{"id":1376,"date":"2005-02-08T00:00:00","date_gmt":"2005-02-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/08\/microsoft-inches-closer-to-final-windows-server-2003-service-pack-64-bit-releases\/"},"modified":"2021-12-30T11:39:15","modified_gmt":"2021-12-30T11:39:15","slug":"microsoft-inches-closer-to-final-windows-server-2003-service-pack-64-bit-releases","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/08\/microsoft-inches-closer-to-final-windows-server-2003-service-pack-64-bit-releases\/","title":{"rendered":"Microsoft Inches Closer to Final Windows Server 2003 Service Pack, 64-Bit Releases"},"content":{"rendered":"<p>Microsoft will make available to beta testers an updated release of its Windows Server 2003 Service Pack 1 (SP1), its new 64-bit edition of Windows XP and its 64-bit editions of Windows Server 2003 on Tuesday evening.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The company is set to post for download the new &#8220;Release Candidate 2&#8221; (RC2) beta builds of SP1 and its x64 editions, company officials confirmed.<\/p>\n<p>Some industry watchers have pegged April as the likely final delivery date, since that is when Microsoft will be holding its annual Windows Hardware Engineering (WinHEC) conference.<\/p>\n<p>&#8220;The difference between RC1 and RC2 really is one of increased robustness as Microsoft prepares for the final RTM,&#8221; or release to manufacturing, a company spokeswoman said.  &#8220;This change was made based on feedback that the link was difficult to find in RC1,&#8221; the spokeswoman added.<\/p>\n<p>Microsoft is making the RC2 releases available to members of the Microsoft technical beta program.  The company also is making the code for Windows XP Professional X64 edition available to some customer testers, via the company&#8217;s Customer Preview Program.<\/p>\n<p>http:\/\/www.microsoft-watch.com\/article2\/0,1995,1762756,00.asp?kc=MWRSS02129TX1K0000535<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1376","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1376"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1376\/revisions"}],"predecessor-version":[{"id":3863,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1376\/revisions\/3863"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}