Category Archives: Recent Activity

Windows 10 versus Windows 11 Uptake

I just read a fascinating story from the man himself — Paul Thurrott, that is — over at his website. Entitled “Windows 11 Usage Share Is Struggling…” it raises some interesting questions. Chief among these is “When deciding Windows 10 versus Windows 11, what do business users get?”

Thurrott’s analyses lead him to this conclusion: “Not enough to justify migration.” If necessary, add “…if hardware refresh is required” to that statement. FWIW, I agree. However, I’m not as inclined to finger-point at MS for market manipulation as he is. Let me explain…

Windows 10  versus Windows 11 Is a No-Op

Looking back at typical business migrations as far back as I can remember (the Windows 3.x era, circa 1991), I see a consistent pattern. It explains why business uptake of Windows 11 remains somewhat scant.

Here ’tis: It usually takes 2-3 years for businesses to get serious about migrating Windows versions. And then, that’s only if  the version of Windows is judged “successful” (not Windows Me, Vista, or 8/8.1, for example). Right now, it’s been just over a year since Windows 11 released: October 4 was the anniversary date. Thus, it’s simply too soon for most migrations just yet.

Thurrott and readers make at least two valid points

(a) for a good portion of the installed PC base, Windows 11 won’t run (40-50% by most estimates, in fact)
(b) most businesses manage their own refresh cycle timing, and aren’t inclined to let MS dictate when that should happen.

All this said, I don’t think even MS can derail all of the prior migration history it already knows about, points (a) and (b) notwithstanding. My gut feel is that something else is up beyond seeking ways to force business users forward faster.

Windows 10 EOL Remains Unchanged

October 14, 2025 is now about three years distant. This acts as a full-stop for most business. They don’t ordinarily want to pay for extended support  unless stuck between rock and hard place. (Example: US DoD for Windows XP and 7, on the way to Windows 7 and 10, respectively.)

Various sources put the PC refresh interval in business globally between 4 and 10 years, with the most common recurring value at 5 years. Depending on where organizations are in that cycle, I guess at least 80 of businesses would refresh anyway before Windows 10 hits EOL.  CPUs and TPMs in use in early 2018 define the boundary between what’s in and what’s outside of Windows 11 requirements. That puts the maximum interval for refresh at about 7 years and 9 months (7.75 years). IMO, that’s longer than normal for most concerns.

New PCs purchased since 2019/2020 will meet Windows 11 requirements as a matter of course. Thus it’s really PC’s purchased before January 2018 (or older models purchased through 2020, no doubt to obtain steep discounts) that really come into play.

My best guess is that, as with prior major versions of Windows (3.1, 95, 2000, XP, 7, and 10 — see the pattern?), 11 migrations will get serious in late 2023 and throughout 2024. That’s just in time to stay ahead of EOL for Windows 10. It’s also in tune with most prior migration cycles. Need I say more? I think not…

 

 

Facebooklinkedin
Facebooklinkedin

2023 Windows Insider MVP Application

Well, then. The deadline for the 2023 Windows Insider MVP application is in two days (November 4). I just uploaded mine a few minutes ago. I’m nearing the completion of my first 5 years with the program — I was first admitted in 2018 — and hoping to keep it going for at least that long again. As I filled out the application, I perforce took a look at my Windows related activities over the past 12 months. I’d like to report on same to my readers here as well.

2023 Windows Insider MVP Application Highlights

Here’s an abbreviated, bulleted list of what I reported to the Windows Insider Team in making my 2023 application:

  • 217 posts in the period from November 1, 2021 to October 31, 2022 right here to EdTittel.com
  • 27 Windows-related articles for ComputerWorld (including revisions)
  • Over a dozen Windows-related articles for each of Tom’s Hardware and TechTarget
  • Over 500 posts to TenForums.com and over 200 posts to ElevenForum.com
  • Regular social media presence for Windows work on Twitter, LinkedIn and Facebook

It’s not much different from what I’d been doing for the preceding 4 years, but it’s always fun and interesting to see how much happens over the course of a year.

