Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

What kind of Microsoft products does your business use on a regular basis? If you can’t answer this question, you could be in trouble when it comes time to update your crucial applications and operating systems. This is a necessary part of working with technology; if your software can’t be considered secure, you need to upgrade to a more recent, better-functioning tool, or find yourself in a dangerous situation.

Microsoft in particular has a very specific way of handling support for their products. The software giant will provide what’s called “mainstream support,” which involves accepting requests for new features and hotfixes for key issues. Once mainstream support ends, the product enters an “extended support” period, where all warranties end, and the only support your product receives is security updates and patches.

Both of these periods last for five years, meaning that the lifespan of a piece of software is effectively ten years. Once extended support ends, the product reaches its “end of life,” in which Microsoft no longer supports the software at all.

Below, you’ll find a list of all Microsoft products that will reach their end of support date on July 12th, 2016. If your organization is currently using any of this software, you should seriously consider upgrading before it becomes a security discrepancy.

Service Packs Reaching End of Support

  • Microsoft Dynamics CRM 2013
  • Microsoft Dynamics SL 2011 Service Pack 2
  • Microsoft SQL Server 2014 Business Intelligence
  • Microsoft SQL Server 2014 Developer
  • Microsoft SQL Server 2014 Enterprise
  • Microsoft SQL Server 2014 Enterprise Core
  • Microsoft SQL Server 2014 Express
  • Microsoft SQL Server 2014 Standard
  • Microsoft SQL Server 2014 Web
  • Microsoft System Center 2012 Configuration Manager Service Pack 1
  • Microsoft System Center 2012 Endpoint Protection Service Pack 1
  • Microsoft System Center 2012 R2 Configuration Manager
  • Microsoft System Center 2012 R2 Endpoint Protection
  • Microsoft System Center 2012 R2 Endpoint Protection for Linux
  • Microsoft System Center 2012 R2 Endpoint Protection for Mac

Products Moving from Mainstream to Extended Support
Products marked with * expire on July 10th, 2016, rather than July 12th, 2016.

  • * Microsoft Dynamics Retail Management System Headquarters 2.0
  • * Microsoft Dynamics Retail Management System Store Operations 2.0
  • Microsoft Project Server 2010 July 12, 2016
  • Microsoft Dynamics SL 2011
  • Microsoft SQL Server Compact 4.0
  • Windows MultiPoint Server 2011 Premium
  • Windows MultiPoint Server 2011 Standard

Products Moving to End of Support

  • Microsoft ActiveSync 4.2
  • Microsoft BizTalk Server 2006 Developer Edition
  • Microsoft BizTalk Server 2006 Enterprise Edition
  • Microsoft BizTalk Server 2006 R2 Branch Edition
  • Microsoft BizTalk Server 2006 R2 Developer Edition
  • Microsoft BizTalk Server 2006 R2 Enterprise Edition
  • Microsoft BizTalk Server 2006 R2 Standard Edition
  • Microsoft BizTalk Server 2006 Standard Edition
  • Microsoft Commerce Server 2007 Developer Edition
  • Microsoft Commerce Server 2007 Enterprise Edition
  • Microsoft Commerce Server 2007 Standard Edition
  • Microsoft Connected Services Framework Billing Standard Business Event 3.0
  • Microsoft Connected Services Framework Order Handling Standard Business Event 3.0
  • Microsoft Connected Services Framework Server 3.0
  • Microsoft Connected Services Framework Standard Server 3.0
  • Microsoft Connected Services Framework Standard Server with Standard Business Events 3.0
  • Microsoft Visual J# Version 2.0 Redistributable Package
  • Microsoft Visual Studio 2005 Team Foundation Server

