Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Miss The Start Menu From Windows 8? Here’s How To Bring It Back

Tip of the Week: Miss The Start Menu From Windows 8? Here’s How To Bring It Back

Remember how when Windows 8 came out, it had that slick tiled Start screen? If you are one of the people who miss that interface, you are in luck. While Windows 10 returned the nostalgia of the traditional Start menu, you can emulate the experience of Windows 8’s tiled screen relatively easily in Windows 10.

First thing’s first--open your Start menu and select the Settings icon. This is the gear-shaped one. Alternatively, you can simply use the Windows key and the I key for a keyboard shortcut. Next, you’ll want to navigate to Personalization > Start. You should see the option for Use Start full screen. Once you’ve turned on this setting, your Start menu should open into the full-screen mode.

While it doesn’t quite look exactly like its Windows 8 counterpart, it has some similar functionality built into it. You’ll see icons for all of the usual suspects, including apps that you use on a regular basis, and icons for opening up various menus. You’ll also be able to see your pinned tiles in an easy way. Another note is that this can actually make navigation a little bit easier if you are using Windows 10 on your tablet.

If you want to just use the normal Start menu and change the size of it without going full-size, you can do that as well. Just open your Start menu and click on the edge. You can click and drag your Start menu to suit your specific size needs. You’ll see more tiles depending on how large you make it.

Speaking of Windows 8, are you still using it for your business’s needs? If so, you should really consider upgrading to Windows 10. If your business is struggling to implement the latest and greatest software solutions, or you just want all of the best tips and tricks, reach out to Professional Computer Associates at 845-876-6561.

Essential Cybersecurity Tips From The FBI
Your Guide To Mobile Device Management as an SMB
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 April 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Disaster Recovery Google Software VoIP Microsoft Business Continuity Business Mobile Devices Email Internet Productivity Outsourced IT Data Innovation Smartphones Cybercrime Efficiency Ransomware Windows 10 IT Support Data Backup Hardware Android Browser communications Computer Cloud Computing Office IT Services Alert Telephone Systems Computers Server Virtualization User Tips Data Recovery Mobile Device Management Windows Business Management Small Business Saving Money Smartphone Chrome Network Upgrade BDR Cybersecurity Quick Tips BYOD Social Engineering Internet of Things Passwords Workplace Tips Law Enforcement App Firewall Recovery Managed IT Private Cloud Hacking Mobility How To Work/Life Balance Microsoft Office Office Tips Avoiding Downtime Collaboration Holiday Productivity Social Media Save Money Miscellaneous Business Intelligence HaaS Budget Two-factor Authentication Password Health VPN Information Technology Redundancy Bandwidth Communication Data Protection Flexibility Wi-Fi Phishing Facebook Data Management Data Security Operating System Bring Your Own Device Managed Service Provider Gmail Office 365 Proactive IT Money Remote Monitoring Identity Theft Automation Artificial Intelligence Windows 10 Safety Value Risk Management Employer-Employee Relationship Gadgets Apps Spam Router Black Market Compliance Google Drive Cleaning Vulnerability Data Breach Managed IT Services Tech Term Big Data User Error SaaS Marketing CES End of Support Hiring/Firing HIPAA Internet Exlporer Computer Care Wearable Technology Samsung Credit Cards Patch Management The Internet of Things Business Owner IT Management Keyboard Scam Word OneNote IT Plan Public Cloud Document Management Remote Computing Wireless Technology Unsupported Software Save Time DDoS PDF Worker Comparison Automobile Computing Infrastructure Meetings Wireless Physical Security Mobile Computing Legal Apple Spam Blocking Battery Data loss Training Mobile Device eWaste Update Downtime Content Filtering Settings History Applications Charger Electronic Medical Records Best Practice Data Storage Entertainment Shadow IT Solid State Drive Workers Data storage Government Encryption Knowledge Touchpad Voice over Internet Protocol Virtual Reality Windows Server 2008 Smart Tech Outlook Supercomputer Emergency Notifications YouTube Professional Services Instant Messaging FENG People Cables Fax Server Network Congestion Content Management Internet exploMicrosoft Employer Employee Relationship Multi-Factor Security Worker Commute Data Warehousing Windows 7 Emails Insurance Humor Current Events iPhone Tools Search Mobile Office Unified Communications IT solutions Blockchain Advertising Computer Accessories Trending Fraud Sports Regulations Practices Monitor NarrowBand How to Theft IT Consultant Human Resources Bluetooth Lifestyle Amazon Experience Techology Hosted Computing Loyalty Reputation Cortana Files Transportation Botnet Antivirus Leadership Staff Hybrid Cloud Customer Amazon Web Services Music Servers Netflix Inventory Google Apps Colocation Benefits Chromecast Travel Root Cause Analysis Software Tips WiFi Digital Signature Distributed Denial of Service Online Shopping USB Flash Assessment Infrastructure Smart Technology Uninterrupted Power Supply webinar Strategy Rootkit Specifications Evernote Troubleshooting Sync Television Password Manager hacker Software as a Service HBO Conferencing Analysis Millennials Content Mouse Hosted Solution Telephony Windows 10s Public Computer Business Mangement Two Factor Authentication Education Screen Mirroring Frequently Asked Questions IT Support Accountants Vendor Management Workforce Audiobook Lithium-ion battery Skype Environment Recycling Going Green Google Docs Running Cable Cast Streaming Media Tech Support Excel Hard Drives Robot Telecommuting Politics Networking Relocation Start Menu Video Games Audit Wireless Charging Criminal Laptop Website Users Tip of the week SharePoint IoT Unified Threat Management Remote Work IBM Books Mobile Scalability IaaS Computer Fan Fiber-Optic Webinar IT solutions CrashOverride Access Control Thank You Authentication Congratulations Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!