Feeds

Windows hardware challenge draws on resources

Things get heavy

The Power of One eBook: Top reasons to choose HP BladeSystem

Despite this, though, it is still apparent that we are working with beta software. For instance, some queries run as fast as we would expect on a box with 16 64-bit CPUs but others, whilst quick, are slower than we'd predicted. Another example is the result of Microsoft's stated policy of only incorporating into a CTP features that are reasonably robust.

I approve of this approach but it does mean some of the features we wanted were missing from the SQL Server 2008 CTP version five we'd been using. CTP six does, though, contain the online data compression and the backup compression we want to play with (sorry, test for deployment).

We've been using Remote Desktop for connecting to the server and it works very well. The few gripes I have about the hardware/software are both connected with the display. One is an irritation rather than a major issue: the use of ClearType fonts has to be set up every time a remote connection is made to the server. I gather this has been fixed for Windows Vista; we are, however, running Windows XP.

Another gripe: you and I know why servers don’t come with high-performance video cards but I do wish manufacturers wouldn’t use such dismal ones that make it painful to work at the server (which one has to do occasionally, during installations, for example).

In an attempt to alleviate the problem, we dropped in a reasonable card (a Matrox Millennium G550) only to discover that the driver install program didn’t recognize the operating system. I insisted that what it could see was really Windows Vista but it wasn’t fooled. It’s sad, really, that we end up trying to lie to the install software just to get a result.

Another, slightly painful area, is caused by Microsoft clearly taking security in Windows 2008 very, very seriously. For production this is an excellent thing - no question. But in development it's a pain because every thing useful is turned off by default so every feature we want to use has to actively be turned on with the correct permissions.

I'm a database geek so it's not pain I have to suffer directly, but the operating system guys have had fun locating all the relevant settings and turning them to "on'". It would be useful to have one switch that turns all the security off (after you've provided a note from your mother allowing you to do so).

Next up, installation of the software itself.®

Follow Register Developer regular Mark Whitehorn next time on Project Watch: Microsoft 2008 as he continues to roll out a spanking-new 1TB database for several thousand users on Microsoft's SQL Server 2008, Visual Studio 2008 and Windows Server 2008.

Boost IT visibility and business value

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.