Windows 8

  1. Hyper-V Replica starts network listeners on the ports assigned for replication. On some of the servers, the listeners are ...
  2. Hyper-V Server can only be installed on a partition with NTFS formatting. You can reformat or use convert.exe to change this ...
  3. Hyper-V Server won't install unless each of these things is taken care of. Close Setup, take care of each one, and then restart ...
  4. Hyper-V Setup: Post-install configuration task could not complete because one or more Hyper-V components are not available. ...
  5. Hyper-V suspended replication for virtual machine '%1' due to a non-recoverable failure. (Virtual Machine ID %2). Resume ...
  6. Hyper-V Time Synchronization connected to virtual machine '%1' is using the most recent version (Virtual machine ID %2). ...
  7. Hyper-V Time Synchronization connected to virtual machine '%1', but the version does not match the version expected by Hyper-V ...
  8. Hyper-V Time Synchronization failed to connect to virtual machine '%1' because the version does not match the version expected ...
  9. Hyper-V uses default locations to store virtual hard disk files and virtual machine configuration files, unless you specify ...
  10. Hyper-V Volume Shadow Copy Requestor connected to virtual machine '%1' is using the most recent version (Virtual machine ...
  11. Hyper-V Volume Shadow Copy Requestor connected to virtual machine '%1', but the version does not match the version expected ...
  12. Hyper-V Volume Shadow Copy Requestor failed to connect to virtual machine '%1' because the version does not match the version ...
  13. Hyper-V VSS writer cannot identify the virtual machine with ID '%1'. Please check if there are any corrupt or invalid configuration ...
  14. Hyper-V was unable to perform this operation because the RemoteFX 3D video adapter already exists on this virtual machine. ...
  15. Hyper-V will reserve disk space equal to the amount of memory used by the virtual machine when it is running so that memory ...
  16. I agree that I will manually remove the licenses from the source license server. I understand that if I continue to use the ...
  17. I agree to discontinue using the source license server as a license server with the same licenses that I am migrating. I ...
  18. I am now using speech recognition to dictate to the computer. Talking to the computer is easier than using the keyboard. ...
  19. I am now using speech recognition to dictate to the computer. Talking to the computer is easier than using the keyboard. ...
  20. I am now using speech recognition to dictate to the computer. Talking to the computer is easier than using the keyboard. ...
  21. I am now using speech recognition to dictate to the computer. Talking to the computer is easier than using the keyboard. ...
  22. I am now using speech recognition to dictate to the computer. Talking to the computer is easier than using the keyboard. ...
  23. I am now using speech recognition to dictate to the computer. Talking to the computer is easier than using the keyboard. ...
  24. I am now using speech recognition to dictate to the computer. Talking to the computer is easier than using the keyboard. ...
  25. I am now using speech recognition to dictate to the computer. Talking to the computer is easier than using the keyboard.| ...
  26. I am now using speech recognition to dictate to the computer. Talking to the computer is easier than using the keyboard| ...
  27. I have an antivirus program that I'll monitor myself Choose this option if your antivirus program cannot report status to ...
  28. I need help with my computer. Would you please use Windows Remote Assistance to connect to my computer so you can help me? ...
  29. I should not marble when I use speech recognition. If the computer makes mistakes often, I should be careful to speak more ...
  30. I should not marble when I use speech recognition. If the computer makes mistakes often, I should be careful to speak more ...
  31. I should not mumble when I use speech recognition. If the computer makes mistakes often, I should be careful to speak more ...
  32. I should not mumble when I use speech recognition. If the computer makes mistakes often, I should be careful to speak more ...
  33. I should not mumble when I use speech recognition. If the computer makes mistakes often, I should be careful to speak more ...
  34. I understand that music copied from CDs is protected by law, including US and International copyright laws, and that I am ...
  35. I understand that music ripped from CDs is protected by law, including US and International copyright laws, and that I am ...
  36. I want to restore my Internet security settings myself This option will highlight which Internet settings are not at their ...
  37. I'll turn on %1 myself The publisher has not provided Windows a way to turn on and update the app. Choosing this option will ...
  38. I'll turn on and update %1 myself The publisher has not provided Windows a way to turn on and update the app. Choosing this ...
  39. I/O was attempted on a section object that has been floated as a result of a transaction ending. There is no valid data. ...
