Connecting Technology and Business.

Windows 8.1 – All You Wanted To Know (1)

With the new Windows 8.1, you have everything you need to work efficiently. Your familiar desktop is better than ever with advanced functionalities, like the new Task Manager and streamlined file management. Internet Explorer 11 gives you instant and fluid access to the world. And best of all, you can use all these features feeling confident that your important data is secure.

Whether you are collaborating on a large project, preparing for an upcoming conference, or traveling for work, you can use touch, mouse, and keyboard together—seamlessly—to accomplish your every task.

With the advanced features of Windows 8.1, you can get the most out of your device. Windows works the way you want it to.

You can use a Mouse as well to work in Windows 8.1. So, it is not essential that you would need a touchenabled device to run Windows 8.1.

Here is a quick table on what you can do using Touch and its equivalent for Mouse

Access the Quick Link menu Right-click the Start button. Press and hold the Start button.

Pin application to taskbar.


Open the Search charm, and enter the name of the app you want to pin in the search box. In the search results, right-click the desired app and then click Pin to taskbar.Open the Search charm, and enter the name of the app you want to pin in the search box. In the search results, press and hold the desired app and then tap Pin to taskbar.

Open Task Manager.


Right-click the Start button, and select Task Manager.Press and hold the Start button, and select Task Manager from the Quick Link menu. Tap More details to see detailed information.

Open Mobility Center.


Right-click the Start button, and select Mobility Center.Press and hold the Start button, and select Mobility Center.

Open a new tab in Internet Explorer 11.


In IE 11, right-click anywhere on the screen to bring up the tabs, and then click the New tab button.In Internet Explorer 11, swipe up from the bottom of the screen to bring up the tabs, and then tap the New tab button.

Switch between tabs in Internet Explorer 11.


In IE 11, right-click anywhere on the screen to bring up the tabs. Now you can switch between your open tabs.In Internet Explorer 11, swipe up from the bottom of the screen to bring up the tabs. Now you can switch between your open tabs.

Add a wireless display to your PC.


Open the Devices charm. Click Project and then click Add a wireless display.Open the Devices charm. Tap Project and then tap Add a wireless display.

Project your screen to a wireless display.


Open the Devices charm. Click Project and then select the wireless display you want.Open the Devices charm. Tap Project and then select the display you want.
Add an AccountOpen the Settings charm, and click Change PC Settings. Click Accounts, Other accounts, then click Add an account.Open the Settings charm, and then tap Change PC Settings. Tap Accounts, Other accounts, then tap Add an account

Windows 8.1 - All You Wanted To Know (2) - Here is some Technical stuff

What's New in Windows 8.1

Windows 8 brings a modern computing experience to businesses and helps professionals stay connected to their colleagues and clients from anywhere, anytime. Windows 8.1 advances this vision and introduces new manageability, mobility, security, user experience and networking capabilities with the goal of offering customers the best business tablets and versatile modern business PCs driven by the most powerful operating system designed for today's modern businesses.

Bring Your Own Device (BYOD) Enhancements

Workplace Join

A Windows 8 PC was either domain joined or not.  If it was a member of the domain, the user could access corporate resources (if permissioned) and IT could control the PC through group policy and other mechanisms.  This feature allows a middle ground between all or nothing access, allowing a user to work on the device of their choice and still have access to corporate resources. With Workplace Join, IT administrators now have the ability to offer finer-grained control to corporate resources.  If a user registers their device, IT can grant some access while still enforcing some governance parameters on the device.

Work Folders

Work Folders allows a user to sync data to their device from their user folder located in the corporation's data center. Files created locally will sync back to the file server in the corporate environment. This syncing is natively integrated into the file system.  Note, this all happens outside the firewall client sync support. Previously, Windows 8 devices needed to be domain joined (or required domain credentials) for access to file shares.  Syncing could be done with third-party folder replication apps. With Work Folders, Users can keep local copies of their work files on their devices, with automatic synchronization to your data center, and for access from other devices. IT can enforce Dynamic Access Control policies on the Work Folder Sync Share (including automated Rights Management) and require Workplace Join to be in place.

Open MDM

While many organizations have investments with System Center and will continue to leverage these investments we also know that many organizations want to manage certain classes of devices, like tablets and BYOD devices, as mobile devices. With Windows 8.1, you can use an OMA-DM API agent to allow management of Windows 8.1 devices with mobile device management products, like Mobile Iron or Air Watch.

