Feeds

Microsoft touts AMD, snubs Intel with Yukon beta

SQL Server 2005 comes to the masses

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Microsoft's SQL Server 2005 database has reached the plebs in the form of a beta 2 release that includes, among other things, support for AMD's Opteron processor but not for Intel's similar 64-bit Xeon chip.

The upcoming database - code-named Yukon - is now available to some 500,000 MSDN subscribers here. Close to 3,000 select testers were allowed to peek at the first beta, and a third beta program is scheduled to start by the end of this year. Microsoft now expects a final version of the database to arrive "in the first half of 2005." It had once hoped to deliver the software by the end of this year.

Microsoft highlighted the support for Opteron as one of the major new features in the second beta.

"As enterprises transition from 32- to 64-bit computing, they need the smooth migration path to 64-bit computing that AMD64 provides," Marty Seyer, vice president and general manager of the microprocessor business unit at AMD, said in a Microsoft statement. "We invite beta testers to experience for themselves how AMD64 with Direct Connect Architecture can help eliminate the bottlenecks inherent in a front-side bus and improve overall system performance and efficiency."

Microsoft made no mention of Intel's recently released x86-64-bit Xeon processor that competes with Opteron. A company spokeswoman, however, said support for Intel's chip would arrive by the time SQL Server 2005 ships next year.

Microsoft has also put out SQL Server Management Studio - formerly known as SQL Server "workbench" - in the second beta. This software combines Enterprise Manager, Query Analyzer and Analysis Manager into one tool and adds support for SQL Server Reporting Services, Notification Services, XML and SQL Server 2005 Mobile Edition. The second beta also includes database mirroring, database snapshots, partitioning, database encryption and a host of other high-end functions. These additions are clearly meant to help Microsoft compete against the likes of Oracle and IBM. ®

Related stories

Developers' sneak peek at SQL Server 2005
Windows XP SP2 slips into Fall
(Almost) everything may go, as Longhorn rushes to release
Microsoft irks ISVs with XP SP2 delay
MS delays Yukon

Choosing a cloud hosting partner with confidence

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.