What Comes Next?

It takes a while for the Windows team to handle all the incoming applications, including renewal apps from the 100-plus people who already belong to this program. You can check out that list under the “Get to know Windows Insider MVPs” heading on the program’s home page. Here’s what my listing there looks like:

2023 Windows Insider MVP Application.listing

Hmmm. Looks like I need to update my profile mention of Windows 11, too. [Click image for full-sized view.]

Indeed, Windows 11 certainly took a lot of my time over the past 12-18 months (it made its preview debut on June 28, 2021: I got in the second day of release). I can’t wait to see what happens next, and to learn how to install, use, tweak and troubleshoot same.

Wish me luck: I’m hoping for another 5 years of WIMVP status, if not more. As soon as they let me know if I’m in or out for 2023, I’ll report here. Fingers crossed, in the meantime.

Facebooklinkedin
Facebooklinkedin

Using Winget For 4 Ways To Update

I’ve been researching an upcoming ComputerWorld story about the terrific and powerful PowerShell based Windows packager: Winget. It’s a peach! I mostly use it for keeping applications and supporting elements current. Lately,  I’m  using Winget for 4 ways to update my apps. Let me explain…

How-to: Using Winget for 4 Ways to Update

Way 1: Check Pending /Available Upgrades

By itself, the command winget upgrade simply shows what’s ready to upgrade. It doesn’t actually do any upgrades. Thus, it offers a quick easy way to see what upgrades are available. That’s why it appears as the lead-in graphic for this story.

Ways 2 & 3: Perform Blanket Upgrades

In fact, two different command strings provide varying degrees of upgrade capability

  1. winget upgrade –all
  2. winget upgrade –all –include-unknown

By default winget only upgrades to a new version when it recognizes the current version. Then, if the current installed version is lower-numbered than the pending one, the upgrade goes ahead. Some-times, for whatever reason, winget can’t find the current running version into. In such cases, the upgrade –all variant skips them. Thankfully, adding –include-unknown to the string tells winget to upgrade those anyway. Consequently, I use that more inclusive variant because there’s less follow-up needed.

To illustrate, the next screencap shows winget upgrade –all –include-unknown output on the PC that produced the lead-in snap. Notice please: 5 items found, 5 items upgraded. Good-oh!

The –all –include-unknown variant of winget upgrade covers the most possibilities. On this PC, all 5 candidates upgrade.
[Click image for full-sized view.]

Way 4: Targeted Winget Upgrades

Examined closely, both preceding screencaps shows an ID column. Indeed, that information provides a “package name” for its associated application. Thus, you can always upgrade a single package at time using this syntax:

winget upgrade <package-name>

For example, names shown in the screencaps include Mozilla.Firefox, TeamViewer.Teamviewer, AntibodySoftware.Wiztree, Google.Chrome and Microsoft.WindowsSDK. That follows a mostly predictable structure: builder-name.package-name. For speed, I like to use it when winget presents only a single option, or when a winget blanket command fails.  I’m learning that happens sometimes, for various odd reasons.

There are many ways to work with winget I haven’t yet mentioned. These could appear in future posts here. Certainly, they’ll definitely be covered in my upcoming ComputerWorld piece. Right now, that’s scheduled to appear online before month’s end. Hopefully, you’ll get a chance to catch that during the busy holiday season.

 

Facebooklinkedin
Facebooklinkedin

KB5018482 Announces Impending 21H2 End

OK, I’ll admit it. I wasn’t expecting much excitement upon downloading and installing KB4018482 yesterday. Sure, it raised the Build level to 19045.2193 on my production desktop. And it brought various modest updates and fixes. What I wasn’t expecting, upon reading its Support blurb, was to see that KB5018482 announces impending 21H2 end of service.

Here’s that it says, reproduced verbatim (dated October 11, two weeks prior to the KB pub date [black, bold emphasis mine]):

IMPORTANT All editions of Windows 10, version 21H1 will reach end of service on December 13, 2022. After December 13, 2022, these devices will not receive monthly security and quality updates. These updates contain protections from the latest security threats. To continue receiving security and quality updates, we recommend that you update to the latest version of Windows.

You could say it kind of jumped out at me as I read the notice. It’s not exactly a surprise — this date’s been known for a long while — but it’s pretty final, and it’s now just over 6.5 weeks away (46 days, as I write this).

Why KB5018482 Announces Impending 21H2 End Counts

Lots of business Windows users run Windows 10 — the vast majority, in fact (e.g. Statcounter says 71.87% of all desktops). I suspect that more than half that population is still running one 21H2 build or another. For those users, this announcement is a wake-up call that it’s time to make some kind of change before time runs out in mid-December.

Business users have two options to stay on Windows 10 — namely:

  • upgrade to 22H2 (this can use any valid Windows upgrade technique, including WSUS, WU, deployment tools, and in-place upgrade)
  • switchover to  LTSC 2021 (works only via ISO and in-place upgrade)

Either way, planning, testing, scheduling and deployment will be necessary. And six weeks (plus 4 days right now) ain’t much time. The clock, as they say, is ticking…

Postscript: So Long, NetMarketShare!

In writing this item, I got a another surprise. And it, too, touches on end of life. For a long, long time NetMarketShare has been my go-to source for Windows OS market share data. Apparently, that’s over now too. Here’s partial text from the Windows OS landing page:

IMPORTANT NOTICE:
After 14 years of service and being used as a primary source in tens of thousands of articles and publications, we are retiring NetMarketShare in its current form. October, 2020 is the last month of data. All billing for existing accounts has been stopped. All outstanding balances are being refunded.

Why? An upcoming change in browsers (https://github.com/WICG/ua-client-hints) will break our device detection technology and will cause inaccuracies for a long period of time.

In addition, we have focused on bot detection and removal as a key part of the quality control process. It is the most complex part of our codebase. As time has gone on, it has become increasingly difficult to manage this process. So, instead of accepting increasing levels of inaccuracy, we thought it would be a good time to call it a day.

Too bad. I’ll be sorry to do without their information and the insights it provided. Auld ang syne, and all that…

Facebooklinkedin
Facebooklinkedin

USB4 Delivers Consistent NVMe Performance

OK, then. I finally laid hands on my second USB4 NVMe SSD enclosure yesterday. I deliberately sought out the cheapest one I could find so I could compare it to a more expensive alternative already on hand. When I say that USB4 delivers consistent NVMe performance here’s what that means:

1. The same SSD, cable, and host PC are used for comparison. Both drives have the “cache tweak” applied (this Oct 14 post has deets). Same tests performed, too (CrystalDiskMark and a Macrium Reflect backup).
2. The only thing that changes is the enclosure itself.

In short, I wanted to see if spending more on hardware returned a noticeable performance advantage (I’ll talk more about this below). Long story short: it doesn’t seem to make much, if any, difference. Let me explain…

Why Say: USB4 Delivers Consistent NVMe Performance?

The lead-in graphic shows the results from the cheap enclosure on the left, and the more expensive one on the right. The average difference in CrystalDiskMark performance shows 2 wins for el cheapo, 5 wins for the higher priced item, and 1 tie. On first blush, that gives the more expensive device an advantage. So the next question is: how much advantage?

This is where a little delta analysis can help. I calculate that the average performance difference between devices varies from a high of 6.2% to a low of 0.03% (not including the tie). That said, the average performance difference across all cells is merely 1.54%. (Calculated by taking absolute value for each delta, then dividing by the number of cells.) That’s not much difference, especially given the prices of the two devices: $128.82 and $140.71. That delta is 8.4% (~5.5 times the average performance delta).

I will also argue that comparing CystalDiskMark results is interesting, but not much of a real-world metric. Thus, I’ll compare completion times for a Macrium Reflect image backup on the same PC, same OS image. The expensive device took 2:25, the cheap one 2:44. That’s an 11.5% difference, greater than the price delta but not amazingly so.

Deciding What’s Worthwhile

I can actually see some differences between the two enclosures I bought. One thing to ponder is that NVMe drives tend to heat up when run full out for any length of time (as when handling large data sets, making backups, and so forth). I’ve seen temps (as reported in CrystalDiskInfo, reading SMART data) go as high as 60° C while M.2 SSDs are busy in these enclosures. At idle, they usually run at around 28° C. The more expensive NVMe enclosures tend to offer more surface area to radiate heat while active, so that’s worth factoring into the analysis.

But here’s the deal: I can buy a decent USB3.1 NVMe enclosure for around US$33 right now. The cheapest USB4 NVMe enclosure I could find cost almost US$96 more. That’s a multiplier of just under 4X in price for a device that delivers less than 2X in improved performance. Let me also observe that there are several such enclosures that cost US$160 and up also on the market. I still have trouble justifying the added expense for everyday use, including backup.

There will be some high-end users — especially those working with huge datasets — who might be able to justify the incremental cost because of their workloads and the incremental value of higher throughput. But for most business users, especially SOHO types like me, the ouch factor exceeds the wow value too much to make it worthwhile. ‘Nuff said.

Facebooklinkedin
Facebooklinkedin

KB5018496 Lands Poorly So Far

KB5018496 is out as of October 25. It takes production-level Windows 11 22H2 systems to Build 22621.755 when applied. To be fair, it’s a Preview CU, so not entirely cooked yet. But I observe that KB5018496 lands poorly so far because

(a) I don’t see any of its cool gradual rollout features on any of my PCs (e.g. right-click in Taskbar to launch Task Manager)
(b) When I attempted to explore the new Microsoft Accounts (MSA) capabilities, it crashed when I attempted to open the P16’s camera. I know that works because I use camera-based Hello to log onto that machine and had just done so minutes before. Sigh.
(c) I was unable to verify my identity in Settings → Accounts, because of the camera issue, so also unable to backup my MSA data. Sigh again.

Again: this is a preview release. And I’m qvetching about gradual rollout elements that either haven’t made it to my PCs, or that aren’t yet working as they should be. It’s a kind of “business as usual” thing, I guess.

What KB5018496 Lands Poorly So Far Really Means…

It’s pretty much par for the course that a few rough edges will show up in a preview release. Thus, for example, when I went to Accounts → Windows backup in an RDP session, the PC “knew” it couldn’t use the camera for validation. So I got an email to my MSA address instead. That worked just fine. The relevant screencap appears as the lead-in graphic for this story.

I assume there’s some kind of driver hiccup with the camera when logged in directly. It threw an error code that pointed squarely in that direction. That should be easy to run down and fix, so I’ll report it to Feedback Hub later today.

I’ve been using the right-click access to Task Manager in the taskbar on Insider versions of 22H2 for a while now. Thus, I also know it’s just a matter of time before it, too, shows up in production versions of 22H2.

Self-Inflicted Wounds? Perhaps…

So why do I install previews on production PCs? Because I’m an Insider and it’s my job to take such stuff on, and report what I see and find. I make daily image backups on those PCs, so the worst that can happen is a rollback to the previous image. I don’t generally do real work on those PCs unless I’m on the road. And in that situation, I probably wouldn’t mess with a preview because I wouldn’t want to lose the time (or the work done) since the last backup anyway.

And that’s how things go here in Windows World. Stay tuned for further developments. I’ll qvetch some more another day, for sure!

Facebooklinkedin
Facebooklinkedin

WU Reset Fixes Weird Windows 11 Upgrade Freeze

With Dev and Beta Channel releases, it’s always “just a matter of time” before something gets wonky. Yesterday, in fact, I ran into difficulties upgrading one of my X380 Yoga laptops to Build 25227. In November 2021, I wrote a blog post here entitled WU Reset Tool Works on Windows 11. Good thing, because WU reset fixes weird Windows 11 upgrade freeze, too. Let me explain…

I’m Glad WU Reset Fixes Weird Windows 11 Upgrade Freeze

Here’s what’s weird about this failure. The laptop hung during the post-GUI update phase, after the old OS hands over control to the installer’s WindowsPE-based runtime environment. Indeed, it got all the way to 98% complete before it hung interminably.

Yet, as you can see, the hex code speaks to a “download error.” I have to guess there was some essential bit of data that the installer needed to read right at the end of the post-GUI installation process. When that failed, the whole shooting match went south. Stuck forever!

The Charm Came on the 2nd Try

I probably got lucky. I ran the invaluable reset/reregister batch file cited in the WU Reset Tutorial at ElevenForum, Then I tried the 25227 upgrade again: it worked this time! That said, this one took 30-40 minutes to complete (a fair while longer than previous but recent Dev Channel upgrades). But it sailed through to completion and is now working properly on the X380 laptop.

On the plus side, the login issues I’d been having with RDP on the same laptop also disappeared with the upgrade. That’s a relief. But on the minus side, my other Dev Channel test machine acted a bit wonky during the upgrade, too. It shut down after the reboot from the GUI phase into the post-GUI phase of the install. I had to manually power back on to finish the job. That hasn’t happened for a while with Dev Channel releases, either.

But hey! The purpose of Insider participation is to help catch — and hopefully kill — bugs and weirdnesses before they get into general release. We’re all just doing our jobs by finding and reporting this kind of stuff.

And that’s how it goes sometimes, here in Windows World. Good thing I enjoy it, and relish my appetite for problem solving and troubleshooting.

Facebooklinkedin
Facebooklinkedin

Zoom Updates and Payment

Here’s an interesting set of observations. In the past weeks, I’ve noticed that the free version of Zoom no longer offers the “Check for Updates” option in its menus. I’ve also noticed that Zoom has been asking free users to “upgrade” to the for-a-fee pay version. That got me to thinking about Zoom updates and payment. So I conducted an experiment…

What About Zoom Updates and Payment?

I went ahead and signed up for an individual Zoom license. It’s assessed annually, and costs about US$185 per year. Right now, the first year is discounted, so my actual out-of-pocket was “only” US$95.88. But it renews automatically at full price one year from today. Ouch!

That said, as I suspected — and as you can see in the lead-in graphic above — if you do pay for Zoom, you also get the Check for Updates option back. That raises the interesting question: is automatic updating worth US$95 (this year) or US$185 yearly? I’m not convinced.

There IS Another (Free) Way

If you don’t mind running a few Winget commands, you can keep the free version and update as you need to. FYI, I use SUMo to tell me when it’s time to update, but because I don’t pay for a license to that software on all my PCs, I’ve figured out how to use Winget to handle that instead.

The basic concept is to uninstall the version that’s running. Then, if you install Zoom again it will grab the latest version. That results in an up-to-date version on your PC. Two simple one-liner commands are involved:

  1. Winget uninstall Zoom.Zoom
  2. Winget install Zoom.Zoom

That’s it. Works like a champ. Be sure to keep your sign-in account and password info handy, because you’ll need to sign into the newly installed version after going through this remove/replace operation.

But you can keep using the free version, and stay current, if you follow this simple two-step operation. That’s probably what I’ll revert to next year, when my renewal comes due. To be continued…

It’s Irksome, and Potentially Insecure

C’mon Zoom: this approach is potentially unsafe for lots of users who SHOULD be free (e.g. students, seniors, nonprofit workers, and so on). Sure, it may be an inducement for some people (me, for example) to purchase a commercial license so as to regain auto-update ability. But the vast majority of free users who have no choice but to stay put should not be exposed to potential security vulnerabilities in the name of (modest) incremental revenues.

My plea/request: return the automatic updates to the free version! Find a different way to increment your income, please, in the name of better overall application security.

Facebooklinkedin
Facebooklinkedin

First Windows 11 22H2 Moment Arrives

OK, then. We knew it was coming. And with yesterday’s release of  KB5019509 it’s here. That’s right: with this out-of-band  update, the first Windows 11 22H2 moment arrives. This time, it includes the tabbed version of File Explorer, which wasn’t quite ready for release when 22H2 made its debut on September 20.  This new, snazzed-up File Explorer version provides the lead-in graphic for this story, shot from my just-updated P16 laptop.