  40. I64i! bytes could not be recovered because of bad clusters on the backup image. You can retry the recovery operation using ...
  41. I64i! bytes could not be written to the recovered volume because of bad clusters on the volume (%2). Run CHKDSK /R on the ...
  42. Iashlpr initialization failed: %1, so DHCP server cannot talk to NPS server. It could be that IAS service is not started. ...
  43. ICACLS name /save aclfile /T /C /L /Q stores the DACLs for the files and folders that match the name into aclfile for later ...
  44. ICACLS name /save aclfile /T /C stores the DACLs for the files and folders that match the name into aclfile for later use ...
  45. ICC profile information: size = %1 bytes, version = %2, class = '%3', data color space = '%4', profile connection space = ...
  46. Id = %1!lu! Name = %2!s! Description = %3!s! Version = %4!s! Vendor name = %5!s! Registration date = %6!s! Initialized = ...
  47. Id = %1; ClientMachine = %2; User = %3; ClientProcessId = %4; Component = %5; Operation = %6; ResultCode = %7; PossibleCause ...
  48. ID Process is the unique identifier of this process. ID Process numbers are reused, so they only identify a process for the ...
  49. ID Thread is the unique identifier of this thread. ID Thread numbers are reused, so they only identify a thread for the lifetime ...
  50. Identifiers issued by a government for purposes of identifying an individual over time, such as a driver's license number, ...
  51. IDENTIFIERS Many of the Bcdedit commands require identifiers. An identifier uniquely identifies entries contained in the ...
  52. Identifies issues with drivers and devices, including logo requirements, and identifies delays that occur during the first ...
  53. Identifies issues with software, drivers, and devices during system idle that reduce your system's energy efficiency. Recommended ...
  54. Identifies performance issues with minifilter drivers while performing common file functions, such as copy, move, delete, ...
  55. Identifies the networks to which the computer has connected, collects and stores properties for these networks, and notifies ...
  56. Identity federation support for AD RMS cannot be configured until the files that support its use are added. To add identity ...
  57. Identity federation support for AD RMS is already configured on this computer. Please remove it by using the Uninstall-ADRMS ...
  58. Identity Federation Support leverages federated trust relationships between your organization and other organizations to ...
  59. Identity Federation Support leverages federated trust relationships between your organization and other organizations to ...
  60. Identity Management for UNIX cannot find the computer. Verify that the computer exists on the network and is functioning ...
  61. Identity Management for UNIX cannot find the directory {0}. Verify that the path and directory names are correct, and then ...
  62. Identity Management for UNIX cannot use the specified encryption key. For more information about encryption keys, see "Encryption ...
  63. Identity Management for UNIX cannot use the specified port number. The port number must be an integer from 1 through 65535. ...
  64. Idle Break Events/sec is the average rate, in incidents per second, at which the processor wakes from idle. This counter ...
  65. Idle power management features on Hyper-V logical processor %2 are disabled due to a firmware problem. Check with the computer ...
  66. Idle power management features on processor %1 are disabled due to a firmware problem. Check with the computer manufacturer ...
  67. Idle power management features on processor %2 in group %1 are disabled due to a firmware problem. Check with the computer ...
  68. Idle time is a good indicator of disk activity. Disk subsystems sustain various I/O rates and the Idle counter normalized ...
  69. Idx - Interface (NIC) index used by the system Supp - Interface (NIC) supports TCP chimney offload Atmpt - System has attempted ...
  70. Idx - Interface (NIC) index used by the system Supp - Interface (NIC) supports TCP RSC Atmpt - System has attempted TCP RSC ...
  71. If %s is found on the end-user's computer, it will be configured with the settings underlined in green in this property sheet. ...
  72. If 'Relay DHCP packets' is not enabled on at least one interface assigned to the IPv4 DHCP Relay Agent routing protocol, ...
  73. If 'Relay DHCP packets' is not enabled on at least one interface assigned to the IPv6 DHCPv6 Relay Agent routing protocol, ...
  74. If 'Remote access server' is not selected, then the server cannot support virtual private network (VPN) or dial-up connections. ...
  75. If /D was NOT specified on the command line, then when CMD.EXE starts, it looks for the following REG_SZ/REG_EXPAND_SZ registry ...