Logo
CAR REVIEW
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows Vista

Accessing and Using Your Network : Collaborating with Windows Meeting Space (part 1)

8/4/2013 6:51:49 PM
In previous versions of Windows, if you needed to remotely collaborate with other users by sharing a program or working together on a document, the tool of choice was Microsoft NetMeeting. Vista’s replacement for NetMeeting is an entirely new program: Windows Meeting Space. As in NetMeeting, you can use Windows Meeting Space to show a local program or document to any number of remote users and you can collaborate on a document with remote users. Windows Meeting Space uses several new Vista technologies, including Peer-to-Peer Networking, Distributed File System Replicator (DFSR), and People Near Me. The next few sections show you how Windows Meeting Space works.

1. Signing In to People Near Me

To use Windows Meeting Space, you must first sign in to People Near Me. You do this either by starting Windows Meeting Space or directly via the Control Panel: select Start, Control Panel, Network and Internet, People Near Me.

In the People Near Me dialog box that appears, display the Sign In tab and activate the Sign In to People Near Me option. Before you click OK, you might want to look at the Settings tab, which enables you to change the name and picture that other people see, and to control various other People Near Me options, as shown in Figure 1.

Figure 1. Use the Settings tab to configure People Near Me.


When you first sign in, Vista displays the People Near Me privacy policy, which states that the People Near Me feature discloses only your name, your computer name, and your computer’s IP address. Click OK to continue.

2. Starting Windows Meeting Space

When you’re signed in to People Near Me, you can launch Windows Meeting Space by selecting Start, All Programs, Windows Meeting Space. The first time you do this, the Windows Meeting Space Setup dialog box appears. For Windows Meeting Space to work, the data must be allowed to pass through the Windows Firewall—to do that, there must be Windows Firewall exceptions for the Meeting Space Infrastructure and the DFSR. If you click Yes, Continue Setting Up Windows Meeting Space (and enter your UAC credentials), Vista creates the exceptions for you automatically.

The Windows Meeting Space window appears, as shown in Figure 2. From there, you either start a new collaboration meeting or join an existing meeting, as described in the next couple of sections.

Figure 2. Use the Windows Meeting Space window to start and join collaboration meetings.

3. Joining a Meeting

If you know that another person has a meeting running, but you didn’t receive an invitation, here are the steps to follow to join that meeting:

1.
In the Windows Meeting Space window, click Join a Meeting Near Me. Windows Meeting Space displays a list of running meetings (see Figure 2).

2.
Click the meeting you want to join. Windows Meeting Space prompts you to enter the meeting password.

3.
Type the password and press Enter. Windows Meeting Space verifies your password and then joins the meeting.

4. Starting a Meeting

If you want to start your own collaboration meeting, follow these steps:

1.
Click Start a New Meeting.

2.
Enter the meeting name.

3.
Enter the meeting password.

4.
Press Enter. Meeting Space starts the new meeting, as shown in Figure 3.

Figure 3. A new meeting, ready to begin.
Other -----------------
- Accessing and Using Your Network : Working with Offline Files and the Sync Center (part 2) - Synchronizing Offline Files, Handling Synchronization Conflicts
- Accessing and Using Your Network : Working with Offline Files and the Sync Center (part 1) - Working with Network Files Offline
- Accessing and Using Your Network : Sharing Resources with the Network (part 3) - Hiding Shared Resources
- Accessing and Using Your Network : Sharing Resources with the Network (part 2) - Sharing a Resource
- Accessing and Using Your Network : Sharing Resources with the Network (part 1) - Setting Up File and Printer Sharing, Deactivating the Sharing Wizard
- Accessing and Using Your Network : Accessing Network Resources
- Accessing and Using Your Network : Learning Some Common Network Tasks
- Collecting Vista Events
- Automating Vista Events
- Exploring the Vista Task Scheduler
- Tracking Change in Vista : Turning on the audit policy, Exploring the Vista Event Log
- Managing Change through Group Policy (part 4) - Assigning PC-Related GPOs, Troubleshooting and monitoring Group Policy
- Managing Change through Group Policy (part 3) - Working with GPO tools
- Managing Change through Group Policy (part 2) - Working with central policies
- Managing Change through Group Policy (part 1) - Working with Local Policies
- Securing the Workstation : Applying the Castle Defense System (part 7) - Working with external access - Working with Public Key Infrastructures, Working with Virtual Private Network connections
- Securing the Workstation : Applying the Castle Defense System (part 6) - Working with external access - Working with the Windows Firewall with Advanced Security
- Securing the Workstation : Applying the Castle Defense System (part 5) - Managing information access
- Securing the Workstation : Applying the Castle Defense System (part 4) - Hardening the system - USB Device Control, Windows Defender
- Securing the Workstation : Applying the Castle Defense System (part 3) - Hardening the system - User Account Control
 
 
Most view of day
- Windows Server 2012 : Enhancements for Flexible Identity and Security (part 1) - Dynamic Access Control
- SharePoint 2010 : Configuring Search Settings and the User Interface - Web Parts (part 2)
- Microsoft OneNote 2010 : Doing Research with Linked Notes (part 1) - Beginning a Linked Notes Session
- SQL Server 2008 R2 : Managing Workloads with the Resource Governor - Monitoring Resource Usage
- Planning Deployment : Installing BDD 2007
- Microsoft Exchange Server 2007 : Consolidating a Windows 2000 Domain to a Windows Server 2003 Domain Using ADMT (part 2) - Installing a Password Migration DLL on the Source Domain
- Configuring Startup and Troubleshooting Startup Issues : The Process of Troubleshooting Startup (part 2) - Startup Troubleshooting After the Starting Windows Logo Appears
- Working with the User State Migration Tool (part 5) - Getting Extra Mileage Out of the USMT
- Microsoft Content Management Server Development : Validating Placeholder Controls - Validating the SingleAttachmentPlaceholderControl
- Managing Change through Group Policy (part 3) - Working with GPO tools
Top 10
- Windows Phone 8 : Scheduled Tasks - Scheduled Task API Limitations
- Windows Phone 8 : Scheduled Tasks - Updating Tiles Using a Scheduled Task Agent
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 5) - Editing an Existing To-Do Item
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 4) - Creating the To-Do Item Shell Tile, Saving a To-Do Item
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 3) - Debugging Scheduled Tasks
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 2) - TodoService, TodoItemViewModel
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 1) - TodoItem,TodoDataContext
- Windows Phone 8 : Scheduled Tasks - Using Scheduled Tasks
- Windows Phone 8 : Scheduled Tasks - Background Agent Types
- Windows Phone 8 : Windows Phone Toolkit Animated Page Transitions - Reusing the Transition Attached Properties
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro