Feeds

Windows 8 fans out-enthuse Apple fanbois

Redmond allows 81 Win 8 devices to use one user ID, solving side-loading shemozzle

High performance access to file storage

Fanbois and Fandroids often attract derision for their slavish devotion to their preferred kit, but may just have been put in the shade by dedicated followers of … Windows 8.

Yes, you read that right. Windows 8 has dedicated followers. Or to use Microsoft's wording, “our most enthusiastic customers”.

The verbiage above comes from a Redmond blog post explaining that it has increased the number of devices on which a single account-holder can run modern apps from five to 81.

And yes you read that right, too. Eighty-one, not eight point one.

Like Apple, Microsoft regulates the number of devices it is possible to associate with a user ID. Apple's limit is ten, according to this knowledge base article. (Google Play's licence doesn't mention a device limit, but reserves the right to “at any time place limits on the number of Devices and/or software applications you may use to access Products, at Google’s discretion.”)

Microsoft's previous limit was five devices, but the post we've linked to above says “Since we launched Windows 8, we heard growing feedback from many developers and from our most enthusiastic customers that the limit of 5 was not enough for their needs.”

Apple customers have never, to the best of The Reg's knowledge, demanded their account be spread across 81 devices. Windows 8 enthusiasts are therefore ahead of their fruity frenemies for once.

The Reg can't help but wonder if another motive for the move is the anomaly we spotted at TechEd Australia that sees small software developers unable to load their wares from servers into Windows 8 unless they purchase at least 100 licences. Allowing 81 devices to run an app under a single user ID seems like a nice way to get around that problem, as it is possible to create administrator accounts for Microsoft's menagerie of online services and such accounts could have the power to install apps on users' desktops.

Developers could simply change the price of their wares to reflect multiple installations so they can cash in on multi-user installations. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.