Mobile Device Management

When a user enrolls their device, they are joining the device to the Windows Intune management service.  They get access to the Company Portal which provides a consistent experience for access to their applications, data and to manage their own devices.  This allows a deeper management experience with existing tools like Windows Intune. IT administrators now have deeper policy management for Windows RT devices, and can manage Windows 8.1 PCs as mobile devices without having deploy a full management client.

Web Application Proxy

The Web Application Proxy is a new role service in the Windows Server Remote Access role. It provides the ability to publish access to corporate resources, and enforce multi-factor authentication as well as apply conditional access policies to verify both the user's identity and the device they are using resources, and enforce multi-factor authentication as well as verify the device being used before access is granted.

RDS Enhancements

Win 8.1 supports enhanced Virtual Desktop Infrastructure (VDI) in Windows Server 2012 R2 with improvements in management, value, and user experience. Session Shadowing allows administrators to view and remotely control active user sessions in an RDSH server. Disk dedupe and storage tiering allow for lower cost storage options. User experience for RemoteApps, network connectivity and multiple displays has been improved. Administrators can now easily support users with session desktops to provide helpdesk style support. Administrators now have even more flexible storage options to support a VDI environment without expensive SAN investments. End users will find RemoteApp behavior is more like local apps, and the experience in low-bandwidth is better, with faster reconnects and improved compression, and support for multiple monitors.

NFC Tap-to-pair Printing

Users can tap their Windows 8.1 device against an enterprise NFC-enabled printer and you're all set to print. No more hunting on the network for the correct printer and no need to buy a special printer to take advantage of this functionality. Users need to simply attach an NFC tag to their existing printers to enable this functionality.

Wi-Fi Direct Printing

Win 8.1 users can connect to Wi-Fi Direct printers without adding additional drivers or software on their Windows 8.1 device, forming a peer-to-peer network between their device and the printer.

Native Miracast Wireless Display

Win 8.1 enables users to present their work wirelessly with no connection cords needed; users just pair their device with a Miracast-enabled projector via NFC and Miracast will use Wi-Fi to let them project wire-free.

Mobility Enhancements


Microsoft has added support for a wider range of VPN clients in both Windows and Windows RT devices. They have also added the ability to have an app automatically trigger VPN connections. 

Mobile Broadband

At Windows 8 launch, the devices had embedded radios that were separate components within the devices.  Windows 8.1 supports embedded wireless radio, which gives users increased power savings, longer battery life, also enables thinner form factors and lower cost devices. 

Windows To Go

With Windows To Go in Windows 8.1, the Windows Store is enabled by default. Windows To Go users may roam to any number of machines and access the Windows Store and use Windows Store apps. 

Broadband Tethering

Now turning a Windows 8.1 mobile broadband-enabled PC or tablet into a personal Wi-Fi hotspot, allowing other devices to connect and access the internet is easy.

Auto-triggered VPN

When users select an app or resource that needs access through the inbox VPN – like a company's intranet site – Windows 8.1 will automatically prompt them to sign in with one click. This feature is available with Microsoft and third-party inbox VPN clients.

Security Enhancements

Remote Business Data Removal

Corporations now have more control over corporate content which can be marked as corporate, encrypted, and then be wiped when the relationship between the corporation and user has ended. Corporate data can now be identified as corporate vs. user, encrypted, and wiped on command using EAS or EAS + OMA-DM protocol. This capability requires implementation in the client application and in the server application (Mail + Exchange Server). The client application determines if the wipe simply makes the data inaccessible or actually deletes it. 

Improved Biometrics

All Win 8.1 SKUs will include end to end biometric capabilities that enable authenticating with user's biometric identity anywhere in Windows (Windows sign-in, remote access, User Account Control, etc.). Windows 8.1 will also be optimized for fingerprint based biometrics and will include a common fingerprint enrollment experience that will work with a variety of readers (touch, swipe). Modern readers are touch based rather than swipe and include liveliness detection that prevents spoofing (e.g.: silicon emulated fingerprints). Access to Windows Store Apps, functions within them, and certificate release can be gated based on verification of a user's biometric identity.

