Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: An Intro to Windows 10’s Built-In Virtual Desktops

Tip of the Week: An Intro to Windows 10’s Built-In Virtual Desktops

On a Windows machine, look at your taskbar, near the Start button and the search function. The next little icon, the one that almost looks like a bit of film, is the Task View button, the button that (among other purposes) allows you to create and manage virtual desktops. For this week’s tip, we’ll discuss how to use this handy feature, starting with why you might want to.

What is a Virtual Desktop?

To be completely clear, this blog is referring to a very specific type of virtual desktop, which is important to state right off the bat.

Oftentimes, when we refer to “virtual desktops,” we are talking about a computing environment that is hosted in the cloud, which can be accessed from almost any device, from anywhere. Think of it like a Voice over IP (VoIP) solution, but instead of just your phone, it’s the whole computer.

Here, we’re talking about a slightly different version of that concept. Windows 10 allows its users to have multiple instances, or sessions, of Windows 10 running at the same time, via the built-in Virtual Desktop function. This has many potential uses in a business, most notably, aiding in organization while keeping different tasks and their accompanying resources separated from your other tasks and their resources. Listen to music on a streaming service while at work? Free up some valuable desktop space by accessing the service in a secondary, virtual one. Or maybe you’re a compulsive email checker - knowing that you have it open in another desktop may be enough to keep you from becoming tempted. It really is up to you to figure out how they are most useful to you.

In fairness, it really would be more accurate to call this feature “Virtual Monitor,” because it works more like adding an additional monitor setup than virtualizing a desktop... but we aren’t in charge of that kind of thing.

Working with Windows 10’s Virtual Desktops

Click on the Task View button. If your Task View button is missing, right-clicking the taskbar and selecting Show Task View button will fix that.

Alternatively, you can also open Task View by pressing Windows Key + Tab

This will bring you to the Task View. On the bottom right, there will be a New Desktop button, which you can click to create a new, virtual desktop in addition to your original desktop. There are a few easy ways to switch back and forth between them - you can select the desktop to view from the Task View screen, use a four-fingered swiping gesture on certain touchpads and touchscreens, or a keyboard shortcut: Ctrl + Windows Key + Left/Right Arrow.

To use your programs and applications in your virtual desktops, open them as you normally would. While many apps will allow an instance in each desktop, others will pull you to the desktop that has the application running. Closing one of your virtual desktops will also cause any apps open in it to jump as well.

How do you anticipate using these virtualized desktops in your day-to-day, if at all? Let us know in the comments!

