Yes, Microsoft Wants Windows 8 to Compete with iPadsAdded 22nd Mar 2012
If there was any doubt that Microsoft wants to grab some of the iPad market, there's none any more: Now Microsoft has a web page that shows developers how to translate iPad apps into Windows 8 ones with a Metro style look and feel.
"In this case study we want to help designers and developers who are familiar with iOS to reimagine their apps using Metro style design principles," says the blog. "We show you how to translate common user interface and experience patterns found in iPad apps to Windows 8 Metro style apps."
RELATED: iPads trailblaze for Windows 8
TEST YOURSELF: Do you know the New iPad?
Why would anyone want to do that? "To learn more about the business opportunity of Windows 8, see Selling Apps," the posting says early on. Ultimately that leads to a site with this enticement: "With successful apps on Windows, you'll make more money than the industry standard, earning 80% of every customer dollar, after an app makes more than 25,000 USD in sales. For the first 25,000 USD of an app's sales, you get the industry-standard 70%."
Money aside, the case-study post shows how an iPad photo journal application was adapted to fit with Metro style. Both Windows 8 and iOS on iPads cater to touch commands and navigation, but where iPads rely on icons and toolbars, Windows 8 centers around words on tiles and hiding toolbars.
In converting to Windows 8 the first thing to go from the iPad app is the "chrome" - the navigation bar, pagination controls and the bottom control bar, resulting in a less cluttered application surface. In the Windows 8 version, they are gone but are less necessary because the navigation hierarchy is flattened.
For example, the hub screen for the iPad app shows a single photo for each of the 12 months, with a tab to switch to comments about the photos.
In the Windows 8 version the hub screen is a single month with a featured large photo for the month with other, smaller photos from that month displayed next to it. About a third of the same screen is devoted to comments. For more comments, tap (it's designed for touchscreen) the Recent Comment header. For more pictures, tap the This Month header.
A second navigation alternative involves pinch to zoom - making a pinching gesture while touching the screen to pull out hierarchically from a single photo to sets of 12 squares or tiles, each set representing a different year. Users can, for instance, go from a photo from March 2012 to a photo from July 2010 by pinching the March photo, zooming out to the sets of tiles, tapping the one for July 2010 and sorting through the photos that are brought up. There is no navigation bar.
With the iPad app, the same transition calls for tapping a Years button on the navigation bar at the top of the screen, selecting the year as it appears in a popover box and then sorting through that year.
Similarly, commands are hidden off screen and can be drawn up from the bottom or down from the top with a finger swipe. The commands shown depend on what object on the screen is designated. So if a photo is highlighted, the commands might include delete or upload.
In the iPad app, that is done via the always visible navigation bar.
On the iPad app, search is done via a search window on the app's home page. With Metro, it's always available on the charms bar - a bar of a consistent set of icons that can be swiped out from the right hand side of the screen. It searches the application that the user is inside of.
The features go on and on, including sharing content between applications and to various social networking sites.
Read more about anti-malware in Network World's Anti-malware section.
Next year will see demonstrable evidence of the Internet of Things, real-time communications on the Web, and SDN-enabled platforms with killer applications for them.
A Stratecast survey has found that more than 80 per cent of employees admit to using unauthorised Software-as-a-Service (SaaS) applications during work.
Microsoft moved to reassure business and government customers worldwide that it is committed to informing them of legal orders related to their data, and will fight in court any 'gag order' that prevents it from sharing such information with customers.
Distributed denial-of-service attacks against financial firms and other industries have been mounting, so today the Cloud Security Alliance (CSA) announced it is establishing the Anti-Bot Working Group to help fight this threat.
The majority of today's CIOs see value in mobilizing enterprise applications and in deploying mobile-related innovations such as GPS features, location-based services (LBS), mobile payments and QR codes. Many also say their organizations are already somehow increasing revenue and developing new revenue streams directly related to mobile. But nearly as many CIOs also see the cost of deploying new innovations as prohibitive and complexity as a major concern, according to a new survey commissioned by Mobile Helix, a mobile security vendor.
The price of bitcoins may be soaring, but China isn't too thrilled with the virtual currency. On Thursday, the nation moved to regulate use of bitcoins, stating that its financial institutions could not deal in the virtual currency.
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
Ruby on Rails users are advised to upgrade to newly released versions of the Web development framework that contain important security fixes, according to the Rails development team.
Mobile technology is increasing the complexity, usage and costs of mainframe applications, according to Compuware research.
Asian markets are ready for advanced mobile technology and fast connectivity, according to new insights released by Telenor Group in Asia.
Large smartphones with 5-in. or larger displays -- often called phablets -- are eating into sales of smaller tablets with screens in the 7-in. range.
Analysts have predicted that the Internet of Things will continue to grow in 2014, and more enterprises will start to realise the potential benefits.
When end users circumvent the IT department and start using software-as-a-service (SaaS) applications without permission, the IT pros complain about the plague they call "shadow IT." But it would seem the professionals are also operating in the shadows, according to a survey out today.
Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored. Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT."
Once heavily reliant on the Chinese market, Lenovo is now looking to make acquisitions as it tries to expand its growing enterprise business to other countries.