Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

41 Microsoft Software Titles Reached Their End of Extend Support or End of Life - In April Alone!

41 Microsoft Software Titles Reached Their End of Extend Support or End of Life - In April Alone!

You don’t need us to tell you that Microsoft has an extensive library of software products aimed at all kinds of businesses. But, of course, nothing good can last forever, and old solutions eventually give way to more versatile or efficient versions. When this happens, Microsoft stops supporting older software in order to provide better features and experiences to users of more recent versions.

After it reaches a certain age, Microsoft software gradually moves from a mainstream support period to an extended support period. The main difference is that Microsoft continues to provide security patches and updates, but no longer takes requests for new features or non-security fixes. Once a software reaches its end of life, however, Microsoft ceases to provide security patches and updates, putting anyone still using this software at risk. Therefore, as a business owner, it’s your responsibility to know when your software expires, and how to upgrade it to a more recent version.

The following Microsoft products reached their end of support date on April 12th, 2016. Be sure to check with your IT department or the friendly technicians at Voyage Technology to see if you’re putting your infrastructure at risk through their continued use.

From Mainstream Support to Extended Support

  • Microsoft Enterprise Desktop Virtualization 2.0
  • Microsoft Fable III for PC
  • Microsoft Lync 2010
  • Microsoft Lync 2010 Attendant
  • Microsoft Lync 2010 Attendee
  • Microsoft Lync 2010 Group Chat
  • Microsoft Lync Server 2010 Enterprise Edition
  • Microsoft Lync Server 2010 Group Chat Software Development Kit
  • Microsoft Lync Server 2010 Software Development Kit
  • Microsoft Lync Server 2010 Standard Edition
  • Microsoft Math 4.0

From Extended Support to End of Life

  • Microsoft .NET Framework 2.0
  • Microsoft Customer Care Framework
  • Microsoft Customer Care Framework 2005
  • Microsoft Dynamics CRM 3.0
  • Microsoft SQL Server 2005 Compact Edition
  • Microsoft SQL Server 2005 Developer Edition
  • Microsoft SQL Server 2005 Enterprise Edition
  • Microsoft SQL Server 2005 Express Edition with Advanced Services
  • Microsoft SQL Server 2005 for Embedded Systems
  • Microsoft SQL Server 2005 Standard Edition
  • Microsoft SQL Server 2005 Standard Edition for Itanium-based Systems
  • Microsoft SQL Server 2005 Standard X64 Edition
  • Microsoft SQL Server 2005 Workgroup Edition
  • Microsoft System Center Data Protection Manager 2006
  • Microsoft Visual Basic 2005 Express Edition
  • Microsoft Visual C# 2005 Express Edition
  • Microsoft Visual C++ 2005 Express Edition
  • Microsoft Visual J# 2005 Express Edition
  • Microsoft Visual Studio 2005 Professional Edition
  • Microsoft Visual Studio 2005 Standard Edition
  • Microsoft Visual Studio 2005 Standard Edition academic license
  • Microsoft Visual Studio 2005 Team Edition for Software Architects
  • Microsoft Visual Studio 2005 Team Edition for Software Developers
  • Microsoft Visual Studio 2005 Team Edition for Software Testers
  • Microsoft Visual Studio 2005 Team Suite
  • Microsoft Visual Studio 2005 Team Test Load Agent
  • Microsoft Visual Studio 2005 Tools for the Microsoft Office System
  • Microsoft Visual Web Developer 2005 Express Edition
  • Windows Embedded for Point of Service
  • Service Pack 3 for Windows Embedded for Point of Service