Pervasive Device Encryption

Device encryption previously found on Windows RT and Windows Phone 8 is now available in all editions of Windows. It is enabled out of the box and can be configured with additional BitLocker protection and management capability on the Pro and Enterprise SKUs. Consumer devices are automatically encrypted and protected when using a Microsoft account. Data on any Windows connected standby device is automatically protected (encrypted) with device encryption. Organizations that need to manage encryption can easily take add additional BitLocker protection options and manageability to these devices.  

Improved Internet Explorer

Internet Explorer 11 improvements include faster page load times, side-by-side browsing of your sites, enhanced pinned site notifications, and app settings like favorites, tabs and settings sync across all Windows 8.1 PCs. Internet Explorer 11 now includes capability that enables an antimalware solution to scan the input for a binary extension before it is passed onto the extension for execution.

Malware Resistance

Windows Defender, Microsoft's free antivirus solution in Windows 8, will include network behavior monitoring to help detect and stop the execution of known and unknown malware. Internet Explorer will scan binary extensions (e.g. ActiveX) using the antimalware solution before potentially harmful code is executed.

Device Lockdown

With Assigned Access, a new feature offered in Windows 8.1 RT, Windows 8.1 Pro, and Windows 8.1 Enterprise, users can enable a single Windows Store application experience on the device. This can be things like a learning application for kids in an educational setting or a customer service application at a boutique, Assigned Access can ensure the device is delivering the intended experience. In Microsoft's Windows Embedded 8.1 industry product, they deliver additional lockdown capabilities to meet the needs of industry devices like point of sale systems, ATMs, and digital signs.

Modern UI Experience

Variable, Continuous Size of Snap Views

Win 8.1 users have more ways to see multiple apps on the screen at once. When displaying multiple apps at once, they can easily resize the width of the app window to suit their needs. Depending on screen size and resolution, they can even share the screen with three, or four apps on each monitor.

Boot to Desktop

Microsoft has made configuration options available which will allow users to boot directly to the desktop in Windows 8.1.

Desktop and Start Screen

Improvements have been made to better support users who prefer a mouse and keyboard experience to access applications.

PowerBI – The Most Powerful Business Intelligence Offer Ever From Microsoft

​Business Intelligence has become an essential weapon in the armoury of enterprises today that desire to compete with the best in their industry. Software vendors have been catering to the needs of these enterprises by providing power to them through their software. IBMs SPSS and Cognos are examples to cite here. Microsoft also has been providing power to its customers through its SQL database and its data analysis and reporting services for a long time now.

Providing the BI power to the common man who used very simple tools like Excel was Microsoft's long time aspiration. The data analysis tool pack that was available as add-on to the basic Excel was not enough to meet the demand of the already competitive market scenario. The data visualization features in Conditional formatting of Excel 2007 was a great leap from the traditional way by which data was presented. The acquisition of PerformancePoint was a shot in the arm for Microsoft. Excel Services was one of the first steps towards empowering the end-user with the capabilities of BI in the enterprise. It enabled the users to present dynamic visual reports like dashboards and KPIs in the SharePoint portal.

With the entry of PowerPivot in Office 2010 there happened to be a drastic change in the way the normal Excel user has been enabled to handle, analyse, interpret and present data. It accommodated millions of rows of data in Excel for analysis and interpretation. Data models could be built on such huge volumes of data extracted from various sources like database tables of SQL and Access apart from Excel Pivot tables. It also currently allows data to be imported from non-Microsoft databases like Oracle, Teradata, Sybase, Informix, IBM DB2 or any system or ODBC that could provide data through OLE DB.

PowerPivot data sources.png 

PowerView in Excel 2013 enhanced the ease with which users could interpret data. PowerQuery and PowerMaps are currently in preview which will add to the kitty of BI tools from Microsoft.

I will post more about this topic in the coming days.

Binary Large Object Bitmap (BLOB) Storage in the Cloud

Very large digital objects that are unstructured and could not be fit in databases directly are today stored by database management systems as Binary Large Objects (BLOBs) or Basic large Objects. Such kind of data could be graphical images, audio or video or even binary executable codes (or simply .exe files). Though not every database system supports this kind of data type, all major database systems like SQL, Oracle and DB2 help store such BLOBs. In fact, DB2 was the earliest to popularize this technology and allowed users to store such collection of binary data as a single entity and consume them in their systems as complete units at a time.

Originally, BLOB was not an acronym and stood for just unstructured chunks of data. Later it was given the current expansion of Basic large object or the latest and widely used expansion Binary large Object.

