- Windows 10 for Enterprise Administrators
- Jeff Stokes Manuel Singer Richard Diver
- 367字
- 2021-07-02 18:20:10
Upgrade expectations
Historically, when Windows upgraded, it carried all its baggage with it from the previous install (for better or for worse). Windows 10, however, seems to have deviated from this. Now if an application is deemed incompatible with the build being upgraded to, the application will simply not be present in the post-upgrade operating system. Windows should warn the user of this prior to upgrade and, if ignored, report this in a report file at C:\Windows\Panther named miglog.xml that the application was not migrated forward.
When first faced with this news, it is logical to assume that this is a complete disaster and poor choice. However, consider the upgrade process as a guardian of sorts. After the upgrade, Microsoft would like you to be able to log in to the system and actually use it to do work. If an application is going to break the installation, why migrate it? Also note that I did not state the data would not be migrated. No, it is kept (if it is stored appropriately) in the user profile.
This makes the maneuvering of application compatibility between the OS and third-party software both problematic and somewhat pragmatic: problematic in that a slow software developer of a key enterprise application can demonstrably keep an upgrade from moving forward without significant application shims or other tricks, pragmatic because either the software works and therefore is migrated during the upgrade process, or it doesn't work and won't be there to create a fuss later on for the user.
It is also worth noting that some older applications used to get away with hiding settings (or even data in the form of binary blobs, and so on) in the registry. This practice was never really a good one to follow and now it comes with a penalty. Areas of the registry managed by the OS tend to not keep custom key entries when the OS install is upgraded. Generally speaking, there is no guarantee that the oddball registry hacks from legacy or internal applications are going to migrate for you if they are in registry areas generally reserved for the operating system as a general rule. Your mileage may vary.
- 國際大學(xué)生程序設(shè)計(jì)競賽中山大學(xué)內(nèi)部選拔真題解(二)
- IBM Cognos TM1 Developer's Certification guide
- 大數(shù)據(jù)時(shí)代的企業(yè)升級(jí)之道(全3冊(cè))
- 黑莓(BlackBerry)開發(fā)從入門到精通
- Raspberry Pi Blueprints
- Flink入門與實(shí)戰(zhàn)
- Java Web動(dòng)態(tài)網(wǎng)站開發(fā)(第2版·微課版)
- 用Go語言自制編譯器
- Eclipse開發(fā)(學(xué)習(xí)筆記)
- 少年小魚的魔法之旅:神奇的Python
- C#程序設(shè)計(jì)基礎(chǔ)與實(shí)踐
- Python AI游戲編程入門:基于Pygame和PyTorch
- 微信小程序開發(fā)圖解案例教程:附精講視頻(第3版)
- Selenium WebDriver自動(dòng)化測試完全指南
- Skill Up:A Software Developer's Guide to Life and Career