Feeds

Windows Server 2008 CTP packs IIS punch

Fat lady goes back to trailer

Boost IT visibility and business value

Two months after releasing a "feature complete" third Windows Server 2008 beta, Microsoft has added new features to the planned operating system's code base.

Microsoft today issued a Community Technology Preview (CTP), featuring the ability to run Internet Information Services (IIS) 7.0 as a Server Core installation - a feature only announced at the start of June. Microsoft claimed 200,000 downloads for its third beta.

In a further development, eager users can fire up IIS 7.0 using Microsoft's Go Live license, which removes legal restrictions to running pre-release Windows code in full deployment environments only without the safety net of Microsoft support.

In other words, customers will effectively be testing IIS 7.0 on Microsoft's behalf in real-world scenarios to help meet Microsoft's goal of going up against Apache in terms of scalability, performance and security.

The Server Core installation means that Microsoft users can potentially install a Windows web server without the full operating system's libraries or user interface, for simplified administration and reduced possibility of attack. Microsoft had hitherto announced a number of Server Code installations.

Microsoft credited its late addition to a "huge request" from customers; however, its late appearance is the latest twist in a Windows Server 2008 feature set that owes more to a vendor version of the hokey pokey than a planned product roadmap. Separately, Microsoft has announced and then ripped out planed features from Viridian, its virtualization software due within 180 days of Windows Server 2008, indicating the company is unable to make a final commitment.

Aside from IIS7 in this CTP, Microsoft has also squeezed in a new Secure Sockets Tunneling Protocol (SSTP) for http, for creating a virtual private network (VPN) connection where firewalls or proxies might otherwise block it.

This latest CTP comes after Microsoft last week shut down an independent effort to build a version of the company's latest client operating system, Windows Vista, modeled on code used before Microsoft yanked out features unique to that particular version of Windows. Called Longhorn Reloaded, it was to have been crafted on the 4074 build of Longhorn and featured WinFS along with features such as the Avalon interface that did make the cut.

Microsoft has apparently issued a cease and desist order to project organizers.®

5 things you didn’t know about cloud backup

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Sin COS to tan Windows? Chinese operating system to debut in autumn – report
Development alliance working on desktop, mobe software
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
(Not so) Instagram now: Time-shifting Hyperlapse iPhone tool unleashed
Photos app now able to shoot fast-moving videos
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.