Your organization can’t afford to let unsupported software run on your workstations. If a hacker were to exploit a known (or unknown) vulnerability in any of these programs, your troubles could just be starting. If you suspect that any of your mission-critical software solutions are approaching their end of life, or have already expired, don’t waste any more time. To learn more, contact Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Computer Phishing Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Wi-Fi Business Technology Windows 10 Blockchain Bandwidth Vendor Data Security Apps Mobile Office Two-factor Authentication Managed Services Apple Employer-Employee Relationship BYOD App Tip of the week Mobile Device Management Gmail Voice over Internet Protocol Chrome WiFi Networking Budget How To Applications BDR Physical Security Hacker Conferencing Avoiding Downtime Computing Access Control Marketing Information Technology Office 365 HIPAA Managed IT Services Router Storage Password Big Data Bring Your Own Device Help Desk Computers Virtual Private Network Operating System Health 2FA Website Risk Management Retail Analytics Office Tips Augmented Reality Healthcare Social Free Resource Project Management Windows 7 Patch Management Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support Vendor Management Monitoring Solutions Going Green Customer Service Display Printer Cybercrime Managed IT Service Windows 11 Paperless Office Infrastructure Telephone Excel Cooperation Document Management Firewall Remote Workers Scam Data loss The Internet of Things Data Privacy Vulnerabilities Sports Mouse User Tip Modem Processor Robot Mobile Security Images 101 Administration Mobility Multi-Factor Authentication Customer Relationship Management Smart Technology IT Management VPN Meetings Hacking Saving Time Presentation Settings Employees Wireless Integration Printing Content Filtering Computer Repair Wireless Technology YouTube Downloads Holidays Cryptocurrency Supply Chain Licensing Data Storage Machine Learning Entertainment Word Video Conferencing Virtual Desktop LiFi Managed Services Provider Data storage Virtual Machines Professional Services Telephone System Maintenance Outlook Cost Management Antivirus Money Safety Humor iPhone Tech Deep Learning Specifications Telework Cyber security Alert Communitications Google Apps File Sharing Microchip Dark Data Internet Exlporer Fraud CES Managed IT Application Supply Chain Management IT Maintenance How To Username Education Term Black Friday FinTech Business Intelligence Notifications IT Assessment Shortcuts Travel Mobile Computing Database IBM IT Technicians Techology Search Flexibility Ransmoware Google Maps Value Proxy Server Best Practice Cookies Cyber Monday Organization Vendors Smart Devices Be Proactive Unified Threat Management Tactics Buisness Hotspot Digital Security Cameras IT solutions Mirgation Unified Threat Management Remote Working Workforce Memory Legal Google Play Business Growth Nanotechnology Competition Threats Data Breach Electronic Health Records Workplace Strategies Network Congestion Addiction Language Videos Chatbots User Error Cortana Meta Wasting Time Management Security Cameras Alt Codes Screen Reader Distributed Denial of Service Amazon Trend Micro Software as a Service Point of Sale Service Level Agreement Downtime Computing Infrastructure User Hosted Solution Identity Outsource IT Managing Costs Media Tech Support Bookmark SSID Typing Smart Tech Environment Network Management eCommerce Surveillance Virtual Assistant Monitors Download IP Address Alerts Knowledge Small Businesses Virtual Machine Google Drive Websites Browsers Medical IT Connectivity Break Fix Reviews Displays Recovery 5G Development Transportation Upload Social Network Unified Communications Hard Drives SharePoint Experience Multi-Factor Security Outsourcing Hypervisor Electronic Medical Records Google Docs Optimization PowerPoint Bitcoin IoT Domains Running Cable Dark Web Shopping Lenovo Workplace Employer/Employee Relationships Writing Google Wallet Trends Customer Resource management Navigation Regulations Refrigeration Google Calendar PCI DSS Hiring/Firing Virtual Reality Paperless Private Cloud Data Analysis Windows 8 Star Wars Public Speaking Laptop Microsoft Excel Gig Economy Server Management Staff Superfish Internet Service Provider Co-managed IT Identity Theft Teamwork Drones Gamification Lithium-ion battery Evernote Social Networking Legislation Entrepreneur Regulations Compliance Technology Care Twitter Memes Business Communications Error Fileless Malware Halloween Wearable Technology Net Neutrality Scams SQL Server Social Engineering Content Health IT Motherboard Undo Comparison Financial Data Hybrid Work History Remote Computing IT Human Resources Directions Hacks Assessment Scary Stories Permissions Smartwatch Fun Procurement Cables Tablet Azure

Blog Archive