Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Time Is Up for SQL Server 2008 and 2008 R2

Time Is Up for SQL Server 2008 and 2008 R2

An older version of Microsoft’s popular database software SQL Server 2008 and SQL Server 2008 R2 is losing support on July 9. If you haven’t updated away from the software, your organization’s IT is staring down a few very drastic problems. Today, we’ll go into your options with so little time left before the software’s support ends.

What is SQL Server?

SQL server is what is called a relational database management system (RDMS). It is used to manage the databases you use for your business. The applications your staff depends on for productivity typically need access to a database of available data. This data, typically stored in a database is defined within the database but is only available through a RDMS program. There are several types of RDMS servers on the market for all different types of uses. SQL Server has been updated numerous times in the 11 years since SQL Server 2008 was introduced and the nine since 2008 R2 launched, with all types of additions for new dataflows and cloud resources.

What Can You Do?

Microsoft suggests that each organization selects the modernization target that suits their needs, but with so little time left before SQL Server 2008 and 2008 R2 lose support, it may be difficult to sufficiently modernize before the deadline. One option that has been made clear by Microsoft is that companies that don’t want to (or can’t) move to a new version of the RDMS before the end of life date, will support the software for an additional three years if the server is virtualized into an Azure environment.

By migrating your SQL Server 2008 to the cloud (in Azure), Microsoft will continue to support your software through July 2022. This extended support gives organizations time to come up with a viable plan without having to move forward with unsupported software that could present a whole litany of security problems.

If you are staring at the July 9th deadline in the face with nowhere to turn, or you would like to know more about what options are available for RDMS hosting, call the IT professionals at Voyage Technology today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 15 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Email Workplace Tips Google Computer Phishing Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money AI Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Compliance Gadgets Covid-19 Cloud Computing Training Outsourced IT Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Mobile Device Management Chrome Tip of the week Budget Gmail WiFi Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Password Conferencing Managed IT Services How To BDR Computing Physical Security HIPAA Information Technology Hacker Applications Avoiding Downtime Office 365 Marketing Access Control Augmented Reality Help Desk Healthcare Storage Retail Bring Your Own Device Big Data Operating System Computers Risk Management Router Virtual Private Network 2FA Website Health Analytics Office Tips Monitoring Document Management Firewall Free Resource Project Management Managed IT Service Scam The Internet of Things Windows 7 Telephone Data loss Microsoft 365 Social Cooperation Going Green Solutions Patch Management Save Money Remote Monitoring Vulnerability Cybercrime End of Support Customer Service Vendor Management Windows 11 Display Printer Paperless Office Excel Infrastructure Remote Workers Money Machine Learning Smart Technology Humor iPhone Saving Time Sports Vulnerabilities Mouse Safety Maintenance Antivirus Data Privacy Images 101 Downloads Administration Multi-Factor Authentication Mobility Licensing Entertainment Employees Settings Robot Printing Customer Relationship Management Integration Wireless Telephone System Content Filtering Cost Management YouTube IT Management Hacking Cryptocurrency VPN Holidays Presentation Meetings Data Storage Wireless Technology Computer Repair Video Conferencing Virtual Desktop LiFi Managed Services Provider User Tip Modem Supply Chain Data storage Virtual Machines Processor Professional Services Mobile Security Outlook Word Electronic Medical Records Mirgation Paperless SharePoint Net Neutrality SQL Server History Refrigeration Nanotechnology Co-managed IT Financial Data Technology Care Smartwatch Hacks Lenovo IT Public Speaking Scary Stories Addiction Writing Language Fun Virtual Reality Chatbots Business Communications Procurement Lithium-ion battery Azure Management Deep Learning Server Management Cyber security Private Cloud Tech Entrepreneur Screen Reader Distributed Denial of Service Scams Telework Hybrid Work CES Superfish Communitications Identity Theft Service Level Agreement Computing Infrastructure Twitter Identity Human Resources Supply Chain Management Education Undo Bookmark Error Term Smart Tech Cables FinTech Alerts Mobile Computing IT Assessment Download Social Engineering Search Remote Computing Google Apps Flexibility Value Best Practice Browsers Connectivity Break Fix IT Maintenance Organization Business Intelligence Digital Security Cameras Smart Devices Buisness Tablet Upload Application Social Network Alert Multi-Factor Security Shortcuts Legal Remote Working IT solutions Memory Business Growth Managed IT Data Breach File Sharing Google Play IoT Dark Data Dark Web Ransmoware Vendors Videos Electronic Health Records IBM Trends How To Customer Resource management Cortana Notifications Regulations Google Calendar Be Proactive Wasting Time Alt Codes Trend Micro Data Analysis Travel Security Cameras Star Wars Microsoft Excel Workforce Staff Threats Techology Software as a Service Downtime Google Maps Gamification Managing Costs Social Networking Legislation Workplace Strategies Hosted Solution Typing eCommerce Competition Fileless Malware Unified Threat Management SSID Meta Wearable Technology Amazon Unified Threat Management Surveillance Virtual Assistant Content Virtual Machine Health IT Knowledge Motherboard Comparison Google Drive Reviews Directions Medical IT Assessment Network Congestion Permissions Outsource IT Environment Media User Error Development Transportation User 5G Unified Communications Hypervisor Experience Specifications Google Docs Shopping Bitcoin Optimization Microchip Running Cable Point of Sale PowerPoint Internet Exlporer Fraud Small Businesses Displays Google Wallet IP Address Employer/Employee Relationships Username Network Management Tech Support Navigation Black Friday PCI DSS Gig Economy Windows 8 Laptop Database Monitors Outsourcing IT Technicians Drones Internet Service Provider Teamwork Recovery Hard Drives Proxy Server Websites Evernote Cookies Cyber Monday Workplace Regulations Compliance Memes Domains Halloween Tactics Hotspot Hiring/Firing

Blog Archive