At the time when data came to be stored in databases, there was no means of storing this kind of large data in any particular field with a defined data type. With limited storage available at a huge cost, storing such data in databases were not even thought of and were stored as separate simple single continuous sequential files. After the storage spaces for data became cheap, databases started supporting this large data type that can contain amorphous or unstructured data.

Today, Remote BLOB store (RBS) for SQL Server lets database administrators store binary large objects (BLOBs) in commodity storage solutions instead of directly on the server. This saves a significant amount of space and avoids wasting expensive server hardware resources. RBS provides a set of API libraries that define a standardized model for applications to access BLOB data. RBS also includes maintenance tools, such as garbage collection, to help manage remote BLOB data.

Microsoft's online Infrastructure and Platform as services Windows Azure and SQL Azure store all data in the cloud in this format. Since this data in replicated multiple times in the various datacentres to provide redundancy, Multiple downloads of the same chunk of data becomes simplified and much faster because of the convenience this kind of BLOB storage offers.

Microsoft Access tables also allows storage of Blobs in a field with the OLE Object data type.

Smartphone user, are you being watched without your knowledge?

​Are you a smartphone user? Is your phone's Wi-Fi turned on always or at least most of the time? Are you in the habit of connecting to Wi-Fi in public places to download an app update or a mail or a video? Are you in the habit of updating your Facebook or Twitter accounts every now and then? Or do you just click a "Like" or make a short comment like LOL there? While doing so, remember that you are continuously broadcasting your location from these phones. Beware of all the secrets your smartphone is sharing about you. A lot of information can be gleaned with the help of your phone without your knowledge or without even asking you a single question.

Today wireless sensors are placed in business districts to track shoppers as they move out in the shopping malls and bazaars. Even if you don't connect to the locally available Wi-fi, these sensors follow signals emitted from our Wi-Fi enables smartphones which allows them to create profiles of people and their habits as they go about their everyday lives travelling from one place to another. Shopping malls can use sensors to analyse foot-traffic patterns, largely within the premises to glean insight about customer behaviour.

Location data is valuable to businesses. Instead of offering a general promotion, businesses can promote their products specifically depending upon their customers' tastes. It can help retailers see which neighbourhoods shoppers arrived from or limited information about their habits, such as restaurants they drive past. Even Apple has technology which can be integrated into sensors to read customer's smartphone signals in shopping malls and stores.

Business have begun using the technology more broadly to follow people where they live, work and shop. They can use that information, along with the wider foot traffic data, to come up with dozens of lifestyle categories, including yoga-goers, people who like theatre, and gizmo hunters.

For example, a business that knows which sports team is most favoured by its clients could offer special promotions on game days. Another example: A company could track people's visits to specialist doctors or hospitals. Marketers can in turn can infer that a person has a certain disease from their Internet searches. A geo-location company can actually see the person visiting the doctor, making the inference that the individual has this disease probably even more accurate.

Geo-location companies can build detailed dossiers of people's lifestyles by merging location data with those from other sources, including marketing firms. They can also buy bulk phone-signal data from cell phone carriers, and then break those users into lifestyle categories based on their daily travels.

Today, with their Android and iOS mobile operating systems, respectively, Google and Apple know the location of every customer's Wi-Fi-enabled phone—far more location data than any geo-location company could access. If you have also switched on the "Trace my phone" safety feature, it is all the more easy for the other number to track not only your phone but in most cases YOU. And if you are using apps like True Caller, you are exposing the names of people you know who are in your contact list to others who are willing to share their caller ids also in the shared network and thus you open up possible vulnerebilities, risks and threats for your contacts.

Places where people didn't think they were being watched are now repositories for collecting information and companies are increasingly able to connect between our online and offline lives.

Is your privacy becoming cheap?

Online Templates – A Treasury Of Readymade Workbooks

​Seasoned users of Excel (or any other Office Application) have always created their workbooks from scratch. The data as well as the formulae and functions that manipulate and present results in various worksheets of a workbook are entered by the users themselves. Today MS Office has evolved significantly. Online resources are overwhelming and help you save time and efforts of yours as well as others.

Office templates are mentionable resources that can not only create workbooks and documents quickly but can also prove to be very powerful learning resources as well. For instance, if an event has been planned in your enterprise. Assume that you have been given the responsibility of planning, executing and tracking the event activities and reporting the final outcome of the event. If you are an Excel user, help is just a click away.

