You've requested...

Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop

If a new window did not open, click here to view this asset.

Download this next:

Updates: The next evolution of operating systems

If there is one constant in the world of operating systems, it is the need to update. Automatic patching and updates are now the way security updates and enhancements are rolled out.  On iOS and Android devices, this is what users have been used to: they get an update every few days or weeks.

But it is now on Windows 10. In November 2017, Microsoft released the Fall Creators Edition of its Windows desktop operating system, adding features for 3D modelling, control via eye movement and better integration with OneDrive.  There is probably less here for corporate IT, but what Microsoft has done is enhance security, which improves baseline support for home and BYOD (bring your own device) devices connecting to corporate IT assets.

Perhaps the biggest shakeup in operating systems so far has been the recent Spectre and Meltdown microprocessor flaws. Every operating system is being patched and this is likely to continue over time, to improve the security as an interim step until new secure processors are released.

These are also closely related to: "Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop"

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    In this week’s Computer Weekly, we look at the latest developments in wireless technology and discover how enterprises can deliver secure and reliable wireless networks for staff and customers. We examine Microsoft’s PowerShell scripting language to understand why it’s become such an important tool for automating system administration. And we ask CIOs what it’s like to cross the divide and work for IT suppliers. Read the issue now.

    Also inside:

    • Chatbots have the potential to reduce the workload for contact centres. A recent Capita workshop explored the impact of artificial intelligence and other emerging technologies.
    • How IT apprentices are helping businesses transform back-office processes through software robots.
    • From cloud to machine learning, Shazam CTO Richard Sharp tells Computer Weekly how the music discovery service continues to innovate.

  • Computer Weekly – 19 March 2019: How IT leaders should work with marketing

    In this week’s Computer Weekly, we hear expert advice on how IT and marketing chiefs can work together to deliver a high-quality customer experience. We examine how supercomputers are transforming science by processing large-scale data analytics. And we look at one of the key ethical aspects of artificial intelligence (AI) – how to explain the decisions an AI makes. Read the issue now.

Find more content like what you just read:

  • Computer Weekly – 21 May 2019: Managing software updates in Windows 10

    In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.

    Download

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

    Download

  • CW Nordics November 2017

    The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.

    Download

  • Windows 10: How the client operating system is evolving

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

    Download

  • Securing Remote Access

    As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.

    Download

  • Cyber Liability Insurance

    Like health insurance, cyber insurance is a line of coverage designed to mitigate losses from cyber incidents. This white paper looks at how cyber insurance can help in the case of a cyber incident, highlighting how security controls such as MFA and endpoint security can bolster the effects of insurance, and lower rates. Read on to learn more.

    Download

  • 5 Ways to Secure the Identities Driving Key Initiatives

    Learn five ways to protect cloud and digital initiatives from identity-related attacks by securing users’ access to applications and more in this whitepaper.

    Download

  • How SOAR is Transforming Threat Intelligence

    Today’s security teams still rely on siloed threat intelligence platforms (TIPs) to provide visibility into external threats, but teams still struggle to take automated actions on relevant indicators across disjointed threat feeds. Access this white paper to learn how the Cortex XSOAR platform is designed to provide 3 key benefits.

    Download

  • Guide to edge computing in a cloud native world

    What really is edge computing? And how are near edge, far edge and tiny edge different? This guide explains what edge computing means for your business and how you can take advantage of it in a cloud native world. Read it here.

    Download

  • Edge computing: Guidance for planning, budgeting & more

    Wherever you are on your edge computing journey, exploring the current state of edge can offer you insights to add to your toolbox. Based on survey results from over 1,400 security practitioners, this report examines edge computing themes and highlights key takeaways. Continue on to access guidance for bolstering your edge computing strategy.

    Download

  • 7 Strategies to Create Content That Delivers

    For tech organizations, it can be tricky to know what types of content are going to deliver results. So, how can you create the marketing and sales material that meets your objectives while still piquing the interests of your audiences? Browse this guide to learn more.

    Download

  • White Paper: Evaluator’s Guide For Managed Detection and Response (MDR) Services

    Managed detection and response (MDR) tools play a key role in enabling streamlined and unified security processes – however, finding the right MDR solution can be challenging. Read this MDR buyer’s guide to learn the basic MDR services, evaluation criteria, pitfalls to avoid, and more.

    Download