Connecting Technology and Business.

The Jumplist of Outlook

You can launch a New E-mail message, a New Appointment, a New Meeting, a New Contact or a New Task from the Windows Task bar. You should have pinned the Outlook application to the Task bar prior to taking advantage of this feature. Then, when you want to launch one of the windows  mentioned above, just right click the Outlook icon on the task bar. A Jump list pops out. Just choose your option. That is all!



This is one very powerful feature that many fail to notice. Saves you time and effort. Great productivity booster. Impress your colleague sitting next to you.

Book a room for your Scheduled meeting using Outlook

When you create a meeting request, it is typical and convenient to include the meeting location for the meeting or event. You can use the Address Book to find a conference room.

      • Click New Items - > Meeting or Reply with a Meeting from the Home tab of the Outlook Mail window or New Meeting from the Calendar
      • Keyboard shortcut to create a new meeting request is CTRL+SHIFT+Q.

      • In the Subject box, type a description of the meeting or event.
      • To open the Address Book to see which rooms are available, next to the Location box, click Rooms.

        Note: If you don't see the Rooms button, you might have opened an appointment instead of a meeting request.

        • In the Start time and End time lists, click the start time and end time for the meeting. If it is an all-day event, select the All-day event check box.

        An all-day event is a 24-hour event that lasts from midnight to midnight.

        Note: By default, the current time-zone setting on your computer system is used to schedule meetings. If you want to schedule meetings based on an alternative time zone, on the Meeting tab, in the Options group, click Time Zones.

          • Type any information that you want to share with the recipients or attach any files,
          • On the Meeting tab, in the Show group, click Scheduling Assistant.

        The Scheduling Assistant helps find the best time for your meeting.

          • Click Add Attendees.
          • In the Select Attendees and Resources dialog box, in the Search box, type the name of a person or resource that you want to invite to the meeting, and then click Go.
          • Select the name from the results list. Click Required, Optional, or Resources; and then click OK.

        Required and Optional attendees appear in the To box on the Meeting tab, and Resources appear in the Location box.

        The Scheduling Assistant displays a free/busy grid that shows the availability of attendees. A green vertical line represents the start of the meeting. A red vertical line represents the end of the meeting.

        The Suggested Times pane locates the best time for your meeting, which is defined as the time when most attendees are available. The best meeting time appears at the top of the pane. To select any one of the suggested times, click the time suggestion in the Suggested Times pane. You can also manually select a time on the free/busy grid.

          • If you want to make the meeting recur, on the Meeting tab, in the Options group, click Recurrence, select the recurrence pattern, and then click OK.

        When you add a recurrence pattern to a meeting request, the Meeting tab changes to Recurring Meeting.

          • On the Meeting tab, in the Show group, click Appointment.
          • Click Send.

      - Customized from the Support pages of Microsoft Office

          Don't live with a Cluttered Desktop

          If you open the same folder again and again or if you open the same file very frequently, you can use various tricks to open them with just a click. So, don't save them on your Desktop anymore.

          Here are the tips:

          1. Right click the File Explorer icon pinned to the Task bar and you will see a pop-up with your frequently opened folders and files. You can also pin some of them for quicker access so that they are not lost when others are getting listed in due course.

          2. If you are running Windows 10, the navigation pane also contains a Quick Access feature. Click this and you will see the frequently opened folders and recently opened files. Even here you can pin some of them for quicker access so that they don’t move away from the list in due course.

          3. If you have pinned the Word, Excel or PowerPoint applications to the task bar then, there are jump-lists created for the respective applications that will help you to open the files. (Folders are not listed). Right click the respective icons on the task bar and you will see the recent files listed. Push-pinning some of the files listed will help here too.

          4. If you are spending your whole day in Outlook, you can create Shortcuts to your folders and files in Outlook in the Shortcuts folder (7th from the Mails icon) also use Outlook to open it for you.

          Create a new Shortcut group in the Shortcuts folder on Outlook. Open the File Explorer and drag the folder / file under the new Shortcut group.

          Microsoft Leads in Gartner’s Magic quadrant for IdaaS

          Gartner has positioned Microsoft in the Leaders Quadrant in the 2016 Magic Quadrant for Identity and Access Management as a Service, based on its completeness of vision and ability to execute in the IDaaS market.

          Microsoft is currently the only vendor to be positioned as a Leader across Gartner’s Magic Quadrants for Identity as a Service, Cloud Infrastructure as a Service (IaaS), Server Virtualization, Application Platform as a Service, Cloud Storage Services, and as a leader across the data platform and productivity services.

          Gartner believes this validates Microsoft as a leader across the full spectrum of cloud computing - with easily integrated offerings across cloud infrastructure services, platform services, SaaS, data analytics and hybrid solutions.


          Microsoft's Azure Active Directory Premium offering provides features that are in line with other web-centric IDaaS providers, and includes licenses for Azure Multi-Factor Authentication (MFA). It also includes licenses for Microsoft Identity Manager (MIM) that are to be used with customers' on-premises systems. Microsoft also offers Azure Active Directory Premium as part of its Enterprise Mobility Suite (EMS), along with Microsoft Intune EMM and Azure Rights Management, and the on-premises-based Advanced Threat Analytics tool.


          • Microsoft continues to leverage its current and substantial customer base for Office 365 and other products to add Azure Active Directory and EMS to contracts. The vendor has broad and deep marketing, sales and support capabilities, and it has been pricing EMS low, which has put significant pressure on other IDaaS players.

          • The vendor has already demonstrated high scalability with Azure Active Directory. The service underpins other Microsoft Azure services.

          • Microsoft has a strong international presence for its service offerings, and continues to expand its IaaS presence worldwide.

          • Through acquisition and development, the vendor has demonstrated advancement of its strategy to secure identities, data and devices.

          • Microsoft's strategy demonstrates a strong understanding of the technology, socioeconomic, security and jurisdictional trends that will shape its offerings going forward.


          • The Azure Active Directory B2C and B2B Collaboration subservices were in public preview (beta) at the time our analysis was performed. These offerings will likely need time to mature relative to competition with established B2C and B2B use-case support.

          • Microsoft's on-premises "bridge" components for synchronization and federated SSO are now managed under one umbrella component, Azure Active Directory Connect. However, based on Gartner client interactions, these components generally need more infrastructure and more effort to manage than competitors' bridge technology.

          • Microsoft can manage the transition of organizations with multiple Active Directory forests to one tenant of Office 365; however, Gartner client feedback is that this transition is easier with competitors' IDaaS offerings.

          • Microsoft lags behind competitors in the number of apps it can provision to, as well as the depth of SaaS account fulfillment that supports the provisioning of roles, groups and other attributes.

          The high cost of a Data Breach

          Data breaches caused by malicious insiders and malicious code can take as long 50 days or more to fix, according to Ponemon Institute's 2015 Cost of Cyber Crime Study while malware, viruses, worms, Trojans, and botnets take only an estimated 2-5 days to fix.

          Unsurprisingly, attacks by malicious insiders are also the costliest to fix ($145,000 according to the Ponemon study), followed by denial of service ($127,000) and Web-based attacks ($96,000).

          The consequences and cost of cyber-attacks are also unevenly distributed, with business disruption and information loss taking the biggest share, followed by revenue loss and equipment damages, according to Ponemon. But the cost of remediation in person-days can also be substantial. Involvement of a programmer, a QA person, project manager, product manager and corporate lawyer will cost you more than $300 per employee per day, according to data from payscale.com — and that's before you consider the cost of the CEO, CISO and CFO's time.

          - Ponemon Institute's 2015 Cost of Cyber Crime Study