Vista Presentation


Published on

A presentation which you can portray to your customer. It is very difficult to put forward the Value Proposition of Windows Vista and other OS to an investor. They require very specific points.

1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Vista Presentation

  1. 1.
  2. 2. Windows Vista<br />Let’s Take A Tour<br />
  3. 3.
  4. 4. User Experience<br />1<br /><ul><li>Start Menu – Faster Streamlined to find and launch application & open file.
  5. 5. Instant Search – Words, phrase, name </li></ul>2<br /><ul><li>Program Navigation – “All Programs” Eliminated
  6. 6. New File Views – Live Icons shows what the file contains.</li></ul>3<br /><ul><li>Internet Explorer 7</li></ul>4<br /><ul><li>Windows Security Enhancements
  7. 7. BitLocker™ </li></ul>5<br /><ul><li>Windows Aero Glass
  8. 8. Windows Sidebar and Gadgets</li></li></ul><li>User Experience<br />Vista Desktop<br />
  9. 9. User Experience<br />New File View – Live Icon Showing What File Contains.<br />
  10. 10. User Experience<br />Desktop Search – Using search to find and launch application and open file containing the same string.<br />
  11. 11. Internet Explorer 7<br />
  12. 12. Internet Explorer 7<br />New Architecture<br />Protected Mode<br /><ul><li>Default, except in trusted zone.
  13. 13. Use new layering technology
  14. 14. User Account Control
  15. 15. Integrity Of Applications
  16. 16. Process Privilege Protections
  17. 17. Restrict Access</li></ul>Phishing Filter <br /><ul><li>Phishing filter protects you against phishing, a kind of Internet scam.</li></ul>Tabbed Browsing & Previews<br /><ul><li>Tabbed browsing and Quick Tabs allow you to view more than one Web Pages in a single Windows.</li></ul>RSS Reader<br /><ul><li>Lets you read several RSS feeds in a single window.
  18. 18. Built-in support for web feeds</li></li></ul><li>Windows Security Enhancements<br /><ul><li>User Access Control – Prompts you for permission before taking potentially harmful options.
  19. 19. Windows Defender- Protects you from spyware and other potentially dangerous software.
  20. 20. Windows Security Center – Lets you view and change security settings for the Windows Firewall, Windows Update, Windows Defender.
  21. 21. BitLocker ™ Drive Encryption
  22. 22. Digital Rights Management – Helps protect content from copyright infringement.
  23. 23. Internet Explorer – Protected Mode</li></li></ul><li>User Account Control<br />Administrator Privileges<br />Ways to request elevation <br />Many Options are configured via Local Security MMC<br />Standard Users Can Do More<br /><ul><li>Elevation prompt for admin – consent/credentials/no prompt
  24. 24. Elevation prompt for standard users – credentials/no prompt
  25. 25. Installer Detection on/off
  26. 26. Admin approval mode on/off
  27. 27. Only allow signed/trusted admin apps on/off
  28. 28. File/Registry virtualization on/off
  29. 29. View system clock and calendar
  30. 30. Change time zone
  31. 31. Configure secure wireless (WEP/WPA) connection
  32. 32. Change power management settings
  33. 33. Create and configure a Virtual Private Network connection
  34. 34. Add printers and other devices that have the required drivers
  35. 35. installed or allowed by group policy
  36. 36. Disk defragmentation is a scheduled background process
  37. 37. Shield icons mark what actions require administrative users</li></ul>Standard User Privileges (Default)<br />
  38. 38. Windows Defender <br />
  39. 39. Windows Defender <br />Windows Defender offers three ways to help keep spyware and other potentially unwanted software from infecting your computer:<br /><ul><li>Real-time protection. Windows Defender alerts you when spyware or potentially unwanted software attempts to install itself or to run on your computer. It also alerts you when programs attempt to change important Windows settings.
  40. 40. SpyNet community. The online Microsoft SpyNet community helps you see how other people respond to software that has not yet been classified for risks. Seeing if other members of the community allow software can help you choose whether to allow it on your computer. In turn, if you participate, your choices are added to the community ratings to help other people choose what to do.
  41. 41. Scanning options. You can use Windows Defender to scan for spyware and other potentially unwanted software that might be installed on your computer, to schedule scans on a regular basis, and to automatically remove any malicious software that is detected during a scan.</li></ul>Software Explorer offers detailed information about software that is currently running on your computer that can affect your privacy or the security of your computer. You can see, for example, which programs run automatically when you start Windows and information about how these programs interact with important Windows programs and services.<br />
  42. 42. BitLocker ™ Features <br />BitLocker™ Drive Encryption <br /><ul><li>BitLocker Drive Encryption is an integral new security feature that ensures that data stored on the computer is not revealed to anyone who tampers with the machine while the installed operating system is offline. BitLocker Drive Encryption works with Trusted Platform Module (TPM) by encrypting the entire Windows volume, which assures early boot component integrity and data protection. TPM version 1.2 TPM with the appropriate BIOS modifications (to support the Static Root of Trust Measurement as defined by the Trusted Computing Group) is required to store the encryption keys on the computer. Encryption keys are stored on an USB flash drive to validate the user's identity at startup.</li></ul>Storage Root Key – TPM or USB Key<br />Volume Encryption Key<br />Windows Encrypted<br />
  43. 43. Last But Not The Least <br /><ul><li>Windows Vista Performance Enhancement – Ready Boost, Ready Drive, Super Fetch
  44. 44. System Backup and Restore
  45. 45. Sync Center - A convenient central location in Windows Vista from which you can manage data synchronization between PCs, between PCs and servers, and between PCs and Mobile devices.
  46. 46. Windows Meeting Space - lets users in the same room open a private session to share information easily.
  47. 47. Speech Recognition - Lets you dictate text, start applications, and control your computer with your voice.
  48. 48. Windows Media Center - Allows connection between computer and home entertainment centre. Store music, movies and pictures and watch on TV or listen to Music.</li></li></ul><li>