dcsimg

So Far Developers Are Satisfied With Microsoft Windows 8

WEBINAR:
On-Demand

Building the Right Environment to Support AI, Machine Learning and Deep Learning


Developers have eagerly taken in the recent announcements from Microsoft regarding its upcoming Windows 8 operating system. Thus far, we know that Windows 8 will include a Metro-based tablet interface, and a traditional desktop interface for laptop and desktop computers.

The features that have been revealed about Windows 8 in regards to the tablet arena, and the upcoming touch interface functionality will have long reaching implications. Like the upcoming Ice Cream Sandwich Android operating system, it will be a "one size fits all" operating system, facilitating tablets, desktops and slates.

Developers have eagerly taken in the recent announcements from Microsoft regarding its upcoming Windows 8 operating system. Thus far, we know that Windows 8 will include a Metro-based tablet interface, and a traditional desktop interface for laptop and desktop computers.

View Article



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • The Internet of Things (IoT), a growing network of physical devices with Internet connectivity, can collect and exchange rich data. Organizations utilizing the Enterprise of Things (EoT) are also at a greater risk for data breaches and cybersecurity threats. Healthcare organizations striving to realize the full potential of the EoT must also be able to confidentially and reliably transmit highly sensitive data between connected devices. Read this white paper to discover the best cybersecurity strategies to get …

  • On-Demand Webinar With technology advances and threats seemingly coming from every direction, security environments have become more complex. Sensitive data is no longer locked within the corporate walls as the boundaries have expanded from the network to endpoints to the cloud. As new issues arise, new products and capabilities are created. The challenge is that the security bolt-on approach has led to many point security tools managed in silos, creating many blind spots. Visibility is a key challenge for …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date