Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
While my usual columns tend to contain a single topic, covered with a semblance of depth, this article is more of a rapid-fire approach to some helpful tips and “gotchas” in Outlook.
Inbox Tips
Preview Attachment Without Opening It
Save time by quickly perusing an attachment with Outlook's built-in viewer tool rather than opening and closing the file. This is especially useful when you're trying to find a very specific file.
View Next and Previous Threads in an e-Mail Message
Much like not wanting to open an attachment needlessly, this will prevent you from having to open an e-mail with multiple threads. It is also much cleaner than scrolling to locate the start of the next or previous thread.
Forward an e-Mail As an Attachment
This consolidates e-mails rather than forwards threads.
Or, from the closed mail message:
Quick Parts
Quick Parts are a quick way to insert commonly used text into an e-mail message. As opposed to trying to use Signatures for this purpose (where only one signature could be inserted), you can insert multiple Quick Parts of information. This also ensures consistency of verbiage.
Create the Quick Part:
Retrieve the Quick Part:
Keyboard Shortcuts
These are for those of you who like to keep your hands on the keyboard as much as possible.
Calendar Tips
Overlay Multiple Calendars
Outlook 2003 gave you the ability to view calendars side-by-side. Now, in Outlook 2007, you can also overlay multiple calendars for a better view of who is available at any given time. Of course, all of this depends upon people actually updating their calendar on a regular basis.
Send a Calendar Via e-Mail
If someone needs to know your schedule, but you haven't shared your calendar with them and don't plan to, it is easy enough to send a specific time frame of your calendar.
Calendar Keyboard Shortcuts
Gotchas!
Don't Edit an Attachment Before First Saving It to a Specific Location
This is probably one of the biggest frustrations associated with working with attached files. When you open an attached file, Outlook saves it to a very difficult to find temporary directory. By spending time editing and simply clicking “Save,” you are saving the file to that temporary directory, thus not really saving the changes to the attachment at all. Always choose “Save As” whenever you open an attachment with the goal of working with that file. Choose the specific location to which you want the file saved. If you believe your changes have been saved to this temporary location, contact your Help Desk for assistance.
Clicking 'Reply to All'
Ouch! This one can really come back to bite you. If you haven't done this yourself, you may have been the unintended recipient of a “reply all” gaffe, or heard a horror story about one. This happens to individuals, firms, corporations and government agencies, and is often well-publicized, much to the chagrin of the sender. Once you send an e-mail outside of your domain, there is no getting it back. Notice that I did not give you the keyboard shortcut for Reply to All. Always review your recipient list prior to sending. Enough said.
Keep Recipient List Private When Necessary
Using the BCC (blind carbon copy) field in your message will ensure the privacy of those recipients in that mail. Where is the “Gotcha”? Some Exchange servers are set up to have a limit to the number of recipients, BCC field included. If you are planning a mass mailing, consult your Exchange administrator. Spammers love to use the BCC field. Because of this, some Exchange servers are set to block e-mails that have more than a certain number of recipients.
Carelessly Dragging Files or Folders
While sub-folders are an excellent method of organizing e-mails, it's easy to carelessly drag a file or folder to the wrong location. Remember; don't let go of your mouse button until you see that the file is being dropped into the intended folder.
Minimize Add-ins
If you have an IT Department, they may have “firm approved” or “mission critical” applications, meaning those applications have been tested in your PC environment and don't conflict with any of the other applications. Downloading programs from the Web, or via disk someone provided you, may do more than just install the program you want. Some install add-ins without your knowledge into your main Office applications, including Outlook. This can wreak havoc with the approved applications in use if the add-in wasn't tested first. It will also make a noticeable difference in the startup time when launching Outlook.
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?