Article

Microsoft SQL Server gets its own day for hotfixes

Margie Semilof
SQL Server administrators will soon receive their SQL hotfixes from Microsoft on a more regular schedule every other month instead of in random fashion, which is how they receive them today.

Next week, Microsoft will begin this new procedure for dispensing hotfixes, which are generally not as high level as patches are. The bulletins can include items like syntax bugs or any small glitches where a workaround is required. The first delivery of cumulative hotfixes will be April 16. Successive batches may not always fall on the same day but in the same week, according to Microsoft.

    Requires Free Membership to View

More SQL Server stories:

Worm uses Symantec tools to infiltrate SQL Server


SQL Server 2005 adoption on course for most IT shops


Crucial SQL Server 2005 service pack ships

This new way of dispensing SQL Server hotfixes will replace the current situation where hotfixes are delivered randomly, and customers must go to support.Microsoft.com to receive downloads.

The SQL Server hotfixes will not replace service packs. And, Microsoft will still release bug fixes and patches for SQL Server that involve Windows on Patch Tuesday. If a fix is needed right away or if it affects a broad set of customers, then Microsoft will push it out regardless of the timing, the company said.

Customers can sign up at support.Microsoft.com and receive an automatic notification when the hotfixes are ready.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: