dcsimg

Much Ado About Windows 8, Metro and Desktop Apps

WEBINAR:
On-Demand

Building the Right Environment to Support AI, Machine Learning and Deep Learning


The Build 2011 conference last week was filled with news releases and information, but once the dust settled, more details emerged about the upcoming Windows 8 OS. Although the OS is still in its development stages, it's apparent that Windows 8 is made up of two distinct parts: Metro and Desktop.

Windows 8 Metro acts like it's an extension of the Windows Start button. Once the start button is clicked, the user is taken to Metro, where they find tiles that allow them to access applications. While Metro apps keep the user within Metro and use the WinRT runtime, desktop applications take the user back to the desktop, where the old school Win32 is still used as the runtime.

The Build 2011 conference last week was filled with news releases and information, but once the dust settled, more details emerged about the upcoming Windows 8 OS. Although the OS is still in its development stages, it's apparent that Windows 8 is made up of two distinct parts: Metro and Desktop.

View Article



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Multicloud Storage for Dummies consists of five short chapters that explore the following:   - How the multicloud storage model aligns with modern business and IT initiatives  - Common barriers to cloud adoption and how a multicloud storage model addresses them - How to build a multicloud data center - What to look for in multicloud storage services - Real-world multicloud use cases

  • On-Demand Webinar With technology advances and threats seemingly coming from every direction, security environments have become more complex. Sensitive data is no longer locked within the corporate walls as the boundaries have expanded from the network to endpoints to the cloud. As new issues arise, new products and capabilities are created. The challenge is that the security bolt-on approach has led to many point security tools managed in silos, creating many blind spots. Visibility is a key challenge for …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date