Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Miss The Start Menu From Windows 8? Here’s How To Bring It Back

Tip of the Week: Miss The Start Menu From Windows 8? Here’s How To Bring It Back

Remember how when Windows 8 came out, it had that slick tiled Start screen? If you are one of the people who miss that interface, you are in luck. While Windows 10 returned the nostalgia of the traditional Start menu, you can emulate the experience of Windows 8’s tiled screen relatively easily in Windows 10.

First thing’s first--open your Start menu and select the Settings icon. This is the gear-shaped one. Alternatively, you can simply use the Windows key and the I key for a keyboard shortcut. Next, you’ll want to navigate to Personalization > Start. You should see the option for Use Start full screen. Once you’ve turned on this setting, your Start menu should open into the full-screen mode.

While it doesn’t quite look exactly like its Windows 8 counterpart, it has some similar functionality built into it. You’ll see icons for all of the usual suspects, including apps that you use on a regular basis, and icons for opening up various menus. You’ll also be able to see your pinned tiles in an easy way. Another note is that this can actually make navigation a little bit easier if you are using Windows 10 on your tablet.

If you want to just use the normal Start menu and change the size of it without going full-size, you can do that as well. Just open your Start menu and click on the edge. You can click and drag your Start menu to suit your specific size needs. You’ll see more tiles depending on how large you make it.

Speaking of Windows 8, are you still using it for your business’s needs? If so, you should really consider upgrading to Windows 10. If your business is struggling to implement the latest and greatest software solutions, or you just want all of the best tips and tricks, reach out to Professional Computer Associates at 845-876-6561.

Essential Cybersecurity Tips From The FBI
Your Guide To Mobile Device Management as an SMB


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Managed IT Services Google VoIP Mobile Devices Microsoft Disaster Recovery Software Productivity Email Business Continuity Business Internet Outsourced IT Data Innovation Data Backup Cybercrime Efficiency communications Smartphones Windows 10 Computer Ransomware IT Support Browser Android Data Recovery Cloud Computing Hardware IT Services Office BDR Internet of Things Windows Alert Saving Money Computers Server Tech Term Business Management Telephone Systems Virtualization User Tips Mobile Device Management Network Small Business Smartphone Cybersecurity Upgrade Save Money Law Enforcement Microsoft Office Collaboration Quick Tips Managed IT BYOD Chrome Workplace Tips Social Engineering Bandwidth Productivity Money Facebook Recovery Communication Artificial Intelligence Holiday Password Office 365 Private Cloud How To Social Media Miscellaneous Hacking Passwords Mobility App Work/Life Balance Router Office Tips Firewall Managed Service Provider Avoiding Downtime Business Intelligence Applications Proactive IT Remote Monitoring Two-factor Authentication HaaS Operating System Automation Gmail Budget Health Information Technology Data Protection Redundancy Phishing Data Security Flexibility Wi-Fi Data Management Bring Your Own Device VPN Data Breach Employer-Employee Relationship SaaS Identity Theft Blockchain Big Data Windows 10 Word Safety Value Document Management Marketing User Error Spam Entertainment Gadgets Connectivity Black Market Apps Vulnerability Compliance Google Drive Managed IT Services Mobile Device Cleaning Risk Management Workers History Content Management Content Filtering DDoS Best Practice Charger Data storage Shadow IT Networking Electronic Medical Records Government Credit Cards Windows 7 End of Support Solid State Drive Meetings Internet Exlporer IT Management Hiring/Firing Wireless YouTube Computer Care HIPAA Apple OneNote IT Plan The Internet of Things Samsung eWaste Sports Patch Management Unsupported Software Business Owner Access Control Settings Servers Infrastructure Public Cloud Keyboard Remote Computing Scam Streaming Media Wireless Technology Comparison Analysis Save Time Encryption Spam Blocking PDF Data loss Worker Computing Infrastructure Automobile Paperless Office USB Wearable Technology Physical Security Mobile Computing Update IT Support Legal Battery Training Downtime CES Data Storage Education Website Smart Tech Remote Work Content Filter Tip of the week Vendor Management Cables Audiobook Going Green Antivirus Robot Tech Support Electronic Health Records Mobile Computer Fan Knowledge Relocation Business Technology Voice over Internet Protocol Insurance Storage Windows Server 2008 Unified Communications Politics Laptop Hard Drives Video Games Machine Learning Professional Services FENG Data Warehousing Distributed Denial of Service Network Congestion Users WiFi Virtual Assistant IaaS Multi-Factor Security Practices Unified Threat Management Theft Emails Touchpad Outlook Scalability Tools IBM Human Resources Books Virtual Reality Telephone System Trending Hosted Computing Fraud Addiction Regulations Cortana Internet exploMicrosoft Humor Instant Messaging Supercomputer Staff Emergency Employer Employee Relationship Mouse IT Consultant iPhone Worker Commute Lifestyle Inventory Amazon Cache Google Apps Advertising Monitor Search HVAC Botnet Current Events Digital Signature Computer Accessories Leadership NarrowBand Amazon Web Services Wireless Internet Lithium-ion battery Netflix Environment Running Cable Reputation How to Enterprise Content Management Travel Strategy Root Cause Analysis Software Tips Bluetooth Files Authentication Online Shopping Wire Flash Loyalty Password Manager Hybrid Cloud Experience Techology Customer Password Management Transportation Nanotechnology webinar Colocation SharePoint Chromecast Specifications Evernote Smart Office Sync Business Mangement Music Benefits NIST Software as a Service Accountants Millennials HBO Conferencing People Uninterrupted Power Supply Telephony Assessment Recycling Notifications Windows 10s Screen Mirroring Smart Technology Fax Server Cryptocurrency Workforce Devices Frequently Asked Questions Rootkit Wireless Charging hacker Mobile Office Students Skype Television Criminal Troubleshooting Cast IT solutions Safe Mode Google Docs IoT Telecommuting Thought Leadership Excel Fiber-Optic Content Healthcare Start Menu Public Computer Audit Hosted Solution Two Factor Authentication File Sharing Twitter Company Culture Thank You Webinar Managing Stress Congratulations IT solutions CrashOverride Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!