Quattro technology

The ability to inspire driver confidence in getting traction when and where needed, regardless of road conditions, is a powerful one. So it’s no wonder that the notion of a car with permanent four-wheel drive was a revolutionary concept and set a new benchmark for driver safety and performance.

Yet this is what quattro technology brought to the idea of the four-wheel drive. Drivers could now tackle snow covered mountain passes, rain-slicked highways and gravel-strewn rural roads with ease while still enjoying a level of performance unachievable by two-wheel drive cars on smooth dry roads.

This simple, yet powerful idea of sending power to all wheels was made most apparent when introduced to the World Rally Championship where the startling acceleration and remarkable traction achieved by quattro technology was eventually deemed an “unfair advantage” and banned from road racing altogether after repeatedly dominating the field.

How it works

The basis for quattro technology is permanent power being applied to all four wheels distributed between the front and rear axles. By sending power to each axle, there is a much lower power requirement and very well balanced handling, which means better traction during acceleration and greater safety thanks to exceptional road holding.

This is especially true in conditions where two-wheel-drive vehicles would lose grip. If the wheels of one axle lose grip and threaten to spin, the drive torque in a quattro system, is redirected in the central differential to the other axle. This occurs automatically and continuously, creating greater lateral stability and improved traction.

Permanent all-wheel drive technology like quattro is essentially a proactive mechanical system with a self-locking center differential and continuously variable torque distribution, so it instantly responds to wheel speed differences and dynamically adjusts power to the wheels with the best traction.

When supported by advanced electronic control systems it can offer numerous benefits over other all-wheel drive systems bringing sports car-like performance and handling with uncompromised all-wheel drive traction.

Driver confidence

Since quattro technology was first introduced in 1980 at the Geneva Motor Show in Switzerland it has not only established itself in motor sports, but in cars that are used on roads daily. It provides high levels of safety, dynamism and improved traction on all kinds of surfaces and all-round better performance.

It is under extreme conditions and in unexpected situations that the need for quattro technology became apparent and important. When other systems would suffer from understeer or oversteer, an all-wheel-drive system stays smooth and balanced. Even if a driver decelerates in a bend which they have taken too fast, the system has the ability to independently stabilize itself and can easily be brought back into line.

It’s for these reasons that quattro technology not only raises the benchmark in high-performance engineering but its permanent four-wheel drive solution is fast becoming an industry standard.

Audi South Africa continues to be an innovator in the automotive industry with its revolutionary quattro technology. Experience permanent four-wheel-drive and book an Audi test drive today.

Find More Technology Articles

Posted in Tutorials | Tagged , | Leave a comment

Microsoft And Yahoo Seal Web Deal Cnn

Yahoo and Microsoft have announced a long-rumored Internet search deal that will help the two companies take on their biggest rival, Google. Microsoft’s Bing search engine will power the Yahoo website and Yahoo will  become the advertising sales team for Microsoft’s online offering. Yahoo has been struggling to make profits in recent years. Last year it rejected several takeover bids from Microsoft in an attempt brace the Tsunami alone. Yahoo’s shares fell 12% after the announcement, while Microsoft shares moved up by less than 1%. Microsoft boss Steve Ballmer said the 10-year deal would provide Microsoft’s Bing search engine with the necessary scale to compete.  

Through this agreement with Yahoo, they will create more innovation in search, better value for advertisers, and real consumer choice in a market currently dominated by a single company (google). Microsoft and Yahoo know there’s so much more that search could be. This agreement gives them the  resources to create the future of search engines. In return for conceeding control of its search engine, Yahoo will get to keep 88% of the revenue from all search ad sales on its site for the first five years of the deal. In the last 5 years of the agreement the will have the right to sell ads on some Microsoft sites.  

Yahoo’s team will have to brace itself for job losses over the next two years. Some staff will transfer to Microsoft; others would stay on with Yahoo. Yahoo said the deal would benefit Yahoo’s users and advertisers. This agreement comes with an abundance of value for Yahoo, the users and the industry. It also establishes the foundation for a new era of Internet innovation and development. The deal became possible after Yahoo’s co-founder Jerry Yang stepped down as chief executive of the company late last year. Yahoo said the deal would boost annual operating income by $ 500m and secure $ 200m in savings. Microsoft offered to buy Yahoo in January 2008 – with an offer worth about $ 47.5 billion dollars.Yahoo’s new CEO,  Ms Carol Bartz, finally sealed the deal. The deal ends numerous years of back-and-forth negotiations between the two companies.

