bit.

If you want to switch between 32-bit and 64-bit versions, you must uninstall and then re-install Office 2013

If you install 32-bit and then later decide you want to switch to 64-bit, you have to uninstall the 32-bit version, and then re-install the 64-bit version. The reverse is also true—going from 64-bit Office to 32-bit Office also requires an uninstall and then a re-install.

Some applications block 64-bit Office 2013 installations

These applications also block a 64-bit Office 2013 installation:

  • Microsoft Office Excel Viewer
  • Access database engine of Access 2013
  • Compatibility Pack for the 2007 Office system

For additional information about applications and components that block 64-bit Office 2013, see KB 2269468: You receive the error message “You cannot install the 64-bit version of Office 2010 because you have 32-bit Office products installed”.

Compatibility issues that you’ll have to consider if you deploy 64-bit Office

Before you decide to deploy 64-bit Office 2013, consider these disadvantages:

Some 32-bit features aren’t in 64-bit versions of Office

Most features that are included in the 32-bit version of Office are included in the 64-bit version of Office. The following are some features that aren’t in the 64-bit version of Office.

  • Word   The legacy Equation Editor isn’t supported on 64-bit Office 2013, but is supported for 32-bit Office 2013 installations (WOW64). However, the equation builder feature in Word 2013 works on all platforms.
  • WLL (Word Add-in libraries)   WLL files are available for 32-bit Office 2013 and aren’t supported in 64-bit Office 2013.

Graphics rendering might have performance implications

Differences between the 32-bit and 64-bit Graphics Device Interface (GDI) might have performance implications because of the lack of MMX support on 64-bit. Intel’s MMX technology is an extension of the Intel architecture (IA) instruction set. The technology uses a single-instruction, multiple-data (SIMD) technique to speed up multimedia and communications software by processing data elements in parallel.

VBA code that uses Declare statements must be updated

Running VBA code that was written before the Office 2010 release (VBA version 6 and earlier) on a 64-bit platform can result in errors if the code isn’t changed to run in 64-bit versions of Office. To learn about the Microsoft Visual Basic for Applications (VBA) changes that were introduced in Office 2010, see 64-Bit Visual Basic for Applications Overview in the MSDN Library.

ActiveX controls and COM add-ins that were written for 32-bit Office won’t work in a 64-bit process

Computers can have 64-bit and 32-bit controls installed, and Office 2013 64-bit can only run the 64-bit versions of the controls. The workaround for resolving these issues is to obtain 64-bit compatible controls and add-ins or to install Office 2013 32-bit.

In addition to controls that load into Office applications, there are web-based solutions that use ActiveX controls in Internet Explorer. Office 2013 Datasheet views that are created by using a SharePoint Server 2013 work on any platform and in browsers other than Internet Explorer. The SharePoint Server 2013 Edit in Datasheet view doesn’t require a client-side control. For example, if a user has Office 2010 64-bit or Office 2013, Edit in Datasheet will work correctly on SharePoint Server 2013.

note Note:
For SharePoint Server 2010, 64-bit versions install some Office 32-bit client-side controls for supporting solutions in a 32-bit browser (the default browser on current 64-bit Windows systems). The Edit in Datasheet view functionality in SharePoint Server 2010 isn’t supported if you install 64-bit Office 2013 client. The Edit in Datasheet functionality is available if you install 32-bit Office 2013 client.

 

Microsoft Access .mde, .ade, and .accde database files that have had their source code removed can’t be moved between 32-bit and 64-bit versions of Office 2013

The .MDE and .ACCDE files, a common way for Access software developers to distribute solutions and protect their intellectually property, don’t work in the 64-bit version of Office. You must contact the application developer to recompile, retest, and redistribute the solution in the 64-bit version.

MAPI applications that work with Outlook must be rebuilt

If your organization developed 32-bit MAPI applications, add-ins, or macros for Outlook, there are actions that you should take to change and rebuild the 32-bit applications to run on a 64-bit platform. For information about how to prepare Outlook applications for 32-bit and 64-bit platforms, see the Outlook 2013 MAPI Reference in Microsoft Office Development in the MSDN Library.

In-place OLE activation might not work if the version of Office 2013 doesn’t match registered applications

The following issues might occur if there is no match between the version (32-bit or 64-bit) of Office 2013 and registered applications:

  • An OLE server might not instantiate in-place and might not open if the application registered isn’t the same version as the version of Office installed. This can occur, for example, if the OLE Server application is 32-bit and the version of Office installed is 64-bit.
  • An object inserted into an Office 2013 application document might fail in cross-version scenarios. This can occur, for example, if you insert a 32-bit object in a 64-bit Office 2013 application document.

