Has Microsoft Released a Windows 8 Monster?

To some developers, Windows 8 looks like the Frankenstein monster of operating systems, with part of the monster being made of Win32/Desktop, and the other half made of WinRT/Metro. If the two parts are able to work together, with the whole being superior to the individual parts, that will be great, but what if instead, each part works against the other?

Windows 8 is designed to be different than previous versions of Windows in a similar fashion to how Windows 95 was different than Windows for Workgroups--it's an effort by Microsoft to reinvent the Windows operating system. Although Microsoft is touting Windows 8 as a "one size fits all" OS, in reality the two parts that it is made of are not just different "editions" but rather, they are very different animals.

To some developers, Windows 8 looks like the Frankenstein monster of operating systems, with part of the monster being made of Win32/Desktop, and the other half made of WinRT/Metro. If the two parts are able to work together, with the whole being superior to the individual parts, that will be great, but what if instead, each part works against the other?

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Digital transformation is a growing, urgent imperative for organizations worldwide. Subsequently, network resources to support digital initiatives are coming under intense scrutiny. Increasingly, that focus concentrates on the wide area network (WAN), which provides essential connectivity and valuable network services for branch offices, remote sites, and mobile workers. This white paper from IDC examines how digital transformation and cloud computing have necessitated a significant reassessment of the WAN, …

  • Old Habits Die Hard: The report, which is in its fifth year, polled 1,100 senior IT security executives at large enterprises around the world and indicates an ongoing disconnect between the security solutions organizations spend money on and the ability of those solutions to protect sensitive data. While 30 percent of respondents classify their organizations as 'very vulnerable' or 'extremely vulnerable' to data attacks (and the number of breaches continues to rise) the two top spending priorities are network …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date