By: Frank Bilotta

Yahoo and Microsoft have announced a long-rumored Internet search deal that will help the two companies take on their biggest rival, Google.

Posted in Internet | Tagged , , , | Leave a comment

Microsoft Access 2003 Damaged Installation

One of the most common reasons for inaccessibility of the MS Access database is improper or damaged installation of MS Access 2003. An incorrect installation of MS Access 2003 also results in incorrect registry settings, corrupted DLLs (Dynamic Link Library files), or missing DLLs. To overcome such situations, the best and easy way is to restore the data from an updated backup. However, if no backup is available, or backup falls short to restore desired information, then you will need to opt for an advanced access database repair software that can recover your lost data.

As a practical instance, when you attempt to open your Access 2003 database (Employee), you may encounter any of below issues:

Your database does not mount.
Your database mounts, but you are unable to view the records.
Your database mounts, but you view that your records are not displayed correctly.
Fatal error message that does not allow you to access your database.

The root cause for improper behavior of your database is damaged installation of MS Access 2003. To resolve the above behavior of your Access database, you will need to follow the below measures:

You will need to repair Access 2003 installation by using the below methods:

1. Start Access 2003.
2. Click Detect and Repair on the Help Menu.
3. Insert the Microsoft Office 2003 CD when prompted. In case, you are not prompted, install Access 2003 from the network.
4. Follow all the instructions until Access 2003 repair gets completed.
5. Exit Access 2003.
6. Start Access 2003.

To confirm that your issue has been resolved, perform all the tasks that caused the above behavior. However, if the issue is not resolved and you still encounter any of the above database behavior, then you will need to use Access Recovery application to recover your data. Such Access Database Repair tools use high end scanning methods to repair corrupted or damaged Access databases. These access repair tools are built by highly qualified data recovery experts and easily understandable without any technical knowledge. Such applications provide complete recovery of Access database files like .accdb and .mdb.

Stellar Phoenix Access Recovery is an advanced Access Repair application to repair all corrupted MS Access objects, such as, tables, queries, forms, reports, macros, and modules. Designed for Windows Vista, XP, 2003, 2000 and NT operating systems, the read only software is compatible with Microsoft Access 2007, 2003, XP (2002), and 2000.

More Microsoft Articles

Posted in Internet | Tagged , , , , | Leave a comment

Virtualization Plug And Play From Fujitsu Zero Client

Fujitsu’s expanding portfolio of virtualization solutions from the desktop computing with the launch of the device plug-and-play MZ900 Portable Zero Client that allows users to access a virtual desktop from any computer anywhere for a can connect to the network.

Fujitsu desktop virtualization solution called Zero Client infrastructure concept that revolutionized the client computer. In concept, the computer is not equipped with any component (zero) in addition to network devices.

Zero Client shaped portable USB memory devices. In the partition read-only USB that there is software that serves to establish access to safe, easy and fast to the system so that users can log on to the image of his desktop Zero Client, from anywhere as long as there is a connection.
Sensitive data that is encrypted can only be accessed when the device is plugged in and get authorization. When removed, Portable Zero Client does not leave any traces on the host machine.

Through this approach, Fujitsu is providing all the benefits of desktop virtualization so that companies can save much time and resources.

Fujitsu also complete one of the biggest risks faced by the mobile-workforce, ie a virus or Trojan attack on a secure connection to the host machine. Through Portable Zero Client, corporate networks are protected from these attacks because they can not forcibly change the connection and software in it. In addition, the software in Portable Zero Client login process from a protected partition that protects the malware on the host machine.

“The workers of today have a higher mobility, creating a dilemma for companies to choose between limiting access and reducing productivity. To this end we develop a Fujitsu Portable Zero Client that combines both – a secure connection into the Zero Client infrastructure that is flexible, “said Achmad Sofwan, Chief Operating Officer of Fujitsu Indonesia, as quoted by an official statement.

“Now mobile workers can bring their personal desktop in your pocket, wherever they go with a peaceful mind because their data is protected, regardless of where they connect to the network,” he said.