What First Windows 11 22H2 Moment Arrives Means

I guess it helps to understand that a moment is shorthand for what ComputerWorld (CW) describes as “small, quarterly feature updates” in a September 14 story. (This story in turn relies on a July Windows Central hearsay report about the terminology.) And indeed, support for tabs in File Explorer makes a perfect illustration of what such a “moment” could bring to users.

But there’s more to KB5019509 than File Explorer tabs. Here are  descriptions of two other new features, straight from that update announcement (blue text emphasis mine for ease of identification):

  • New!It adds a feature called Suggested Actions for items that you copy. This is available for customers in the United States, Canada, and Mexico. For example, when you copy phone numbers or future dates, we provide suggestions, such as make a call with Teams or Skype or add an event in the Calendar app.
  • New! It adds a taskbar overflow menu. The taskbar will offer an entry point to a menu that shows you all your overflowed apps in one space.

We’ll Have These Moments to Remember…

If the CW description is correct, this is just the first of a series of such moments that will pop up from time to time. I can’t tell if MS will itself use the “moment” terminology or not. In fact, KB5109509 calls the aforementioned introductions “quality improvements” instead. A search on the word “moment” turns it up nowhere in this text.

Other new quality improvements in the update include using nearby sharing to “discover and share more devices, including desktops,” a switchover to Windows Settings from Control Panel to “uninstall, repair and modify all apps,” and improved “performance of federated authentication.” All told, KB5109509 appears to offer some interesting stuff.

But if a quality improvement isn’t explicitly called out as a “moment,” why bother with this terminology? Good question! I wish I had an equally good answer. We’ll have to see how this all unrolls. In the meantime, I’m just going to savor this particular moment…

 

Facebooklinkedin
Facebooklinkedin

Get-Hotfix Shows What WU Sometimes Cannot

When MS lifted the safeguard hold on  my Lenovo P16 Mobile Workstation, I upgraded it to Windows 11 22H2. Naturally, my first thought thereafter was to check on status of recent updates and fixes. That’s when I figured out that KB5018427 was included in the 22H2 version installed. Seems that Get-Hotfix shows what WU sometimes cannot — at least as far as Update History goes.

It’s all apparent in the lead-in graphic for this story. In case it’s not legible enough, right-click on that image and select “Open image in new tab” (Chrome, Firefox, Edge, etc.). That should show it at original resolution. If necessary, you can use the browser’s Zoom controls to magnify the text.

How Get-Hotfix Shows What WU Sometimes Cannot

Update history shows only user-alllied updates. It does not show updates that — like KB5018427–get rolled up into the windows image file (WIM) used to install a version upgrade. That’s what makes the PowerShell Get-Hotfix command so useful. Its image analysis tool tells it what’s there, whether the user applied it directly, or whether it’s already “in there” as is the case here.

An important clue appears in the “Installed on” date shown in the output of Get-Hotfix. Although the KB item itself is dated 10/11/2022, it didn’t get rolled into the WIM until 10/14/2022.

What Led Me Down This Trail?

I read the Windows Latest story about KB5018427. Naturally, I wanted to check on its status in the upgraded 22H2 version. When I didn’t see it in Update History, I visited the Microsoft Catalog and downloaded the 64-bit MSU file. Upon attempting its installation, it searched the updates already installed on the PC. That produced the following status message:

That made me understand the KB had been included in the WIM file I’d already installed. A search on “use PowerShell to show updates installed” led me to the Get-Hotfix command.

As the afore-cited PowerShell docs states:

The Get-Hotfix cmdlet gets hotfixes, or updates, that are installed on the local computer or specified remote computers. The updates can be installed by Windows Update, Microsoft Update, Windows Server Update Services, or manually installed.

Thus Get-Hotfix can catch patches and fixes no matter how they get included in the image it checks and reports upon. The rest, as they say (drum roll, please)… is history!

 

Facebooklinkedin
Facebooklinkedin