Windows 10 leaked build hints at P2P update distributions

JC Torres - Mar 16, 2015, 7:50 am CDT
6
Windows 10 leaked build hints at P2P update distributions

Considering Microsoft is taking its sweet but absolutely necessary time to get Windows 10 finally into users’ hands, it isn’t unusual to turn to leaks for clues of what might soon be either the tech giant’s salvation or its final damnation. Microsoft has taken great pains to ensure Windows 10 won’t be as hated as Windows 8 and it has indeed introduced some rather interesting new features to make that happen. One of the latest isn’t exactly going to make you drool in awe but should make updates a bit easier on bandwidth thanks to peer-to-peer technology.

No, Microsoft isn’t going to start distributing app and system updates through BitTorrent, but the concept is technically the same. Instead of users all downloading from Microsoft servers, they will have the option to download it off other local Windows 10 computers on the same network, or, in addition to that, other PCs on the Internet. It’s pretty much like the same torrent idea, except limited specifically for Windows updates and using Microsoft technology.

While this feature might seem just for fanciness’ sake, it will actually be a big benefit to home users or small businesses that have multiple machines in the area. Instead of each and every computer fighting over bandwidth, they can feed off on each other instead. Almost ironically, enterprise customers, who seem to be the most likely beneficiary of the feature because of their numerous PCs, might be the least to benefit. They have already been availing of Microsoft’s Windows Server Update Services, which lets them download the updates on a single local computer which then distributes it to all other computers in the same network.

While this new P2P update feature might be good news to users, the actual implementation needs careful scrutiny, given the nature of peer-to-peer technology, Microsoft might have to concede a bit of control over the updates, and the feature could be perverted to become a vehicle for malware and other kinds of unwanted software.

VIA: Ars Technica


Must Read Bits & Bytes