Feeds

Tools and rules buffed for Microsoft's iPhone challenger

No porn, no fat apps, just fill our music store

Beginner's guide to SSL certificates

Microsoft is prepping Windows mobile developers for October's debut of Windows Phone 7.

The final set of developer tools for Windows Phone 7 will drop on September 16 withp> what the company on Monday called "minor" breaking changes from the beta tools available now.

This includes several "highly requested" Silverlight controls and the panorama, pivot, and Bing maps controls Microsoft said developers can drop in to applications.</

Microsoft claimed there's been 300,000 downloads of the Windows Phone 7 developer tools since release six months ago.

According to Microsoft, here:

"These first six months have affirmed that a rich application platform based on the well understood Silverlight and XNA technologies, combined with great free tools based on Visual Studio 2010 and Expression Blend is the right approach for enabling developers and designers of all skill levels who are looking to capitalize on the opportunities presented by Windows Phone 7."

The company plans a limited beta of the Windows Phone Marketplace's submission and certification process in the coming weeks with "significant" changes to its developer portal following community feedback.

"In those changes, you'll see enhancements meant to simplify and streamline the path for developers to get the information they need," Microsoft said.

Microsoft, meanwhile, has updated and expanded the guidelines (warning: PDF) for publishing applications to the marketplace. Applications with an over the air download (OTA) are limited to 10MB, half the limit allowed under Microsoft's guidelines released a year ago. Instead, applications with a payload greater than 10MB must work via WiFi or tethering to a PC.

Clearly, Microsoft wants to keep carriers like AT&T sweet as they increasingly cap data plans to stop their public networks choking from smart-phone use.

Applications that download music must include the Windows Phone Music store, a move designed to force music publishers to stuff Microsoft's music mart with copies of tunes also available elsewhere, making Microsoft's music store an appealing proposition to shoppers.

Finally, VoIP is allowed, unlike a year ago, while Microsoft's come over all Jobs-like and banned porn from its marketplace - a move that will help shore up Android. ®

Remote control for virtualized desktops

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.