As soon as you open Excel, you are presented with an option to open one of the many readily available templates that can be downloaded in just a few seconds and can be used immediately with no or little customization. (Or click New from the File tab). Click on the "Search for online templates" text box. Enter "Event". Excel searches for this and presents you with hundreds (at the time of my search, it was 467) of readymade workbook templates. I chose one of those and here is what I got: 3 worksheets – Expenses, Income and a Profit & Loss summary – with all formatted tables, formulae, graphs and summary report.

Event Budget - Workbook Template.png 

You can customize the format of the cells to show your local currency. You can rename the heads as per your requirement. And if you can spend some additional time to understand how the formulae work, then you can also add columns or rows as the situation would require it.

There are thousands of such workbook templates readily available for download and use by Excel users today. So, when you are required to create a workbook from scratch, wait a moment and see if you can benefit from this very valuable treasure trove.

Visualize Formula Linkages In Cells

​You workbook might contain many worksheets and each worksheet a lot of formulae. Or, you have received such a workbook from elsewhere. You are now interested in knowing how certain cells are related to the others in the same sheet or in other sheets. Excel has a very remarkable tool that will help you analyse this.

Under the Formulas tab of the ribbon you would see Formula Auditing cluster. This contains the necessary tools for this analysis.

First choose the cell that you want to analyse. This must contain a formula that connects to the content of one or more cells (which further can connect to other cells retrospectively or subsequently). Click the Trace Precedents command to see which cells link to this cells retrospectively. (Click Trace Dependents to see which cells link to this cell subsequently). Arrows are displayed to indicate the relationships of the cells. Boxes indicate an array of cells that are linked to the current cell. Click Trace Precedents further to see where the precedence goes until the original cell that determines the value of the current cell is reached through arrows. Precedent or dependent cells that lie in other worksheets or workbooks are indicated by a small worksheet icon at the tip of the arrow.

Trace dependents.png 

The figure above shows a sample worksheet with arrows of precedencies and dependencies of a selected cell.

Propel your business on Cloud

Propel your business on cloud : Quadra tells you how?

"Our industry is going through quite a wave of innovation and it's being powered by a phenomenon which is referred to as the cloud.

India will not only see a surge in cloud computing services but companies all over the world will look to India to support their transition to cloud computing." – Steve Ballmer, CEO Microsoft

A majority of us are paranoid and confused by the prospects of business in the cloud. Many even see it as a real threat to a business model that has been productive and profitable for decades. With a sea full of uncertainties and a lot of business up for grabs, Quadra makes you transit to cloud with ease and tells you how you can act strategically, gather meaningful information using cloud platforms which will win you both your wallet and mind share.

With the cloud, you can snap your fingers and instantly set up enterprise-class services. You will now have the ability to use the same tools and techniques that larger companies enjoyed for years. You can leverage Social Media tools to connect with prospects / customers, build their brands, and use Enterprise tools to automate systems within their workplace using free, inexpensive and simple tools and platforms.

And with the rapid evolution of the cloud as a viable IT implementation model, let's take a brief look at the various cloud platforms and the manner in which they have evolved. 2013 saw all the major players consistently offering various services which enhance their already diverse cloud portfolio.

Amazon continued to maintain an impressive product portfolio, it now offers over 30 services ranging from transcoding media files to compatible formats playable in various devices ranging from smart phones and tablets to solutions for protecting sensitive data subject to rigorous contractual or regulatory requirements. The most exciting announcement of the year was Amazon Kinesis, a fully managed service for real-time processing of streaming data at massive scale. Amazon Kinesis can collect and process hundreds of terabytes of data per hour from hundreds of thousands of sources, allowing you to easily write applications that process information in real-time, from sources such as web site click-streams, marketing and financial information, manufacturing instrumentation and social media, and operational logs and metering data.

Google Cloud is now versatile and powerful with the Google Compute Engine moving into General Availability with offering virtual machines that are scalable, reliable, and offer industry-leading security features like encryption of data at rest. Compute Engine is available with 24/7 support and a 99.95% monthly SLA for mission-critical workloads. Google focused on making sure that the CPU, disk I/O and network I/O are optimized to deliver the best possible performance. Virtual machines, Managed platforms, Blob storage, Block storage, NoSQL data store, MySQL database, Big Data analytics are some of the features offered by the Google platform.

