Skip to main content

微软按月收费桌面计划,Win 10 将变成 Win 365?

据报道,微软目前正在启动一项桌面即服务计划“Microsoft Managed Desktop”,该项目将以按月付费的方式让用户使用 Windows 10 服务。
早在 2005 年,微软就进行了一项试验,其通过该试验为 Energizer 管理 Windows PC 和服务器。后来该模式演变出向用户提供 Office 365 服务,即以付费形式提供服务,而不是直接销售该产品(其实也有永久付费版本)。据介绍,如今该模式将运用于 Windwos 10 上,让用户以每月付一定费用的形式向微软租用该操作系统。
该服务实际上就是一种“desktop as a service”(桌面即服务),它将为用户提供已自动为其配置好的 Windows 10,并使操作系统保持最新状态,而用户只需每月支付一定费用,这与当下用户直接购买 Windows 10 操作系统形式不同,相反,它与当前的 Office 365 服务获取形式相同。而微软这一个桌面即服务与其它公司推出的桌面即服务的区别在于,它会保持更新 Windwos 组件,这样的改变或许将受用户的喜爱,因为 Windows 一直以来被诟病每两年才更新一次系统,并且补丁出现兼容性等问题使得体验太糟糕了。
Microsoft Managed Desktop 具体会以何种方式提供给用户?该模式是不是意味着用户将无法真正控制自己的操作系统?目前微软还未对此消息作出相关评论。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...