Third-party Vendors Deliver Application Center 2000-focused Tools

The beginnings of another Microsoft-centric third-party market space took shape with the general availability of Application Center 2000.

Peakstone Corp., F5 Networks Inc. and Xtremesoft Inc. all unveiled products this week that compliment Microsoft’s new Web application configuration and management product.

Application Center 2000 includes Component Load Balancing (CLB), a new form of clustering that allows applications to scale by distributing their components across several application servers, and integration with Network Load Balancing.

Peakstone introduced capacity-on-demand technology called Peakstone eAssurance. Combined with Application Center, eAssurance is designed to allow for the dynamic reallocation of server farm resources at times of peak demand.

F5 integrated Application Center 2000 into its Internet Control Architecture to allow Microsoft’s new software to work with F5’s BIG-IP Controller. The BIG_IP Controller includes load-balancing capabilities and permits instruction on when to add or remove server nodes.

Xtremesoft, which supplies application monitoring software for Microsoft Transaction Services and COM+, introduced an extension to Application Center 2000. Xtremesoft AppMetrics for Transactions will give users a way to monitor COM+ transactions and CLB in Application Center 2000.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.


  • Azure Edge Zones Hit Preview

    Azure Edge Zones, a new edge computing technology from Microsoft designed to enable new scenarios for developers and partners, emerged as a preview release this week.

  • Microsoft Shifts 2020 Events To Be Online Only

    Microsoft is shifting its big events this year to be online only, including Ignite 2020.

  • Microsoft Browser Support for TLS 1.0 and 1.1 Ending 2H 2020

    Microsoft announced on Tuesday that its plans to drop support for Transport Layer Security (TLS) protocols 1.0 and 1.1 in its browsers will get delayed by a few months until the second half of this year.

  • Attackers Using Excel Read-Only Files To Obscure Malware

    Attackers can attempt to hide malicious payloads in Excel files sent by e-mail by using a standard Excel feature, according to a Tuesday post by Mimecast researchers.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.