Microsoft Key Management Services (KMS)
Description: If you installed Office 2016 by going to office.unc.edu. This is a Click-to-run version which has a different license and does not require the use of KMS. What is KMS? Microsoft Key Management Services (KMS) provides a way to automatically activate volume license editions of Microsoft Windows and Microsoft Office. It is designed to allow […]
» Subjects: , » Tags: ,

Windows 8 Software Compatibility
Description: The following is a list of software commonly used at UNC which we have briefly tested.¬† Although the list may say that an application is compatible, there is no way for us to fully test every function of that application, so if the Developer does not support it, there is no guarantee that this list […]
» Subjects: , , , » Tags: , ,

Connecting to NAS with Windows 8
Description: ¬†Previously, a registry change was required on Windows 8 computers to connect to the campus Network Attached Storage (NAS) solution (storage.unc.edu or myfiles.unc.edu).¬† Due to some updates this is NO LONGER needed. Windows 8 computers should successfully connect to campus NAS solutions without any registry edits. For more information please visit: Getting Started on storage.unc.edu […]
» Subjects: , , , » Tags:

Windows XP Compatibility Mode in Microsoft Windows
Description: What is Compatibility Mode? According to the Microsoft knowledge base article, compatibility mode is a feature of Windows that allows you to run programs written for earlier versions of Windows such as Windows XP or Windows 2000. Many programs created for Windows XP may work in Windows vista and above; however, there are some that […]
» Subjects: ,

What is Windows Update and why should I run it?
Description: The Windows Update (or Microsoft Update) utility is used to keep your Windows-based computer up-to-date with the latest patches. PCs connected to the UNC Network must be up-to-date on critical patches that have been available for 2 months or longer to connect to our network. These updates will close security holes in your computer and […]
» Subjects: , » Tags: , ,