• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Vista Presentation
 

Vista Presentation

on

  • 633 views

A presentation which you can portray to your customer. It is very difficult to put forward the Value Proposition of Windows Vista and other OS to an investor. They require very specific points.

A presentation which you can portray to your customer. It is very difficult to put forward the Value Proposition of Windows Vista and other OS to an investor. They require very specific points.

Statistics

Views

Total Views
633
Views on SlideShare
631
Embed Views
2

Actions

Likes
0
Downloads
0
Comments
0

2 Embeds 2

http://www.cleeki.com 1
http://www.slideshare.net 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Vista Presentation Vista Presentation Presentation Transcript

    • Windows Vista
      Let’s Take A Tour
    • User Experience
      1
      • Start Menu – Faster Streamlined to find and launch application & open file.
      • Instant Search – Words, phrase, name
      2
      • Program Navigation – “All Programs” Eliminated
      • New File Views – Live Icons shows what the file contains.
      3
      • Internet Explorer 7
      4
      • Windows Security Enhancements
      • BitLocker™
      5
      • Windows Aero Glass
      • Windows Sidebar and Gadgets
    • User Experience
      Vista Desktop
    • User Experience
      New File View – Live Icon Showing What File Contains.
    • User Experience
      Desktop Search – Using search to find and launch application and open file containing the same string.
    • Internet Explorer 7
    • Internet Explorer 7
      New Architecture
      Protected Mode
      • Default, except in trusted zone.
      • Use new layering technology
      • User Account Control
      • Integrity Of Applications
      • Process Privilege Protections
      • Restrict Access
      Phishing Filter
      • Phishing filter protects you against phishing, a kind of Internet scam.
      Tabbed Browsing & Previews
      • Tabbed browsing and Quick Tabs allow you to view more than one Web Pages in a single Windows.
      RSS Reader
      • Lets you read several RSS feeds in a single window.
      • Built-in support for web feeds
    • Windows Security Enhancements
      • User Access Control – Prompts you for permission before taking potentially harmful options.
      • Windows Defender- Protects you from spyware and other potentially dangerous software.
      • Windows Security Center – Lets you view and change security settings for the Windows Firewall, Windows Update, Windows Defender.
      • BitLocker ™ Drive Encryption
      • Digital Rights Management – Helps protect content from copyright infringement.
      • Internet Explorer – Protected Mode
    • User Account Control
      Administrator Privileges
      Ways to request elevation
      Many Options are configured via Local Security MMC
      Standard Users Can Do More
      • Elevation prompt for admin – consent/credentials/no prompt
      • Elevation prompt for standard users – credentials/no prompt
      • Installer Detection on/off
      • Admin approval mode on/off
      • Only allow signed/trusted admin apps on/off
      • File/Registry virtualization on/off
      • View system clock and calendar
      • Change time zone
      • Configure secure wireless (WEP/WPA) connection
      • Change power management settings
      • Create and configure a Virtual Private Network connection
      • Add printers and other devices that have the required drivers
      • installed or allowed by group policy
      • Disk defragmentation is a scheduled background process
      • Shield icons mark what actions require administrative users
      Standard User Privileges (Default)
    • Windows Defender
    • Windows Defender
      Windows Defender offers three ways to help keep spyware and other potentially unwanted software from infecting your computer:
      • Real-time protection. Windows Defender alerts you when spyware or potentially unwanted software attempts to install itself or to run on your computer. It also alerts you when programs attempt to change important Windows settings.
      • SpyNet community. The online Microsoft SpyNet community helps you see how other people respond to software that has not yet been classified for risks. Seeing if other members of the community allow software can help you choose whether to allow it on your computer. In turn, if you participate, your choices are added to the community ratings to help other people choose what to do.
      • Scanning options. You can use Windows Defender to scan for spyware and other potentially unwanted software that might be installed on your computer, to schedule scans on a regular basis, and to automatically remove any malicious software that is detected during a scan.
      Software Explorer offers detailed information about software that is currently running on your computer that can affect your privacy or the security of your computer. You can see, for example, which programs run automatically when you start Windows and information about how these programs interact with important Windows programs and services.
    • BitLocker ™ Features
      BitLocker™ Drive Encryption
      • BitLocker Drive Encryption is an integral new security feature that ensures that data stored on the computer is not revealed to anyone who tampers with the machine while the installed operating system is offline. BitLocker Drive Encryption works with Trusted Platform Module (TPM) by encrypting the entire Windows volume, which assures early boot component integrity and data protection. TPM version 1.2 TPM with the appropriate BIOS modifications (to support the Static Root of Trust Measurement as defined by the Trusted Computing Group) is required to store the encryption keys on the computer. Encryption keys are stored on an USB flash drive to validate the user's identity at startup.
      Storage Root Key – TPM or USB Key
      Volume Encryption Key
      Windows Encrypted
    • Last But Not The Least
      • Windows Vista Performance Enhancement – Ready Boost, Ready Drive, Super Fetch
      • System Backup and Restore
      • Sync Center - A convenient central location in Windows Vista from which you can manage data synchronization between PCs, between PCs and servers, and between PCs and Mobile devices.
      • Windows Meeting Space - lets users in the same room open a private session to share information easily.
      • Speech Recognition - Lets you dictate text, start applications, and control your computer with your voice.
      • Windows Media Center - Allows connection between computer and home entertainment centre. Store music, movies and pictures and watch on TV or listen to Music.