If you want to read related article, visit our bloog at http://pancawara.com/

Hi, My name is adit, I am a student, I am 20 years old, My hobbies is listening music cause I’m very like the music. Beside like the music, i also like writing and now I have a website, its name is pancawara.com. Please visit my website at http://pancawara.com/. Thank you.

Posted in Tutorials | Tagged , , , , , , | Leave a comment

Marine Technology

Marine technology refers to a vast umbrella of elements that have helped us to explore what lives in bodies of water. This includes saltwater of the oceans and the freshwater of various lakes. It is amazing how many living things are found in water. Learning about them helps use to find out how they affect those living on land. It also helps us to understand why keeping these bodies of water free from pollution are so important.

There have been many breakthroughs in the way of underwater technology over the years. As a result, divers are able to go to the depths of these water masses. They can evaluate what is living there, observe it in its natural habitat, and document that information. The use of such information means that we also know how to protect certain species of live in the water they could become extinct without our help.

Thanks to forms of underwater technology such as cameras and video recorders, all of us can share in those experiences. While most of us will never dive into the depths of these waters we can watch documentaries, view photos, and even watch videos online. Of course there are some places in the water that humans cant safely go.

That doesnt mean we cant explore them though. Marine technology allows for the use of ROV (Remotely Operated Vehicles) to be used in their place. They can be easily navigated through the waters to the desired location. A cable is used to release them off a boat. They have video cameras on them that relay information back to the humans who are safely on the boats.

The downside is that an ROV costs an estimated $ 6 million. That is a large amount of money to invest in the equipment. Yet the design of them makes them safe to use as they dont disrupt the environment. They have also provided us with substantial information about aquatic life that we wont have without the use of such equipment.

A very similar type of technology used id the AUV (Autonomous Underwater Vehicles). They are much smaller than ROVs and about half the cost. They can get into locations that are smaller too. However, they can be tougher to navigate through the waters. The AUV though is often used for a variety of underwater investigations.

Sonar stands for Sound Navigation and Ranging. This is a big part of marine biology that was first used on the water by vessels so that they could detect land masses and even other vessels around them. Today it is used to help send information back and forth from the boats to the underwater equipment.

Sonar is also used to help locate the ideal place for observing various forms of aquatic life. Many people use this type of marine technology too when they are navigating a boat or even trying to locate fish in the waters before they toss their line out. All of this technology has certainly allowed us to explore what lives in our water in new ways.

Ocean Technology
Marine Technology

Posted in Tutorials | Tagged , | Leave a comment

Ethernet Technology

People has known the Ethernet technology since coaxial cable connection system was created to comprise of various computers and technological devices by PARC or Palo Alto Research Center Inc. (then known as XEROX PARC). Therefore, it is the oldest yet mostly used for networking until the present day.


Three years later, a partial draft version was finished and prepared for testing. It was announced successful not only because a connection between two computers were made, but also because data transfer fruitfully took place with the speed of 3 megabytes per second.


The term Ethernet was formed by putting words Ether and Net together. Ether was picked because of the use of Fiber Optics, where light is the medium of data transportation. Net is an abbreviation for network, the community of link computers. With its promising action of making computer connectivities possible, Ethernet later on gave life to what we now know as Local Area Networks (LANs).


Ethernet works by linking computers and other devices through cables. One end of these cables is connected to the computer, and the other is to a connector. These connectors could be Repeaters, Hubs or Switches. Connectors, such as the three, are grouped according to how they do their role in the system. Ethernet applies the cause-and-effect approach.


Firstly, a computer will summon a signal where it embeds a message. With the help of cables, the signal travels from its origin to the connector and then from the connector to the accepting computer. When the assigned computer catches the signal, it will transmit its own back to the sender and react according to the prompted information.


In a standard network, all connected computers have exactly the same boundaries. But in more complex and larger networks, there are usually one or two computers that are in control of the interactions of the entire network.


In the present, the Ethernet technology is available in many versions. The earliest ones are the 10BASE5 (the very first standard), 10BROAD36 (the first standard that allowed long-distance connections), 10BASE2 (also known as the Cheapernet) and 1BASE5 (said to be a failure but started the following developments in Ethernet technology).


The more modernized generation of the technology came with different speed performances. The 10 megabit Ethernet was the first to step out of the previous 1Mbit/second rating. And then the Fast Ethernet, which upholds the rate of 100Mbit per second, dethroned the previous by executing ten times higher.


