Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

41 Microsoft Software Titles Reached Their End of Extend Support or End of Life - In April Alone!

41 Microsoft Software Titles Reached Their End of Extend Support or End of Life - In April Alone!

You don’t need us to tell you that Microsoft has an extensive library of software products aimed at all kinds of businesses. But, of course, nothing good can last forever, and old solutions eventually give way to more versatile or efficient versions. When this happens, Microsoft stops supporting older software in order to provide better features and experiences to users of more recent versions.

After it reaches a certain age, Microsoft software gradually moves from a mainstream support period to an extended support period. The main difference is that Microsoft continues to provide security patches and updates, but no longer takes requests for new features or non-security fixes. Once a software reaches its end of life, however, Microsoft ceases to provide security patches and updates, putting anyone still using this software at risk. Therefore, as a business owner, it’s your responsibility to know when your software expires, and how to upgrade it to a more recent version.

The following Microsoft products reached their end of support date on April 12th, 2016. Be sure to check with your IT department or the friendly technicians at Voyage Technology to see if you’re putting your infrastructure at risk through their continued use.

From Mainstream Support to Extended Support

  • Microsoft Enterprise Desktop Virtualization 2.0
  • Microsoft Fable III for PC
  • Microsoft Lync 2010
  • Microsoft Lync 2010 Attendant
  • Microsoft Lync 2010 Attendee
  • Microsoft Lync 2010 Group Chat
  • Microsoft Lync Server 2010 Enterprise Edition
  • Microsoft Lync Server 2010 Group Chat Software Development Kit
  • Microsoft Lync Server 2010 Software Development Kit
  • Microsoft Lync Server 2010 Standard Edition
  • Microsoft Math 4.0

From Extended Support to End of Life

  • Microsoft .NET Framework 2.0
  • Microsoft Customer Care Framework
  • Microsoft Customer Care Framework 2005
  • Microsoft Dynamics CRM 3.0
  • Microsoft SQL Server 2005 Compact Edition
  • Microsoft SQL Server 2005 Developer Edition
  • Microsoft SQL Server 2005 Enterprise Edition
  • Microsoft SQL Server 2005 Express Edition with Advanced Services
  • Microsoft SQL Server 2005 for Embedded Systems
  • Microsoft SQL Server 2005 Standard Edition
  • Microsoft SQL Server 2005 Standard Edition for Itanium-based Systems
  • Microsoft SQL Server 2005 Standard X64 Edition
  • Microsoft SQL Server 2005 Workgroup Edition
  • Microsoft System Center Data Protection Manager 2006
  • Microsoft Visual Basic 2005 Express Edition
  • Microsoft Visual C# 2005 Express Edition
  • Microsoft Visual C++ 2005 Express Edition
  • Microsoft Visual J# 2005 Express Edition
  • Microsoft Visual Studio 2005 Professional Edition
  • Microsoft Visual Studio 2005 Standard Edition
  • Microsoft Visual Studio 2005 Standard Edition academic license
  • Microsoft Visual Studio 2005 Team Edition for Software Architects
  • Microsoft Visual Studio 2005 Team Edition for Software Developers
  • Microsoft Visual Studio 2005 Team Edition for Software Testers
  • Microsoft Visual Studio 2005 Team Suite
  • Microsoft Visual Studio 2005 Team Test Load Agent
  • Microsoft Visual Studio 2005 Tools for the Microsoft Office System
  • Microsoft Visual Web Developer 2005 Express Edition
  • Windows Embedded for Point of Service
  • Service Pack 3 for Windows Embedded for Point of Service