Hit Back Hard Against Malware
Your Business Processes Are Everything
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 04 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Hosted Solutions IT Services Privacy Network Security Data Backup Email Malware Internet Hackers Software IT Support Business Efficiency Outsourced IT Innovation Microsoft Computer Hardware Data Recovery Mobile Devices Productivity Managed IT Services Small Business Upgrade Business Continuity IT Support Google Cloud Computing Backup Cybersecurity Phishing Smartphone Collaboration Ransomware Tech Term User Tips Communication Managed Service Provider Disaster Recovery Workplace Tips Business Management Managed IT Services VoIP Windows 10 Mobile Device Managed Service Smartphones Internet of Things Android Quick Tips Social Media Paperless Office Data Management Remote Monitoring Saving Money communications Network Managed IT Facebook Browser Encryption Office 365 Windows 10 Artificial Intelligence Windows Server Save Money BDR Miscellaneous Business Technology Virtualization Wi-Fi Risk Management Compliance Covid-19 Holiday Passwords BYOD Help Desk Vendor Management Training Password Apps Mobile Device Management Health Remote Work Office Government Document Management Microsoft Office App Automation Healthcare Users Windows 7 Laptops Bandwidth Employer-Employee Relationship Robot Analytics Applications Data Security Firewall Gmail Unified Threat Management Recovery Big Data Bring Your Own Device Going Green Chrome Avoiding Downtime Information Technology Scam Blockchain Wireless Antivirus Project Management Hosted Solution Mobility Information Website File Sharing Infrastructure Telephone Systems SaaS Data loss Vulnerability Regulations Content Filtering Apple Computers Two-factor Authentication Storage Money Data storage Computing IT Management Processor Redundancy Tip of the week Customer Service Operating System Access Control Downtime Printing VPN Hard Drive Virtual Reality Machine Learning IoT Remote Computing Customer Relationship Management Tablet Meetings Virtual Private Network Settings Files Company Culture IT Service RMM Social Software as a Service Politics Router Proactive Maintenance Work/Life Balance Gadgets Employee-Employer Relationship OneDrive Flexibility Unified Communications Budget Bitcoin Remote Workers HIPAA YouTube WiFi Cooperation Mobile Security Upgrades Outlook Mouse Patch Management Remote Worker Time Management Networking Twitter Administration Google Drive LiFi Education Electronic Health Records Display Data Breach IT solutions Monitoring End of Support Business Growth Network Management Employees Augmented Reality Assessment Dark Web Social Network Mobile Computing How To Recycling Monitors Private Cloud Server Management Alert Mobile Office Sports Utility Computing Consulting Electronic Medical Records Tech Support File Management Hacker The Internet of Things Solid State Drive Uninterrupted Power Supply Consultation Legal Current Events Smart Technology Digital Payment Payment Cards Wireless Technology How To Samsung Managed Services Provider Websites Identity Theft Net Neutrality Co-Managed IT Word Search Licensing Remote Monitoring and Management Data Storage Management Chromebook Internet Exlporer Spam Professional Services Managed Services Software Tips Manufacturing Optimization Shortcut Connectivity Google Calendar Security Cameras User Management Best Practice Vulnerabilities Authentication Cookies Black Market Mobile Device Managment WPA3 Financial CRM Gadget Biometric Firefox Enterprise Resource Planning Bookmarks Managed IT Service San Diego Writing Emoji Automobile Computer Care Transportation Mobile VoIP Permission Remote Working Employer/Employee Relationships IT Assessment Features Specifications Network Congestion Virtual Assistant Vendor Heating/Cooling IT Consulting Hard Disk Drives Virtual Machines Windows 8 WannaCry Save Time Legislation IT Technicians Computer Repair GPS Batteries Geography Authorization Permissions Nanotechnology Identities Hacking Fleet Tracking SharePoint Procurement Staff Physical Security Projects Gamification Mobile Favorites Break Fix Social Networking Retail Cortana Cyber security Unified Threat Management Test Hotspot 3D Printing Crowdsourcing Proactive Maintenance Digitize Cache Black Friday Roanoke — Central Technology Solutions Virtual Desktop Supercomputer Wasting Time Smart Devices Servers G Suite History Solid State Drives Credit Cards Star Wars Mirgation Tracking ROI Google Wallet High-Speed Internet Fraud Screen Reader Processors Hard Drives Disaster Google Docs Trending Asset Tracking Downloads Office Tips Taxes Return on Investment Conferencing Motherboard Google Maps Teamwork MSP User Error Language Unsupported Software Virus Peripheral Database Management Shadow IT Humor Mail Merge Cyberattacks Cyber Monday technology services provider Update IT Budget Database Sensors Technology Laws Cabling Options Holidays VoIP Backups Sponsor Migration Notes Drones Touchscreen Techology Development Zero-Day Threat Smart Tech OneNote Operations Active Directory Deep Learning Lenovo Managing Stress Instant Messaging Data Warehousing Social Engineering USB Marketing Shared resources Windows Server 2008 Statistics Tech Terms Computing Infrastructure Mobile Data PCI DSS Buisness Point of Sale GDPR Outsourcing Address eWaste Read Only Technology Assurance Group ’s 18 Voice over Internet Protocol Outsource IT Cybercrime 5G IT Digital Obstacle Technology Tips Chatbots PowerPoint Value of Managed Services Alt Codes Disaster Resistance Cables Backup and Disaster Recovery Cryptocurrency Multi-Factor Security Wearable Technology Dark Data Personal Information Telephony Windows Server Superfish Enterprise Content Management Finance Microsoft Excel Modem Safety Sync Bluetooth Printer Theft Alerts Law Enforcement Video Conferencing Distributed Denial of Service Annual Convention Public Cloud Telephone Notifications Laptop Travel Wireless Internet Business Telephone Hacks Spyware Course Cost Management E-Commerce Comparison Identity Botnet Typing Proactive IT Wires Human Error Hard Disk Drive Cameras Motion Sickness CCTV Emergency Administrator Students Regulation CrashOverride Relocation Webcam IT Consultant Error Web Server Printers