Feeds

Windows 7 still baking in oven, insists Microsoft

Confirms leaked build isn't final version

Choosing a cloud hosting partner with confidence

Microsoft has denied rumours that suggest the latest leaked build of Windows 7 is the final iteration of the upcoming operating system.

The software giant went to great lengths to stamp out the speculation after Windows 7 build 7600 and Windows Server 2008 R2 build 7600 tipped up on BitTorrent tracker sites.

Many pondered that the build could in fact be the Windows 7 Release to Manufacturing (RTM) milestone code.

“We are close, but have not yet signed off on Windows 7. When we RTM you will most certainly hear it here,” wrote Microsoft’s Brandon LeBlanc.

“Just because a single build may have ‘leaked’ it does not signal the completion of a milestone such as RTM. As always, don’t believe everything that you read on the internet - except this post ;-).”

Microsoft added that Windows 7 would RTM “when it’s ready”. The company is pinning down the second half of this month for when it will rock up. The clock is ticking; Redmond has less than three weeks to stick to that schedule.

Meanwhile, Microsoft has revealed more plans about Windows 7 E - the firm’s version of the OS that will ship without Internet Explorer 8 in a move to appease (though not necessarily please) European competition watchdogs.

The vendor said it planned to make Windows 7 E available to European users on 22 October, which is the same day the rest of the world can expect to get their hands on a copy of the operating system.

Microsoft will additionally offer an IE 8 Feature Pack for Windows 7 E, intended for anyone who wants to use the company’s web browser.

But how well does the IE 8-free version of the upcoming OS perform without Microsoft’s browser installed?

Apparently internal testing of the product showed that “the vast majority of applications [including web-based apps] work on Windows 7 E editions without any changes.”

However, there is a caveat: Windows applications using the Web Browser control function could prove somewhat flaky in the compatibility department when certain apps depend directly on a specific browser.

“In particular, if while using the Web Browser control, you allow the application to open new windows that do not respect the user’s default browser choice, you may see some issues,” noted Windows 7 program manger Arik Cohen in a blog post yesterday. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.