Solved

Icons on taskbar

Posted on 2001-09-06
6
168 Views
Last Modified: 2010-04-13
I was wondering if icons like speaker or network connection use up some resources or memory?  Should I hide them?
0
Comment
Question by:cooljam23
  • 3
  • 2
6 Comments
 
LVL 10

Expert Comment

by:Longbow
ID: 6461115
Maybe the network icon
But it takes not so much memory.
Right click the icon and change the settings so it disappears.
Or go To Start / Settings / Control Panel and open the icon coming with your network card
0
 
LVL 41

Accepted Solution

by:
stevenlewis earned 50 total points
ID: 6461116
the icons, no
the apps they represent, yes, but minimal. I wouldn't worry about them. Now other programs in the systray can use more resources ( depending on what the app). to check, check your resources, and then end task on the app, and check the resources again
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 6462411
Anything you see on the screen uses some memory and in the case of the icons in the tray they use very little that it is really unlikely to have any affect on the system what so ever. Even if you hide the icons the icons and the applications they represent are still resident in memory. If you want to hide them so there is more room on task bar then this can be accomplished through a third party utility like this free one at ZDNET

http://www.pcmag.com/article/0,2997,s%253D400%2526a%253D4606,00.asp

QUOTE

Description:
TrayManager lets you control the explosion of icons in your system tray by creating a submenu for the icons you use less frequently. The original TrayManager worked only under Windows 95 and Windows 98. Version 2.0 adds support for Windows ME, Windows NT 4, and Windows 2000. A new feature restores the icons in your system tray after an Explorer crash. A simple configuration window lets you choose which icons to place on the TrayManager submenu. Double-click on TrayManager's tray icon to bring up the configuration dialog. Place the icons you use less often into a submenu to make it quicker and easier to find the ones you frequently need. To access the icons in the submenu, right-click on TrayManager's tray icon, and then select the item you want from the list. Right- and left-clicks on a submenu item work just as if the item were still in the system tray. TrayManager was written by Steven E. Sipe, and first appeared in PC Magazine November 21, 2000 (v19n20). Source code is included.

UNQUOTE


The Crazy One
0
Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

 
LVL 44

Expert Comment

by:CrazyOne
ID: 6462415
I meant to preface my comment with "I agree with Steve" but I forgot to, sorry about that Steve. :>)
0
 
LVL 41

Expert Comment

by:stevenlewis
ID: 6462541
LOL Crazy
0
 
LVL 41

Expert Comment

by:stevenlewis
ID: 6464188
cooljam23
glad to help
Steve
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

827 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question