Longhorn December CTP Ships

Just as the holidays kicked off, Microsoft shipped the latest community technology preview of Windows "Longhorn" Server.

Microsoft shipped the second beta test version of Longhorn in May at its Windows Hardware Engineering Conference (WinHEC) in Seattle and shipped a follow-up, dubbed the August CTP, in mid-September. The newest release is referred to as the December CTP.

Longhorn was delayed until the second half of 2007 after Microsoft had to push back the release of Windows Vista early last spring. (See "Longhorn Server -- Slip Sliding Away?," April 26, 2006.) Although there is still plenty of time for Microsoft to delay Longhorn -- the server version of Vista -- yet again, the company's current stance is that it will ship on the revised schedule.

The December CTP is build number 6001.16406, which is the most recent build after 5600, which comprised the August CTP release.

However, only technical beta participants can download the current CTP. To get the download, go here.

About the Author

Stuart J. Johnston has covered technology, especially Microsoft, since February 1988 for InfoWorld, Computerworld, Information Week, and PC World, as well as for Enterprise Developer, XML & Web Services, and .NET magazines.


  • The 2021 Microsoft Product Roadmap

    From Windows 10X to the next generation of Microsoft's application server products, here are the product milestones coming down the pipeline in 2021.

  • After High-Profile Attacks, Biden Calls for Better Software Security

    Recent high-profile security attacks have prompted the Biden administration to issue an executive order aiming to tighten software security practices across the board.

  • With Hybrid Networks on Rise, Microsoft Touts Zero Trust Security

    Hybrid networks, which combine use of cloud services with on-premises software, require a "zero trust" security approach, Microsoft said this week.

  • Feds Advise Orgs on How To Block Ransomware Amid Colonial Pipeline Attack

    A recent ransomware attack on a U.S. fuel pipeline company has put a spotlight on how "critical infrastructure" organizations can prevent similar attacks.