And then the Gigabit Ethernet was born, priding itself with an even more edgy speed of 1 gigabyte per second data transmission. The Gigabit Ethernet soon opened doors for the 10 Gigabit Ethernet, the variant that surpassed its already-powerful precedent. And today, the public is only waiting for newer versions 40 and 100 Gigabit to be released.


It is hard to imagine where we would be now without the presence of networking technologies such as the Ethernet. Even the simplest of daily actions would be very bothersome when networking automation is erased. And so, we would always have to be thankful that Ethernet was formalized and born into our world.


To learn more about Ethernet Technology And for more information on Ethernet fiber, visit today.

Related Technology Articles

Posted in Tutorials | Tagged , | Leave a comment

The Need For Convergence In Desktop Virtualization

The Need for Convergence in Desktop Virtualization

Desktop and application virtualization technologies have made incremental progress by developing specific approaches to solve individual desktop computing challenges. Local virtual desktop have been successful in development and testing because they provide complete operating system isolation. Server-based computing and VDI have enabled enterprises to centralize desktop computing in the data center for task workers and outsourcers to increase security and availability. Application virtualization and streaming have enabled enterprises to distribute applications without installation and run multiple versions of the same application at the same time. However, no single approach to desktop virtualization has delivered a compelling solution to replace traditional PCs because each has significant barriers to widespread adoption. What is needed is a desktop virtualization solution that provides complete convergence and delivers the familiar experience of a Windows desktop using the right desktop virtualization technology for the right user scenario.

Desktop Virtualization User Requirements

Enterprises are made up of different types of workers that have unique desktop computing requirements. While the percentage breakdown for each type of worker varies by industry and company, most large enterprises have some population within each category (see Figure 1). Traditional PCs have evolved over the past two decades to meet the requirements of each type of user. To replace traditional PCs, desktop virtualization must provide a single desktop virtualization platform that can meet the needs of task workers, campus workers, mobile workers, remote workers and address unmanaged PCs used by employees, contractors and consultants.

1. Task Workers

Task workers use a thin client or low end PC to accomplish a specific task while working on a campus network. This type of user does not typically require personalization or the ability to install applications. In fact, task workers often share the same PC with other users during different shifts. VDI or server-based computing is often ideal for this type of user because of the ability to centralize and pool resources. Network streaming can also be used for these types of users.

2. Campus Workers

The campus worker uses a desktop PC (or thin client) on the internal LAN to connect to computing services. Campus workers prefer a personalized desktop environment where they can install their own plug-ins and applications and configure settings to their preference. Depending on the types of campus worker, local desktop virtualization, network streaming or VDI may be appropriate.

3. Mobile Workers

Mobile workers use a laptop as their primary workstation. These users work at home, on the road, and in the office. They use a mix of wired and wireless networking to connect to computing services over the LAN and over the WAN using VPN. Mobile workers require personalization, the ability to work offline and sync their desktop, particularly if they have multiple computing devices. Using local desktop virtualization on a laptop or running their virtualized desktop from a portable drive is ideal for mobile workers.

4. Remote Workers

Remote workers work primarily at home or at a remote branch office that is connected over a WAN using a VPN. Remote workers use either a laptop or a desktop computer depending on their mobility and rarely if ever work on campus. Using local desktop virtualization on a laptop or running their virtualized desktop from portable drive is ideal for the mobile worker.

You can find more information here: Workspace Virtualization

Find More Virtualization Articles

Posted in Tutorials | Tagged , , , | Leave a comment

How To Create An It Virtualization Strategy

Virtualization allows an organization to run multiple servers and operating systems with less hardware than traditional server setups. The setup reduces IT resources needed to operate and improves disaster recovery capabilities. However, implementing a virtualization strategy is a requires careful planning for successful implementation.

Understanding Virtualization

In traditional IT infrastructure, every server is a physical computer in the data center. Each operating system used requires its own server, and specific tasks such as printing or email may each be handled by a specific server. However, the computing load among each machine is not equal, and some computers use few resources while still demanding as much space and resources in the data center.

Through virtualization, a single computer can act as several servers. System resources are divided among each virtual server, making it easier to balance resource needs as traffic fluctuates. Each computer can run multiple operating systems if needed. The net result is fewer physical servers in the data center, reduced utility and cooling load, and lower overall IT operating costs without any loss in data accessibility.

Virtualization works in the other direction, allowing multiple physical devices to act as a single logical device on the network. The most common use is in storage where multiple storage devices are linked together to provide faster access and greater disaster recovery through redundancy.

Analyze Your Company’s Needs

Virtualization has a number of advantages over traditional server architecture, but the migration process can be disruptive to the organization. In order to ensure a smooth transition and an efficient use of IT resources, the existing computing environment should be analyzed.

Traffic analysis conducted over long periods gives important information on which servers are used the most, and when the peaks and valleys of network traffic occur. Low-use servers can be combined into a single physical server without straining the processing or storage capabilities of one machine. Servers that tend to peak at different times can be combined to balance the traffic load. Managers determine which physical servers should be kept, possibly with some hardware upgrades, and which should be retired. Critical information can be protected with the improved disaster recovery that comes from virtual storage. Once the physical equipment needs are calculated, the layout of the server room can be designed for maximum cooling opportunities.

Which Services Should Be Virtualized?

Although virtual servers and storage are valuable tools, more is not necessarily better. Combining two busy physical servers into one is only going to strain existing hardware and have the potential to create a heat disaster. Efficient virtualization is more important than simply trying to cram everything onto one physical server.

The strategy should be analyzed to see whether the long-term savings will be worth the short-term costs. In many cases the breakeven point occurs very quickly, in a matter of month or even weeks. However in others, the overall cost savings may not be worth the expenses and service disruption that can go along with a transition to a virtual architecture. Remember to include the value of increased disaster recovery from virtualized storage. The ability to keep operating seamlessly in the event of hard drive failure may be priceless to many organizations.

Implement And Improve

After the plan is created and every detail is worked out, it is time to take the plunge. A well-designed virtualization strategy will have minimal impact on company operations. Taking the time to work out a detailed migration strategy will save the company time in the long run as the transition occurs without complications.

Major migrations may be best handled in stages. Move some physical servers to virtual and evaluate how the changes impact company operations. If all goes well, convert a few more servers and so on. Taking it slowly allows the organization to react to unanticipated problems found in earlier stages to allow later stages to proceed more easily. Virtual storage is often done early in the process, since the conversion process is less intrusive and improved disaster recovery is vital.

After the migration is done, periodically revisit the situation to ensure the existing infrastructure still meets the needs of the company. One advantage of virtualization is as traffic demands grow, more physical equipment can be added to support the virtual infrastructure. Anticipate future changes in traffic to keep the system operating at peak efficiency.

Improvements in data access, IT resource use and disaster recovery make virtualization an obvious choice for large IT operations.

Steve Bulmer is chief technology officer of Consonus Technologies Inc., a firm that provides virtualization and disaster recovery solutions to clients ranging from small companies to major corporations.

More Virtualization Articles

Posted in Tutorials | Tagged , , | Leave a comment

What is Microsoft Exchange Server 2007?

Exchange Server 2007was released in late 2006 to business customers as part of Microsoft’s roll-out wave of new products. It includes new clustering options, 64-bit support for greater scalability, voice mail integration, better search and support for Web services, better filtering options, and a new Outlook Web Access interface. Exchange 2007 also dropped support for Exchange 5.50 migrations, routing groups, admin groups, Outlook Mobile Access, X.400, and some API interfaces, amongst other features.

Exchange Server 2007 (v8 or with SP1 v8.1) runs on 64-bit x86-64 versions of Windows Server only. This requirement applies to supported production environments only; a 32-bit trial version is available for download and testing. However, companies currently running Exchange Server on 32-bit hardware will be required to replace or migrate hardware if they wish to upgrade to the new version. Companies that are currently running Exchange Server on 64-bit capable hardware are still required to migrate from their existing Exchange 2000/2003 servers to a new Server 2007since in-place upgrades are not supported in 2007.

The first beta of Exchange Server 2007 (then named “Exchange 12” or E12) was released in December 2005 to a very limited number of beta testers. A wider beta was made available via TechNet Plus and MSDN subscriptions in March 2006 according to the Microsoft Exchange team blog On April 25, 2006, Microsoft announced that the next version of Exchange Server would be called Exchange Server 2007.

Exchange Server 2007 is an integrated part of the Innovative Communications Alliance products. At Exchange 2007 release, the server roles will be:

– Mailbox (MB): The Mailbox server role is responsible for hosting mailbox and public folder data. This role also provides MAPI access for Outlook clients. Note that there is also a variation of this role called Clustered Mailbox role, for use with high-availability MSCS clustering of mailbox data. When Clustered Mailbox role is selected, other server roles cannot be combined on the same physical server.

– Client Access (CA): The Client Access server role provides the other mailbox server protocol access apart from MAPI. Similar to Exchange 2003 FrontEnd server, it enables user to use an Internet browser (OWA), 3rd party mail client (POP3/IMAP4) and mobile device (ActiveSync) to access their mailbox.

– Unified Message (UM): This role enables end users to access their mailbox, address book, and calendar using telephone and voice. IP-PBX or VoIP gateway needs to be installed and configured to facilitate much of the functionality of this server role.

– Hub Transport (HT): The Hub Transport role handles mails by routing them to next hop: another Hub Transport server, Edge server or mailbox server. Unlike Exchange 2003 Bridgehead that needs Exchange admin defined routing groups, Exchange 2007 Hub Transport role uses AD site info to determine the mail flow.

– Edge Transport (ET): The last hop of outgoing mail and first hop of incoming mail, acting as a “smart host” and usually deployed in a perimeter network, Edge Transport provides mail quarantine and SMTP service to enhance security. One advantage of this role is that is does not require Active Directory access, so it can function with limited access to the corporate network for increased security.

Server Role Tasks and UI

Server configuration for both Cmdlet and GUI is organized around the server role concept. To check what roles are installed on the server, you can use task: Get-ExchangeServer and check properties: IsMailboxServer, IsClientAccessServer, IsHubTransportServer and IsUnifiedMessagingServer. For each role, Exchange 2007 provides dedicate tasks to manage properties specific to each server role:

– Get/Set-MailboxServer
– Get/Set-ClientAccessServer
– Get/Set-TransportServer
– Get/Set-UmServer

Note that Get/Set-TransportServer is used by both Transport server roles (Hub Transport and Edge Transport). Please refer to help for more detailed info regarding these tasks. In Exchange 2007 management console under Server Configuration, each server role has a dedicated node with the role name. Servers with the selected role installed will be listed in the results pane for each server role node. A single server will appear in multiple results panes if multiple server roles are installed on that server. This design gives user a clear view on what servers are available for each specific server role.

Adrian Gates (Adrian@apps4rent.com) is a Business Manager with Apps4Rent (http://www.apps4rent.com/outsourced-exchange-hosting.html); which offers exchange 2007 outsource, managed hosted exchange, hosted exchange cost, exchange hosting plan and other application hosting services.

Article Source:

Related Microsoft Exchange Articles

Posted in Tutorials | Tagged , , , | Leave a comment

Microsoft Office Mobile


Original icon set of Office Mobile

Office Mobile originally shipped as “Pocket Office”, and was released by Microsoft with the Pocket PC 2000 operating system in April of 2000. This release was specifically for the Pocket PC hardware platform, as Microsoft’s Smartphone hardware specification had not yet been released. It consisted of Pocket Word, Pocket Excel, and Pocket Outlook. With steady updates throughout subsequent releases of Windows Mobile, Office Mobile was rebranded as its current name after the release of the Windows Mobile 5.0 operating system. This release of Office Mobile also included PowerPoint Mobile for the first time. Accompanying the release of Microsoft OneNote 2007, a new optional addition to the Office Mobile line of programs was released as OneNote Mobile. With the release of Windows Mobile 6 Standard, Office Mobile became available for the Smartphone hardware platform, however unlike Office Mobile for the Professional and Classic versions of Windows Mobile, creation of new documents is not an added feature. A popular workaround is to create a new blank document in a desktop version of Office, synchronize it to the device, and then edit and save on the Windows Mobile device.

In June 2007, Microsoft announced a new version of the office suite, Office Mobile 2007. It became available as “Office Mobile 6.1” on September 26, 2007 as a free upgrade download to current Windows Mobile 5.0 and 6 users. However, “Office Mobile 6.1 Upgrade” is not compatible with Windows Mobile 5.0 powered devices running builds earlier than 14847. It will also be a pre-installed feature in subsequent releases of Windows Mobile 6 devices. Office Mobile 6.1 is compatible with the Office Open XML specification like its desktop counterpart.

On August 12, 2009, it was announced that Office Mobile would also be released for the Symbian OS platform as a joint agreement between Microsoft and Nokia.


Word Mobile

Word Mobile running on Windows Mobile 6 Professional

Word Mobile, originally called Pocket Word, has been included with the Office Mobile suite since the release of the Pocket PC in 2000. It is a word processor program with similar functions to its desktop counterpart, Microsoft Word. Word Mobile allows for basic formatting of documents, and has the ability to save documents in multiple formats including Rich Text Format, Microsoft’s DOC format for reading on desktop versions of Word, and simple Text files. While it is possible to open legacy PSW (Pocket Word) files on the current version of Word Mobile, such files must be saved as another supported format. Word Mobile also allows for insertion of pictures, lists, and tables to documents, however pictures must be added on the desktop version of Word, and cannot be moved. Additionally, Word Mobile includes a spell checker, word count tool, and a “Find and Replace” command. Footnotes, endnotes, headers, footers, page breaks, certain indentation of lists, and certain fonts, while not displayed nor able to be inserted while working on a document in Word Mobile, such features are retained if the original document has them.

Excel Mobile

Excel Mobile running on Windows Mobile 6 Professional

Like Word Mobile, Excel Mobile was one of the original programs included in Office Mobile at its release. It is a spreadsheet program that is compatible with Microsoft Excel, and can create, open, edit, and save in Microsoft’s ‘.xls’ spreadsheet format. Excel Mobile allows for formatting of cells, basic calculations of formulas, and the creation of charts or graphs. As a means of dealing with limited screen resolution, Excel Mobile also has the ability to use a full-screen mode. In addition, it supports filtering of data and split panes to view different parts of a worksheet at one time. Protection settings, zoom settings, autofilter settings, certain chart formatting, hidden sheets, and other features are not supported on Excel Mobile, and will be modified upon opening and saving a workbook.

Outlook Mobile

Outlook Mobile is a personal information manager. Unlike the rest of the Office Mobile suite, Outlook Mobile does not consist of a single application on the Windows Mobile platform, and instead has several separate programs: Messaging, Calendar, Contacts, and Tasks. It synchronizes e-mail, appointments, contacts, and tasks from the desktop version of Outlook. It is not compatible with Windows Calendar, Windows Mail, or Windows Contacts. Outlook Mobile is also capable of bypassing synchronization with its desktop counterpart by interacting directly with Microsoft Exchange Server. This direct interaction allows for an always-on E-mail connection, commonly referred to as Push e-mail. Push e-mail is also available to users with a Windows Live Hotmail account while logged onto Windows Live via their phone.


Outlook Mobile’s Messaging application includes the following features:

Push e-mail using Microsoft Exchange Server

Microsoft Outlook folder synchronization

SMS messaging on phones

MMS messaging on phones

Windows Live Hotmail support

POP support

IMAP support

E-mail attachment support

HTML e-mail support

Exchange searching


Outlook Mobile’s Calendar program running on Windows Mobile 6 Professional

Outlook Mobile’s Calendar application includes the following features:

vCal support

Agenda, Day, Week, Month, Year, and Lunar calendar views

Category support

Microsoft Exchange Server support

Reminders and Alarms


Outlook Mobile’s Contacts application includes the following features:

vCard support

Category support

Contact searching

Exchange searching

Contact photos

Ringtone assignment for contacts on phones


Outlook Mobile’s Tasks application includes the following features:

Category support

Priority status of tasks

Sensitivity status of tasks


PowerPoint Mobile

PowerPoint Mobile was included with the release of the Windows Mobile 5.0 operating system. It is a presentation program capable of reading presentation documents from Microsoft PowerPoint. Unlike Word and Excel Mobile, PowerPoint Mobile is unable to create or edit new documents. Although essentially only a PowerPoint viewer, PowerPoint Mobile also allows for a zooming option to deal with limited screen resolution.

OneNote Mobile

OneNote Mobile running on Windows Mobile 6 Professional

Originally released with the Microsoft Office 2007 Beta, OneNote Mobile is a notetaking program that synchronizes with Microsoft OneNote. OneNote Mobile allows for basic formatting of text, the insertion of media such as pictures or audio recordings, creation of lists, and the use of hyperlinks within documents. Pictures and audio recordings may be taken directly from within the program using a built-in camera and microphone respectively.