HP Cloud was one of the first to go live based on the open source cloud management software. Through its commitment to OpenStack, HP is delivering open standards–based hybrid solutions that provide enterprises the agility of interoperable cloud solutions along with enterprise-grade security and manageability. HP wants to shift its focus to hybrid cloud by pushing the HP Cloud OS agenda to its partners and customers. HP Cloud OS is an attempt to push OpenStack, HP Cloud and HP services in the enterprise market.

IBM attempted to gain a foothold into commodity hosting/IaaS market dominated so far by AWS and Rackspace by acquiring Soft Layer. Its existing Smart Cloud Enterprise brand has been closed with its existing customer base transitioning to Soft Layer. This transition is being driven by Mirantis, an established open stack services company. On the PaaS front, IBM and Pivotal partnered to bring WebSphere to Cloud Foundry. Time will decide on the efficacy of IBM's strategy of investing in two leading open source cloud technologies.

Microsoft made the transition from PaaS to IaaS with Windows Azure Infrastructure Services (WAIS). WAIS supports popular variants of Linux, Java, WebLogic and Databases in its Windows Azure platform. Acquisition of datacenters in China was also noteworthy in 2013. Presently, Microsoft is well positioned in the cloud market with robust offerings.

Oracle is the corporate sponsor of OpenStackFoundation in 2013 with plans to integrate its virtualization infrastructure, Java, middleware and database products with OpenStack. However, clarity on its core competence is still to emerge with Oracle Fusion and Financials forming the SaaS layer, a robust PaaS platform and with the acquisition of Nimbula it also has a presence in in IaaS domain.

2013 saw declining revenues for Rackspace, it is hopeful that its open stack offerings in public cloud will bridge the existing divide. Red Hat's PaaS offering, OpenShift has moved to its second version this year, OpenShift is positioned as the true open source PaaS with its developers continuing to be extremely active. Salesforce continued its dominance in the SaaS domain, but 2013 saw Salesforce enter the PaaS domain with Heroku, the generic, polyglot PaaS.

VMware clearly demonstrated its intent to continue its market dominance in the private cloud domain by launching vCloud Hybrid Service (vCHS) to combat the emerging threat of Amazon in the enterprise cloud market. It sent a clear message to the industry and its customer base that its primary focus remains cloud by selling Wavemaker, Zimbra and SlideRocket.

With alternatives available in abundance, Quadra can help you with your Cloud requirements. And as an organization, we have built deep experience across both private and public cloud deployments, and have been early adopters of the cloud for our own internal applications. Our vendor agnostic, multi-platform approach, together with proven skills and certifications from major cloud vendors means that we are uniquely poised to provide you a holistic and balanced perspective on building a hybrid cloud infrastructure. We also bring to the table skills on federated identity management, and partnerships with cloud integration offerings, along with tried and trusted management and deployment capabilities that are critical in establishing a hybrid infrastructure.

The Hawk's Eye View of your Document

​You have a document ready. It contains the Title page, Table of contents, Introduction, other Sections, chapters with various level headings, tables, graphical shapes, graphs, pictures photographs, text boxes, screen shots, hyperlinks, cross references, headers, footers, page numbers, cross references, index entries, appendices and a hundred other components. You have arranged them in their respective places but you are not sure how the overall presentation (not the PowerPoint slides show (: )) of your document looks like. Is there a way to have a hawk's eye view of your document? Yes. Thanks to MS Word, we have a feature to show an entire document with its complete original layout in a convenient display.hawks eye view.png

We go to the View tab of the Ribbon and click on Multiple Pages. Then as you keep zooming out of the document, all your pages in the document are presented on the same screen to give you a hawk's eye view of your document. (Use the wheel of the mouse and the ctrl Key simultaneously to zoom in or zoom out. You can also use the slider at the bottom right of the Word window to choose a zoom level. 10% zoom level will show you the document at its top most level). You will now be able to make necessary changes to the layout of the components so that it is aesthetically pleasing to the reader. You can also standardize your document with the right fonts and right font sizes (if they are mixed up somehow) and give it a uniform look. You can also apply a certain theme to your document and see how it looks overall. Go to the Design tab and choose one of the Themes to apply to your entire document to make it look more professional.