Is your organization is facing an end-of-life event for any of these technologies? If so, contact Total Tech Care. We’ll work with you to determine the best course of action for replacing your dying software. To learn more, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Social Media Chrome Gadgets Virtualization Saving Money Holiday Tech Term Automation Managed IT Services Microsoft Office Managed Service Cybercrime Operating System Artificial Intelligence Computers Facebook Networking IT Support Health Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Information Technology Remote Managed Service Provider Covid-19 Spam Alert Information Office 365 Telephone Systems Bandwidth Recovery Employer-Employee Relationship Router Social Engineering BDR Mobility Encryption Applications Data Breach Human Resources Big Data Law Enforcement Remote Monitoring Mobile Computing Password Money App History Application VPN Government Remote Computing Private Cloud Blockchain Mobile Office Paperless Office How To Managed IT Apps Office Tips Data Storage Patch Management Training Windows 7 Word Gmail Google Drive Settings Servers Avoiding Downtime Two-factor Authentication Data Security Mouse HaaS Flexibility Marketing WiFi Bring Your Own Device Data Management IT solutions Work/Life Balance Entertainment Website Budget Infrastructure Voice over Internet Protocol Wireless Vulnerability Scam Education Lithium-ion battery Physical Security Safety HIPAA Sports Data Protection Redundancy Keyboard Firewall Vendor Management Vendor Managed Services Display Virtual Reality Apple Social Employee/Employer Relationship User Error Save Time Telephone System Staff RMM Software as a Service Meetings Machine Learning Remote Work Connectivity Cleaning Risk Management Hacker USB Conferencing End of Support The Internet of Things Fraud Net Neutrality SharePoint Workplace Strategy Internet Exlporer Audit Worker Help Desk Remote Worker Humor IT Management Printing PDF Cryptocurrency Botnet Customer Service Environment IT Plan Proactive IT Managed Services Provider Fax Server Comparison Unsupported Software Best Practice Database YouTube CES SaaS Charger Black Market Remote Workers Compliance Business Technology Content Management OneNote Processor Computer Care Current Events Network Congestion Access Control Telephony Virus eWaste Document Management Solid State Drive Virtual Assistant Wireless Technology Hard Drive Samsung How to Downtime Authentication Unified Threat Management Computer Accessories Value Data storage Computing Spam Blocking Wearable Technology Electronic Medical Records Automobile Retail Hard Drives Update Instant Messaging Excel Computing Infrastructure Printer Hiring/Firing Robot Bluetooth Going Green Google Docs Identity Theft Digital Signage Biometrics Virtual Desktop Battery Shadow IT DDoS IT Consultant Legal Augmented Reality Business Intelligence Procurement Twitter Social Network Search Engine Politics Advertising NIST Business Mangement Investment Distributed Denial of Service Customer Relationship Management Trending Public Computer Analyitcs Employees Smart Tech Employee/Employer Relationships Addiction Regulations Notifications Amazon ISP Transportation Programming Windows 365 Video Conferencing Recycling Computer Fan ROI Rootkit Shortcuts Wiring Sales Practices Bitcoin Relocation Cache Personal Amazon Web Services Workers Cryptomining Antivirus Benefits Consultant Point of Sale Windows 8 Safe Mode Analytics Supply Chain Management Criminal FENG IBM IT service Video Games GDPR Monitoring Hosted Computing Batteries Wireless Internet Flash Digitize Online Shopping Smart Technology Worker Commute Best Available Windows 8.1 Experience WIndows 7 Tablet File Sharing Windows Server 2008 R2 Specifications Supercomputer Domains Scalability Camera Customer relationships Inventory Software Tips Wire Sync IT Assessment Evernote Emails Manufacturing Business Owner Email Best Practices NarrowBand IaaS Travel Maintenance Millennials Security Cameras Bloatware Search Printers Computer Tips Managed IT Service iPhone Smart Office OneDrive Wireless Charging Netflix Biometric Security Two Factor Authentication Virtual CIO User Tablets PowerPoint Peripheral Root Cause Analysis Windows Media Player Workforce Knowledge Music Entrepreneur Virtual Private Network Digital Security Cameras HBO Using Data Files Skype Copiers Cables 5G Managing Stress Quick Tip Chromecast Data loss Shortcut Telecommuting Leadership Smartwatch Troubleshooting Cost Management Project Management Ergonomics Nanotechnology Outlook Colocation Start Menu Cameras Development Uninterrupted Power Supply Cortana OLED Social Networking PCI DSS Digital Signature Screen Mirroring Virtual Machine Loyalty Fiber Optics Employee Books Warranty 2FA Monitor Frequently Asked Questions HVAC Mobile Messaging Google Apps Windows 10s Cabling Running Cable Memory Policy Analysis Cast Hypervisor Trend Micro Streaming Media webinar Emergency Administrator Dark mode Reputation Devices Tip of the week Enterprise Content Management Professional Services Printer Server SMS Tech Support Public Cloud Default App Employer Employee Relationship Content Techology MSP Procedure Laptop Accountants Saving Time Assessment Windows Server 2008 Shopping Credit Cards Google Search Microchip dark theme Customers Thought Leadership Science Password Management Tools AI Password Manager IT Infrastructure Audiobook Television Bing FinTech Touchpad Multi-Factor Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code