Solved

SQL Server 2008 Service Pack 1 Caveats

Posted on 2009-05-06
3
235 Views
Last Modified: 2012-05-06
I am not the DBA but I have been tasked with planning and installing the SP1 deployment. Included in this is a requirement to perform a risk analysis. Does anybody know a good reference for these tasks, ie requirements, caveats, etc.

Thanks.

Carl
0
Comment
Question by:carlnys
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Accepted Solution

by:
mfreuden earned 250 total points
ID: 24321049
The best thing to do is review the release notes:

http://go.microsoft.com/fwlink/?LinkId=147331
0
 

Author Comment

by:carlnys
ID: 24321113
That mentions it is for the express products.... Stupid question time is there a service pack 1 for enterprise? Are they the same thing?

Carl
0
 
LVL 57

Assisted Solution

by:Raja Jegan R
Raja Jegan R earned 250 total points
ID: 24321185
SP1 applies to all editions of SQL Server 2008.

http://www.microsoft.com/downloads/details.aspx?FamilyID=66ab3dbb-bf3e-4f46-9559-ccc6a4f9dc19&displaylang=en

This might help you out in some of your risk analysis

http://support.microsoft.com/kb/956139
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hi all, It is important and often overlooked to understand “Database properties”. Often we see questions about "log files" or "where is the database" and one of the easiest ways to get general information about your database is to use “Database p…
In this article I will describe the Backup & Restore method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question