You've requested...

Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop

If a new window did not open, click here to view this asset.

Download this next:

Updates: The next evolution of operating systems

If there is one constant in the world of operating systems, it is the need to update. Automatic patching and updates are now the way security updates and enhancements are rolled out.  On iOS and Android devices, this is what users have been used to: they get an update every few days or weeks.

But it is now on Windows 10. In November 2017, Microsoft released the Fall Creators Edition of its Windows desktop operating system, adding features for 3D modelling, control via eye movement and better integration with OneDrive.  There is probably less here for corporate IT, but what Microsoft has done is enhance security, which improves baseline support for home and BYOD (bring your own device) devices connecting to corporate IT assets.

Perhaps the biggest shakeup in operating systems so far has been the recent Spectre and Meltdown microprocessor flaws. Every operating system is being patched and this is likely to continue over time, to improve the security as an interim step until new secure processors are released.

These are also closely related to: "Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop"

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    In this week’s Computer Weekly, we look at the latest developments in wireless technology and discover how enterprises can deliver secure and reliable wireless networks for staff and customers. We examine Microsoft’s PowerShell scripting language to understand why it’s become such an important tool for automating system administration. And we ask CIOs what it’s like to cross the divide and work for IT suppliers. Read the issue now.

    Also inside:

    • Chatbots have the potential to reduce the workload for contact centres. A recent Capita workshop explored the impact of artificial intelligence and other emerging technologies.
    • How IT apprentices are helping businesses transform back-office processes through software robots.
    • From cloud to machine learning, Shazam CTO Richard Sharp tells Computer Weekly how the music discovery service continues to innovate.

  • Computer Weekly – 19 March 2019: How IT leaders should work with marketing

    In this week’s Computer Weekly, we hear expert advice on how IT and marketing chiefs can work together to deliver a high-quality customer experience. We examine how supercomputers are transforming science by processing large-scale data analytics. And we look at one of the key ethical aspects of artificial intelligence (AI) – how to explain the decisions an AI makes. Read the issue now.

Find more content like what you just read:

  • Computer Weekly – 21 May 2019: Managing software updates in Windows 10

    In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.

    Download

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

    Download

  • CW Nordics November 2017

    The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.

    Download

  • CW Buyer's Guide to Apple in the Enterprise

    This nine-page buyer's guide assesses the growth of Apple's computers and iPads in business and the enterprise.

    Download

  • Windows 10: How the client operating system is evolving

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

    Download

  • Windows 10: How the client operating system is evolving

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

    Download

  • Securing Remote Access

    As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.

    Download

  • Defining the foundation for an adaptable cloud strategy

    Open this e-book to learn how your operating system can be the foundation that solidifies and unifies your IT infrastructure and whatever environments it encompasses.

    Download

  • Defining the foundation for an adaptable cloud strategy

    Open this e-book to learn how your operating system can be the foundation that solidifies and unifies your IT infrastructure and whatever environments it encompasses.

    Download

  • Practical guide to improving edge site availability

    As the consequences of IT downtimes grow more dire by the day, enterprises are quickly looking for ways to improve the availability of their existing edge locations.Discover specific ways to improve the availability of edge computing deployments inside.

    Download

  • Answers to common edge computing infrastructure challenges

    Jump inside this white paper to learn about a new, emerging edge computing data center assembly model that properly factors in the unique challenges posed by networking and installation at the edge.

    Download

  • 6 ways to use Red Hat Ansible to promote enterprise-wide automation

    Check out this data sheet for 6 ways you can use the Red Hat Ansible Automation Platform to promote enterprise-wide automation adoption.

    Download

  • Modernizing edge computing: Oil & gas industry

    Edge computing pushes processing to the edge of the network—close to the location where data is created and collected. Necessitating new approaches to network and data security – especially in the oil and gas industry. Read this white paper to learn about modernizing edge computing with Red Hat and Intel.

    Download

  • 9 reasons to explore Red Hat Enterprise Linux 9

    Learn 9 reasons Red Hat Enterprise Linux 9 can simplify your hybrid cloud experience in this e-book.

    Download

  • Vendor comparison and rankings: Corporate Web Security

    Radicati Market Quadrants are designed to identify top vendors within specific technology markets. Get this report to learn why Cisco Umbrella is ranked as a Top Player by Radicati.

    Download

  • Unlock the key to computing at the edge

    Your business needs to collect, store and analyze data to keep your competitive edge. Discover how to harness the growing data boom with an intelligent edge infrastructure designed to help generate real-time insights on customers, inventory, security, and much more.

    Download

  • Your complete ECM solution checklist

    Before you go to market for an Enterprise Content Management (ECM), you should understand what you think you need and everything a strong ECM could do for you. Luckily, this checklist is your complete guide to finding the right ECM for your business. Read on to get started.

    Download

  • Examining the top 15 enterprise video providers

    Access this white paper to see Aragon Research’s 6th annual Aragon Research Globe for Enterprise Video which examines 15 providers in the market that is quietly growing alongside the need for richer customer journeys and digital asset management.

    Download

  • Evaluator’s guide for managed detection and response (MDR) services

    Managed detection and response (MDR) tools play a key role in enabling streamlined and unified security processes – however, finding the right MDR solution can be challenging. Read this MDR buyer’s guide to learn the basic MDR services, evaluation criteria, pitfalls to avoid, and more.

    Download