10 things we love about the Surface for Windows 8 Pro
- 06 February, 2013 03:00
Here's a list of some them.
[ THEN AGAIN ...: 10 things we hate about Microsoft's Surface Windows 8 Pro
SLIDESHOW: Surface's features
NAVIGATE: 12 essential Windows 8 keyboard shortcuts ]
1. It supports the full version of Windows 8 and therefore any applications that run on Windows 7.
2. Has enough horsepower to run Windows 7 in a virtual machine for those who hate Windows 8.
3. It can join business network domains, which is a BYOD plus.
4. Two choices of keyboards which are removable and can swing 180 degrees to fold under the device for tablet and notebook use. A switch in the hinge shuts off the keyboard when it is folded back.
5. 720p front- and rear-facing cameras.
6. Support for USB 3.0.
7. The video/audio out port supports true HD at 2560 x 1440 external displays, which is better than the 1920 x 1080 screen on Surface Pro itself.
8. It's compact, thin and relatively light at 2 pounds.
9. A power-supply USB port enables charging devices when it's inconvenient to tie up the single USB port in the edge of Surface Pro.
10. The magnesium case seems sturdy and solid.
Tim Greene covers Microsoft for Network World and writes the Mostly Microsoft blog. Reach him at email@example.com and follow him on Twitter @Tim_Greene.
Read more about data center in Network World's Data Center section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- OAIC releases privacy impact assessment guide for consultation
- Some Australian businesses 'unlikely' to be ready for Privacy Act changes: survey
- BYOA 'shadow IT' grows in the enterprise: Telsyte
- Cost of a Privacy Act breach could extend to ongoing audits: legal expert
- How Hunter Water is saving $50k a year in software licences
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Best Practices in Data Protection Monitoring
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.
Implementing an Effective Vulnerability Management Program
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.
Assessing IP Telephony Total Cost of Ownership
Understanding total cost of ownership (TCO) of IP telephony (IPT) and unified communications (UC) implementations is critical to sound decision making. Based on data gathered from 211 Enterprises, this whitepaper reveals TCO for each vendor across a range of implementation sizes.