Telemetry Log can help you identify compatibility issues with 64-bit Office

Telemetry Log is part of the new Office Telemetry monitoring framework that is built into Office 2013. It helps developers and experienced users diagnose compatibility issues by displaying events that occur within select Office 2013 applications. Among the issues it identifies are Visual Basic 6.0 controls that don’t work in 64-bit versions of Office.

When you’re ready to start assessing Office 2013 compatibility, we recommend that you start with the Assess Office 2013 compatibility. To troubleshoot add-ins and solutions on a computer that runs Office 2013, use Telemetry Log.

Change History

Date Description
July 23, 2013 Reorganized and revised the content.
July 16, 2012 Initial publication

 

 

WireTap Studio 1.2.2 Release Notes

WireTap Studio by Ambrosia Software is a utility for Apple Mac computers that allows them to record audio from various sources including programs and the web.

These are the release notes for the 1.2.2 version:

  • Fixed French localization of registration panel. (#7094)
  • Fixed preferences when running in French. (#6979)
  • Fixed missing images in splash screen when running in French. (#6980)
  • Default format on first launch is now AAC. (#6957)
  • Hotkeys now properly default to nothing. (#6951)
  • Tags are again properly added to MP3s. (#6954)
  • File format table column is now wide enough to display all file types. (#6956)
  • Now supports scheduled recordings up to 24 hours in duration. (#6945)
  • Self healer packages more reliably open with Installer.app. (#6974)
  • Prefers “Apple MPEG-4 AudioBooks” over “MPEG-4 Bookmarkable” on systems that support it (10.8+)
  • . (#6986)
  • Fixed a bug that could cause the kext to not be upgraded properly. (#6961)
  • Can now edit tags on files that have been imported into the library. (#7004)

Box World Tour 2014 – Cloud Storage Symposium and Conference

20140212we-box-world-tour-640x300

How will changes taking place in the new information economy impact your business?

How will you make sure your workforce is collaborating and managing their content in a way that ensures your business is more competitive and powerful?

Click here to complete the registration form and join us at Box World Tour. You’ll hear from industry leaders such as Aaron Levie, Geoffrey Moore and Whitney Bouck on how the cloud is transforming business in 2014.

At this summit you will:

  • Understand why over 200,000 businesses such as Southwest Airlines, P&G, Schneider Electric, New Balance, Netflix, Spotify, the BBC and more than 97% of Fortune 500 choose Box to power their collaboration and content management
  • Hear about new ways to improve collaboration internally and with external teams, partners and clients
  • Gain insight into how you can quickly make all of your business information and content just as available and secure on mobile devices as on your office desktop
  • Learn how Box can help your business today with in-depth demos, plus a peek into the future of where Box is going

PDFPenPro for Apple Mac Adobe PDF File Editing – Software Update

20140212we-pdfpenpro-smilesoftware-470x200

Summary. There has been a software update to PDFPenPro by Smile Software as described below.

* * *

PDFpenPro 6.1.4 is a free update for all registered users of PDFpenPro 6. Users of PDFpenPro 5, please see Note below.

What’s new in PDFpenPro 6.1.4:

  • Increases PDF page limit to 999 when creating from HTML (PDFpenPro only)
  • Improves responsiveness when using a tablet with the scribble tool
  • Resolves possible crash when printing
  • Other fixes and improvements

What’s new in PDFpenPro 6.0:

  • Adds editing bar for faster, easier access to tools and properties
  • Export in Microsoft® Word (.doc, .docx) format (requires Internet connection, must be licensed user)
  • Optimized for full resolution viewing on Retina displays
  • Updates and improves document window appearance
  • Supports autosaving and document versions
  • Supports printing lists of annotations
  • Adds filtering by type of displayed annotations
  • Adds option to highlight form fields with transparent background
  • Adds support for re-ordering items in the Library
  • Adds Russian language OCR
  • Edit document permissions to control saving, printing, copying, etc.
  • Create form fields automatically

PDFpenPro 5 Users, Please Note

PDFpenPro 6 is a paid upgrade and requires OS X 10.7 Lion or later.
It costs $30 to upgrade to PDFpenPro 6. If purchased on or after October 15, 2012, your upgrade is free and should be automatic.

There is no risk to try PDFpenPro 6. When you choose Install Update, PDFpenPro 5 will be saved in Applications or can be re-downloaded from our site. If you decide not to upgrade to PDFpenPro 6, you may continue to use PDFpenPro 5.