Feeds

High Zune: MS loads up for the CES shootout

But it won't exactly be what you were expecting...

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Radio Reg What better venue than Las Vegas, America's playground, for the annual multi-billion dollar gadgets and entertainment jamboree that is the Consumer Electronics Show?

Among this year's players Microsoft, entering the arena surrounded by a cloud of rumor over the potential for an iPhone-killing, Zune-based, Redmond mobile phone running Windows.

Yeah, that’s the way to fight Apple: marry Microsoft’s confused mobile Windows strategy with the embarrassment that is the Zune.

Join All about Microsoft blogger Mary-Jo Foley and The Register's software editor Gavin Clarke on MicroBite, as we find out what you can really expect from Microsoft. Hint: it won’t be small, fit in your hand, and you won’t be able to make any phone calls with it.

Also getting stripped down to its undies this episode: Microsoft’s open-source strategy. How can Microsoft reconcile its need to love open-source with its hostility to Linux?

You’ll be surprised. Microsoft’s HealthVault online patients record store might use Windows, but it's the first business service using Azure Services Platform and it's actually reaching out to open-source developers.

Senior director of platform strategy Robert Duffner explains how Microsoft hopes to engage with open-source developers using online services such Azure.

And with 2009 here, what can you expect from Internet Explorer 8? Finished product or more beta? Ordinary internet users can certainly expect more problems, as Microsoft tries to straddle IE's non-standards-compatible past with a standards-compatible future at the flip of a button.

Listen either using our player below, or download in Ogg Vorbis or MP3 format.

MicroBite 4

Questions to microbite@theregister.co.uk ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.