In A World Without Windows, Who Needs Gates? – Windows 8 Migration

Windows 8 Migration

 

It’s been quite some years since Scott McNealy uttered these critical, yet extremely witty, words aimed at long time rival Bill Gates and his most popular product Windows (just capitalize “gates” and “windows” in the quote above, and the intention becomes clear). However, even as the world railed against frequent Windows upgrades and the occasional failure like Windows Vista, Windows continued to survive, even thrive. In fact, it was McNealy’s Sun Microsystems that ceased to exist, being acquired by Oracle in 2010.

Even today, when cloud computing has greatly reduced the importance of an on-board operating system, Windows 8 is getting a lot of rave reviews. For one, its engineered taking latest developments like cloud computing in mind, and secondly, works well with the highly-popular tablet form factor. Even as Linux spreads its influence, Macs dominate technophiles’ minds and Android takes over smartphones, there’s no denying that Windows is still the system that runs, by some accounts, 90% of the world’s computers. Of these, 37% are on Windows XP.

Due to the widespread criticism that followed XP’s release, several Windows users refrained from upgrading from Vista, and to some extent, this nonchalance continued even as Windows 7 addressed many of Vista’s shortcomings. Now, that Windows 8 is here, it’s important that Vista users upgrade, not least because Microsoft will stop supporting Vista after April 8, 2014. Of course, Windows 8 beats Vista hollow on a number of parameters, especially security, as this short paper so clearly demonstrates.

However, making this shift in such a compressed timeframe is not easy. That’s why Lenovo, the No. 1 PC manufacturers today, have put together this comprehensive checklist to make this onerous task less so. Focusing on three primary migration phases: plan, deploy, and operate, the checklist can be used by your internal IT department to move seamlessly from Windows Vista to Windows 8 (or Windows 7, if you so desire).

 

By Sourya Biswas

Sorry, comments are closed for this post.

Drones: Unlimited Possibilities Await Us – Good And Bad

Drones: Unlimited Possibilities Await Us – Good And Bad

Drones: Unlimited Possibilities I have written two recent posts here on CloudTweaks about drones. The first, ‘The Pizza Delivery Drone’, was a somewhat comical look at what possibly is to come with future drones. The second was a look at the more immediately possible concept of a modular drone.  Modular drones are capable of supporting…

Cloud Email Marketing Services vs. Transactional Email Services

Cloud Email Marketing Services vs. Transactional Email Services

Cloud Based Email Marketing Services Every business can benefit from successful implementation of email marketing strategies, but the variety of SaaS on the market can be a little overwhelming at times. Whether you’re interested in learning more about email marketing or hoping to clear up any confusion surrounding transactional email, a little research into these…

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Next Generation of Cyber Security As I walked through RSA last week, I was struck by the usual fear laden messages “You’re not safe and never will be but I (vendor) have a silver bullet that will protect you.” And, I wondered if this fear-based approach is deterring a badly needed next generation of cyber…

An Old Recurring Revenue Model Gains New Converts

An Old Recurring Revenue Model Gains New Converts

An Old Recurring Revenue Model Due to a range of market forces, a recurring revenue model that’s been used for decades in industries such as airplane manufacturing is undergoing a resurgence. Widely referred to as outcome-based pricing, output-based pricing, and performance pay, it offers companies a compelling way to stand out in a crowded field.…

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS)  Technology has changed the world radically. But, to date, the world hasn’t changed as fast as technology to. There are a couple of concepts that are concerning as we head into the reality of CPS-deployed systems. The first is that standards don’t exist. Many companies are considering the Bring Your Own…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising