Microsoft Affirms the Development of a Smaller Windows 8 Touch Device

Microsoft’s departing CFO, Peter Klein, today announced during a weekly earnings call that Microsoft is in fact working with their manufacturing partners to develop a smaller version of the original Windows 8 devices. This likely means that we will soon see a 7- or 8-inch Windows 8 tablet hit stores in the coming months. Read the full story here.



Comments

  • Summary study unwraps the incontestable info regarding chanel and also how it can certainly may affect users.

    Posted by emeseesip on 05/08/2013 12:31am

    The Most Thorough nike Guide You Ever Witnessed Otherwise Your Money Back [url=http://www.guccija.biz/]gucci 財布[/url] I can't believe this, remarkable product. Your company have to go look at adidas immediately while it is still in stock : ) [url=http://www.guccija.biz/]グッチ 長財布[/url] gucci will help every one of us by simply including quite a few unique capabilities and characteristics. It is a unvaluable thing for every fan of nike. [url=http://www.guccija.biz/]グッチ ショルダーバッグ[/url] Independent guide reveals A couple of completely new stuff about gucci that absolutely no one is discussing. [url=http://www.chanelja.biz/]シャネル マトラッセ[/url] Explanation why no one is speaking of nike and the things you should complete as we speak. [url=http://www.chanelja.biz/]シャネル チェーンウォレット[/url] All new questions about nike replied to in addition to the reasons why you should really review each and every phrase of this e book. [url=http://www.chanelja.biz/]財布 chanel[/url] Techniques behind gucci which you may make money from starting off today.[url=http://www.nikeja.biz/]ナイキスニーカー[/url] Strategies about how to comprehend all kinds of things there is to learn related to nike in seven basic steps.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • This white paper explains how virtualization technology promises to change siloed data center operations into an automated and orchestrated pool of computing, storage and network resources.

  • Threats are constantly changing, so security controls must adapt accordingly. These security controls include being aware of the latest malicious IPs, the types of websites that are most often impersonated in phishing attacks, and the categories of apps that are most likely to be malicious. Read this report to learn why real-time, contextual, and predictive threat intelligence that spans the spectrum of attack vectors is a critical component to implementing a defense-in-depth strategy to take on today's …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date