Feeds

Windows 8 squeezed to fit 2012 Dell fondleslab?

So much OS, so little time

Combat fraud and increase customer satisfaction

Will Microsoft deliver Windows 8 in time for OEMs to ship product in 2012?

Yes, according to some supposedly leaked Dell slides showing a roadmap that has a Dell tablet running Windows 8 arriving in January 2012. The tablet is codenamed Peju.

The Windows-8 device is almost an afterthought om a roadmap that's dominated by eight Android fondleslabs. There's just one other pony from the Redmond stable - a machine running Windows 7, due in May.

If these slides are genuine and Windows 8 is more than a slideware placeholder, then Microsoft is now at an advanced stage of engineering Windows 8.

So far, Microsoft is not talking about Windows 8, and there have been no signs of early builds, let alone betas or hints of release candidates for the successor to Windows 7.

As Business Insider's Matt Rosoff, a former Directions-on-Microsoft analyst, notes here, Windows 7 was a relatively simple OS to build in the wake of Windows Vista, but it took three years. According to leaked Microsoft slides, the company has grander plans for Windows 8.

These include development of an tablet form factor plus a radical shakeup in the way apps are built, delivered, and installed. Windows 8 will apparently use a model that marries XAML markup at the interface layer with a web store to deliver an Adobe AIR-like experience.

There is one way Microsoft could accelerate Windows 8: by delivering the promised ARM-based flavor for tablets and devices, as MJF points out. She has noted before that Microsoft is rumored to have Windows working on ARM, via the LongARM project.

Of course, the slides could be wrong. Or Dell could be leaking in an attempt to convince the web that it's got a lot going on.

Casting some doubt on the validity of the whole roadmap is the fact that it shows a Dell phone codenamed Wrigley running Windows Phone "next gen" in July. Last week, Microsoft said ts next update to Windows Phone would arrive in March, but the big step-change in Windows Phone is not due until late summer or autumn this year. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.