Microsoft Announces Windows Phone 8 Support To End By July 2014

Via the Microsoft Support pages, they have announced that they will no longer be supporting Windows Phone 8 on July 8, 2014, followed shortly thereafter by the end of support for Windows 7.8 which will no longer receive support on September 9, 2014. According to Microsoft, Windows 8 platforms started receiving support earlier (December 14) while Windows 7.8 started getting support later on February 9. The tech giant likes to keep support for their products at least 18 months. Read the full story here.



Comments

  • Its always necessary keep your teeth clean

    Posted by tamrinnalon on 04/28/2013 02:18am

    A tooth (plural teeth) is a undersized, calcified, whitish order found in the jaws (or mouths) of innumerable vertebrates and worn to ease up down food. Some animals, particularly carnivores, also take teeth in behalf of hunting or instead of defensive purposes. The roots of teeth are covered nearby gums. Teeth are not made of bone, but fairly of multiple tissues of varying density and hardness. The general systematize of teeth is alike resemble across the vertebrates, although there is of distinction modulation in their show up and position. The teeth of mammals have deep roots, and this design is also rest in some fish, and in crocodilians. In most teleost fish, regardless how, the teeth are attached to the outer outwardly of the bone, while in lizards they are fastened to the inner surface of the jaw during harmonious side. In cartilaginous fish, such as sharks, the teeth are attached beside tough ligaments to the hoops of cartilage that type the jaw.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks? Thankfully, Kaspersky Lab security experts have got you covered. Download our guide to The Threat Landscape to have access to a wealth of IT security intelligence, including: A concise overview of malware and tactics Common vulnerabilities and exploits Practical advice to help protect your business

  • Threats are constantly changing, so security controls must adapt accordingly. These security controls include being aware of the latest malicious IPs, the types of websites that are most often impersonated in phishing attacks, and the categories of apps that are most likely to be malicious. Read this report to learn why real-time, contextual, and predictive threat intelligence that spans the spectrum of attack vectors is a critical component to implementing a defense-in-depth strategy to take on today's …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date