See also

Microsoft Office

Pocket PC


Windows Mobile

Comparison of office suites


^ Office Mobile 6.1 Upgrade. Mobility Today. Retrieved 27 September 2007.

^ Crouch, Cameron. Pocket Full of PC Apps. PC World. Retrieved 13 September 2007.

^ Utter, David. Windows Mobile Now With PowerPoint!. WebProNews.com. Retrieved 13 September 2007.

^ a b Pratley, Chris. Out and About with OneNote Mobile. MSDN Blogs. Retrieved 13 September 2007.

^ Langridge, Jason. Windows Mobile 6 – What’s New and What’s Cool?. MSDN Blogs. Retrieved 14 September 2007.

^ a b Chan, John. Japanese WM6 and Office Mobile 2007. Crave – CNET Asia. Retrieved 13 September 2007.

^ Montalbano, Elizabeth (2009-08-12). “Microsoft, Nokia Team to Put Office Apps on Mobile Phones”. PC World. http://www.pcworld.com/businesscenter/article/170080/microsoft_nokia_team_to_put_office_apps_on_mobile_phones.html. Retrieved 2009-08-12. 

^ a b Unsupported Features in Word Mobile. Microsoft. Retrieved 21 September 2007.

^ Use Word Mobile. Microsoft. Retrieved 21 September 2007.

^ a b Ogasawara, Todd. What New in Excel Mobile?. Microsoft. Retrieved 13 September 2007.

^ Use Excel Mobile. Microsoft. Retrieved 21 September 2007.

^ Unsupported features in Excel Mobile. Microsoft. Retrieved 21 September 2007.

^ Hardy, Ed. A Preview of Windows Mobile 2005. Brighthand. Retrieved 13 September 2007.

^ Use PowerPoint Mobile. Microsoft. Retrieved 14 September 2007.

^ OneNote Mobile 2007 quick start guide. Microsoft. Retrieved 13 September 2007.

External links

Microsoft Office Mobile

Outlook Mobile Team Blog

v d e

Windows Phone

Device software

Internet Explorer Mobile  Bing Mobile  Voice Command  Office Mobile  Remote Desktop  Windows Live for Mobile  Media Player Mobile

Desktop synchronization

ActiveSync  Outlook  Media Center  Media Player  Mobile Device Center

Server utilization

Exchange Server  DirectPush


Windows Marketplace for Mobile  My Phone


.NET Compact Framework  SQL Server Compact


Pocket PC  Smartphone  Portable Media Center  Ford Sync

v d e

Microsoft Office

Office suites


95  97  2000  XP  2003  2007  2010 (upcoming)

Mac OS

98  2001  X  2004  2008  2011 (upcoming)



Access  Communicator  Entourage  Excel  Excel Viewer  Groove  InfoPath  InterConnect  OneNote  Outlook (Outlook Connector  Add-ins)  PowerPoint  PowerPoint Viewer  Project  Publisher  SharePoint Designer  Snapshot Viewer for Access  Visio  Word  Word Viewer


Communications Server  Forms Server  Groove Server  PerformancePoint Server  Project Server (Project Portfolio Server)  Office SharePoint Server (Excel Services  InfoPath Forms Services)


Live Meeting  Office Live  Office Online  Office Web Apps  Outlook Web Access


Office Mobile

Office tools

Clip Organizer  Graph  Equation Editor  Picture Manager  WordArt


Accounting  Binder  Data Analyzer  Document Imaging  Document Scanning  FrontPage  Liquid Motion  Mail  Office Assistants  PhotoDraw  Photo Editor  Schedule+  Vizact  Web Components


Microsoft Works  MapPoint  Microsoft SharePoint  Windows SharePoint Server


Information Bridge Framework  Object Linking and Embedding  Office Open XML  Office XML formats  Smart tags  Visual Basic for Applications  Clippy

History of Microsoft Office

Categories: Microsoft Office | Pocket PC software | Windows Mobile Standard software

I am a professional writer from China Quality Lighting, which contains a great deal of information about blitz body kits , 49cc mini motorcycle

Related Microsoft Exchange Articles

Posted in Tutorials | Tagged , , | Leave a comment

Powered by WP Robot

Show Buttons
Hide Buttons