Feeds

Microsoft calls Intel's Windows 8 comments 'inaccurate'

But won't say how

Intelligent flash storage arrays

Microsoft has said that recent comments from Intel software chief Renée James on the next version of Windows were "factually inaccurate and unfortunately misleading."

At Intel's Investor Meeting 2011 at the company's Santa Clara, California, headquarters on Tuesday, James told her keynote audience that the upcoming versions of Windows that Microsoft will provide for ARM-based systems will not run "legacy" applications. "Our competitors will not be running legacy applications. Not now. Not ever," she said, after referring to the next incarnation of Windows by its apparent code name, Windows 8.

She also told the gathered investors that "Windows 8 traditional" – a version of the new OS for x86 chips – will offer a "Windows 7 mode", and that this version would allow users to run "all of their old applications."

She then indicated that Microsoft was developing four Windows versions for ARM systems. "There will be four Windows 8 SoCs for ARM. Each one will run for that specific ARM environment, and they will run new applications or cloud-based applications," she said, referring to system-on-a-chip architectures. "They are neither forward- nor backward-compatible between their own architecture – different generations of a single vendor – nor are they compatible across different vendors. Each one is a unique stack."

When Microsoft announced its ARM versions of Windows at this January's Consumer Electronics Show, it mentioned only three ARM-system partners: Nvidia, Qualcomm, and Texas Instruments.

On Wednesday, Microsoft took issue with James' comments – but it declined to provide any clarification on what part or parts of her comments were problematic. "Intel’s statements during yesterday’s Intel Investor Meeting about Microsoft’s plans for the next version of Windows were factually inaccurate and unfortunately misleading," the company said in a statement sent to The Register. "From the first demonstrations of Windows on SoC, we have been clear about our goals and have emphasized that we are at the technology demonstration stage. As such, we have no further details or information at this time."

Intel declined to elaborate on James' comments. "We are not commenting further on this one," a company spokeswoman told us. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.