Microsoft Developers Want Answers About Windows 8 and Interoperability

Microsoft has been giving bits and pieces of details about Windows 8, its upcoming operating system, over the last month. Developers are eager to learn more, and have specific questions about Windows 8 that they want answered now.

From what has been shown by Microsoft, Windows 8 will be focused on tablets, and will appropriate the look and feel of Windows Phone 7. If it's geared towards computers with touch screens, how will it appeal to those without touch screens? How will the OS itself work? These questions are not likely to be answered any time soon--the most likely time for more details is at the Consumer Electronics Show next year, where Microsoft will be presenting a major keynote speech.

Microsoft has been giving bits and pieces of details about Windows 8, its upcoming operating system, over the last month. Developers are eager to learn more, and have specific questions about Windows 8 that they want answered now.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Mobile application management (MAM) refers to the workflow for security, governance, and distribution of mobile apps in the enterprise. Best-of-breed MAM provides app-level security for any app, deploys apps to every user in the extended enterprise because it is device management agnostic, manages the complete app lifecycle, and enables multiple app distribution methods, including an intuitive, custom-brandable enterprise app store. But, not all mobile application management (MAM) is created equal. Use this …

  • On-Demand Webinar Your developers are shifting to a DevOps delivery model to increase the speed of delivering new code and features to your customers. But as a security and IT practitioner, you want security-first, enterprise-wide solutions that support your development teams without compromising on security. During this session, we discuss why it is important to: Secure and manage secrets used by machines (e.g. micro-services, applications, scripts, CI/CD tools, hosts, etc.) and privileged users …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date