Your organization can’t afford to let unsupported software run on your workstations. If a hacker were to exploit a known (or unknown) vulnerability in any of these programs, your troubles could just be starting. If you suspect that any of your mission-critical software solutions are approaching their end of life, or have already expired, don’t waste any more time. To learn more, contact Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 09 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Workplace Tips Privacy Google Email Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Saving Money Passwords Quick Tips Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Holiday Artificial Intelligence Automation Facebook Gadgets Compliance Cloud Computing Covid-19 Training Outsourced IT Server Remote Work Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Wi-Fi Blockchain Vendor Windows 10 Bandwidth Business Technology Managed Services Apps Data Security Two-factor Authentication Mobile Office Voice over Internet Protocol Apple App Employer-Employee Relationship Networking BYOD Mobile Device Management Chrome Gmail Budget Tip of the week WiFi Conferencing Managed IT Services How To BDR Computing Hacker Information Technology Avoiding Downtime HIPAA Marketing Physical Security Applications Office 365 Access Control Password Retail Big Data Healthcare Operating System Computers 2FA Risk Management Router Website Virtual Private Network Analytics Office Tips Augmented Reality Health Help Desk Storage Bring Your Own Device Managed IT Service Remote Workers Social Telephone Scam Data loss Going Green Cooperation Free Resource Project Management Windows 11 Windows 7 Customer Service Cybercrime Patch Management Save Money Microsoft 365 Remote Monitoring Excel End of Support Vulnerability Vendor Management Solutions Display Printer Firewall Paperless Office Infrastructure Monitoring Document Management The Internet of Things Administration Maintenance Downloads Antivirus iPhone Licensing Entertainment Vulnerabilities Customer Relationship Management Settings Wireless Printing Images 101 Content Filtering Hacking Multi-Factor Authentication Robot Mobility Presentation Telephone System YouTube Supply Chain Cost Management Cryptocurrency Wireless Technology IT Management Virtual Desktop Meetings VPN Employees Data storage LiFi Integration Word Modem User Tip Outlook Processor Computer Repair Mobile Security Holidays Money Humor Data Privacy Data Storage Smart Technology Safety Video Conferencing Sports Machine Learning Managed Services Provider Virtual Machines Professional Services Mouse Saving Time Evernote Mobile Computing Vendors Server Management Regulations Compliance Private Cloud Identity Be Proactive Identity Theft Smart Tech Memes Search Superfish Bookmark Application Best Practice Workforce Download Net Neutrality Twitter Alerts SQL Server Threats Financial Data Buisness Error History Browsers Smartwatch IT solutions Workplace Strategies Connectivity IT Social Engineering Break Fix IBM Legal Business Growth Meta Upload Procurement Remote Computing Azure Cyber security Multi-Factor Security Tech Amazon Social Network Telework CES Tablet IoT Communitications Cortana Dark Web Alt Codes Outsource IT Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Competition Environment Managed IT Customer Resource management FinTech Downtime Media Data Analysis Hosted Solution Star Wars IT Assessment How To Microsoft Excel Typing Small Businesses Gamification Flexibility Notifications Staff Value Travel Social Networking Legislation Displays Organization Google Drive Techology Fileless Malware Digital Security Cameras User Google Maps Smart Devices Knowledge Outsourcing Content Remote Working Wearable Technology Memory Unified Threat Management Motherboard Data Breach 5G Comparison Google Play Health IT IP Address Google Docs Unified Threat Management Directions Videos Unified Communications Workplace Assessment Electronic Health Records Experience Permissions Bitcoin Hiring/Firing Running Cable Wasting Time Paperless Trend Micro Network Congestion Specifications Security Cameras Google Wallet User Error Microchip Recovery Co-managed IT Internet Exlporer Software as a Service Fraud Hard Drives Windows 8 Technology Care Username Laptop Managing Costs Business Communications Point of Sale eCommerce Black Friday SSID Domains Drones Scams Database Surveillance Virtual Assistant Refrigeration Hybrid Work Network Management Halloween Tech Support IT Technicians Virtual Machine Human Resources Cookies Monitors Cyber Monday Medical IT Public Speaking Proxy Server Reviews Lithium-ion battery Cables Tactics Development Hotspot Transportation Hacks Entrepreneur Scary Stories Websites Mirgation Hypervisor Google Apps Nanotechnology Optimization Fun PowerPoint Shopping SharePoint Deep Learning IT Maintenance Addiction Electronic Medical Records Language Employer/Employee Relationships Navigation Undo Business Intelligence Management PCI DSS Chatbots Education Shortcuts Screen Reader Writing Distributed Denial of Service Lenovo Gig Economy Ransmoware Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork

Blog Archive