Is Microsoft Simply, Too Late to the Mobile Party?

Critics of Microsoft are saying that Microsoft will never make a dent in the mobile market, that Microsoft will crush under its own weight and Microsoft’s new strategy is doomed for failure! And on the other hand, proponents of the software behemoth are saying things like “remarkable”, “an incredible breakthrough”, and even, “brilliant”! While the pundits are stating the facts now that Microsoft has unveiled their master plan. And the facts are, over the past few months Microsoft has gradually, but steadily releasing the details of what Windows 8 will truly entail. First they told us about the new user interface with cross personal computers and tablets, then their plan to build their own tablet, the Surface, and of course, the latest acquisition of Yammer. The past years for Microsoft all comes down to “8”, that’s right, Windows 8. Trace your finger around, its infinite, and no matter where you start, you always come back around to where you started and this is the paradigm that is Microsoft. They have indeed come, full-circle, or, figure 8 as it would be in this case. Read the full story here.



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • DDoS attacks are constantly changing. While the objective of the attack is still to cause a service outage, attacks and attackers are becoming more sophisticated. While high-profile organizations – banks, governments, and service providers – continue to be targets, a rising number of everyday businesses also report DDoS attacks. The escalating incidence and severity of these attacks has made DDoS protection a hot commodity. The problem CIOs face now is how to choose a solution. Read this white …

  • Security breaches targeting government have become increasingly regular, and traditional defenses can no longer effectively protect against attacks. Micro-segmentation is a breakthrough approach to granular, dynamic data center security. Download this informative solution overview now.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date