Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: An Intro to Windows 10’s Built-In Virtual Desktops

Tip of the Week: An Intro to Windows 10’s Built-In Virtual Desktops

On a Windows machine, look at your taskbar, near the Start button and the search function. The next little icon, the one that almost looks like a bit of film, is the Task View button, the button that (among other purposes) allows you to create and manage virtual desktops. For this week’s tip, we’ll discuss how to use this handy feature, starting with why you might want to.

What is a Virtual Desktop?

To be completely clear, this blog is referring to a very specific type of virtual desktop, which is important to state right off the bat.

Oftentimes, when we refer to “virtual desktops,” we are talking about a computing environment that is hosted in the cloud, which can be accessed from almost any device, from anywhere. Think of it like a Voice over IP (VoIP) solution, but instead of just your phone, it’s the whole computer.

Here, we’re talking about a slightly different version of that concept. Windows 10 allows its users to have multiple instances, or sessions, of Windows 10 running at the same time, via the built-in Virtual Desktop function. This has many potential uses in a business, most notably, aiding in organization while keeping different tasks and their accompanying resources separated from your other tasks and their resources. Listen to music on a streaming service while at work? Free up some valuable desktop space by accessing the service in a secondary, virtual one. Or maybe you’re a compulsive email checker - knowing that you have it open in another desktop may be enough to keep you from becoming tempted. It really is up to you to figure out how they are most useful to you.

In fairness, it really would be more accurate to call this feature “Virtual Monitor,” because it works more like adding an additional monitor setup than virtualizing a desktop... but we aren’t in charge of that kind of thing.

Working with Windows 10’s Virtual Desktops

Click on the Task View button. If your Task View button is missing, right-clicking the taskbar and selecting Show Task View button will fix that.

Alternatively, you can also open Task View by pressing Windows Key + Tab

This will bring you to the Task View. On the bottom right, there will be a New Desktop button, which you can click to create a new, virtual desktop in addition to your original desktop. There are a few easy ways to switch back and forth between them - you can select the desktop to view from the Task View screen, use a four-fingered swiping gesture on certain touchpads and touchscreens, or a keyboard shortcut: Ctrl + Windows Key + Left/Right Arrow.

To use your programs and applications in your virtual desktops, open them as you normally would. While many apps will allow an instance in each desktop, others will pull you to the desktop that has the application running. Closing one of your virtual desktops will also cause any apps open in it to jump as well.

How do you anticipate using these virtualized desktops in your day-to-day, if at all? Let us know in the comments!

Hit Back Hard Against Malware
Your Business Processes Are Everything
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, January 19 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Data Network Security IT Support Privacy Hosted Solutions Cloud Data Recovery IT Services Software Malware Email Outsourced IT Internet Managed IT Services Tech Term Innovation Business Efficiency Computer Windows 10 Upgrade User Tips Hackers Cloud Computing Small Business Microsoft Collaboration Hardware Mobile Devices Phishing Business Management Ransomware Google Business Continuity Workplace Tips Cybersecurity Managed Service Backup VoIp Paperless Office Server Office 365 Smartphones Android Communication Managed Service Provider Encryption Communications Remote Monitoring BDR Managed IT Artificial Intelligence Holiday Vulnerability Business Technology Internet of Things Passwords Data Management Smartphone Laptops Disaster Recovery Saving Money Wi-Fi Facebook Help Desk Save Money Document Management Quick Tips Government Windows 7 Mobile Device Healthcare Managed IT services Browser Applications Processor Avoiding Downtime Project Management Employer-Employee Relationship Information Antivirus Scam Redundancy Social Media Bandwidth Automation Tip of the week Microsoft Office Compliance Network Blockchain Vendor Management Infrastructure Software as a Service IT Management RMM Customer Relationship Management Miscellaneous Data Loss Chrome Two-factor Authentication Router Maintenance VPN Analytics Machine Learning Website Access Control BYOD Virtualization Windows Data Security Remote Workers Password Apps Word Net Neutrality Gadgets Regulations Patch Management IoT Management Co-Managed IT Assessment Tablet File Sharing Hard Drive Internet Exlporer Users File Management Dark Web Network Management Consultation Smart Technology Alert Proactive Monitoring Payment Cards Storage Bring Your Own Device HIPAA Utility Computing Financial Remote Monitoring and Management Networking Operating System Mobile Security OneDrive Professional Services Training Search Unified Threat Management Employees Unified Communications Recycling Consulting Downtime Files Social Network Employee-Employer Relationship Virtual Private Network Mobility The Internet of Things Company Culture Gmail Cooperation Server Management Risk Management Superfish Wireless Mouse Language Smart Devices Vulnerabilities Mail Merge User Error Favorites Money Wasting Time Current Events CIO applications Remote Work Managing Stress Data Breach Read Only Security Cameras Break Fix Holidays Asset Tracking Backup and Disaster Recovery Windows Server Chatbots Point of Sale Tech Terms Cyber Monday Staff Websites Employer/Employee Relationships Apple Nanotechnology Wires Downloads MSP Finance Permissions Computing Infrastructure Hard Disk Drives Sensors Mobile Computing Address WiFi Conferencing Microsoft Excel Database Mirgation Human Error Spam Enterprise Content Management Printing Augmented Reality Notes Wearable Technology Star Wars IT User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Theft SaaS Proactive Maintenance Solid State Drive App Optimization Authentication Google Calendar Fraud Electronic Medical Records Computing Alerts Solid State Drives Geography Meetings Voice over Internet Protocol Projects Cache OneNote Permission Travel Value of Managed Services Social Networking Technology Laws Remote Worker Virtual Reality Touchscreen Hacking PowerPoint Display Business Telephone Teamwork Information Technology Identity Outlook Disaster Resistance Features Firewall Time Management Cybercrime Cyber security Screen Reader Emergency Multi-Factor Security Virtual Machines Authorization Remote Computing Comparison Licensing Heating/Cooling Options Telephone Modem High-Speed Internet Printer Politics Return on Investment How To Test Technology Tips Managed Services G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Trending Tech Support Shared resources Going Green Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Statistics Database Management Smart Tech Credit Cards WPA3 Legislation Specifications Servers 5G Mobile VoIP Development Instant Messaging Settings Personal Information Digital Payment Hotspot Manufacturing Vendor Motherboard Chromebook Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Recovery Batteries IT Consulting Cyberattacks Social Managed IT Service Bluetooth GDPR Connectivity Samsung Computers Fleet Tracking Zero-Day Threat Active Directory Migration eWaste Managed Services Provider Mobile Device Management Black Friday Wireless Internet Big Data Cookies Cables SharePoint Windows Server 2008 Customer Service Transportation Marketing Twitter Education CEO Printers Students Daniel Stevens IT Assessment Regulation

Latest Blog

The threat landscape is filled with more types of malware than ever. To keep your business’ network running effectively, it’s important to have a strategy to keep malware out. Today, we’ll talk about a few basics you should know to keep your cybersecurity strategy working pr...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...