{"id":1818,"date":"2005-06-15T00:00:00","date_gmt":"2005-06-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/15\/windows-2000-still-running-on-half-of-corporate-pcs\/"},"modified":"2021-12-30T11:40:03","modified_gmt":"2021-12-30T11:40:03","slug":"windows-2000-still-running-on-half-of-corporate-pcs","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/15\/windows-2000-still-running-on-half-of-corporate-pcs\/","title":{"rendered":"Windows 2000 Still Running On Half Of Corporate PCs"},"content":{"rendered":"<p>Mainstream support for the now-aging operating system ends on June 30th, but many firms aren&#8217;t ready to move to XP.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Administrators and managers may not want to hear it, but Windows 2000 is reaching the end of its supported life.<\/p>\n<p>According to a report from AssetMetrix, Windows 2000 does still feature greatly in many enterprises.  Windows 2000 dropped only four percentage points, from 52 to 48 percent, in its popularity in corporate IT environments.<\/p>\n<p>Bigger companies seem more prone to keeping Windows 2000.  In the study, AssetMetrix found that businesses with fewer than 250 employees were more likely to be running Windows XP already.<\/p>\n<p>http:\/\/www.webpronews.com\/news\/ebusinessnews\/wpn-45-20050615Windows2000StillRunningOnHalfOfCorporatePCs.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1818","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1818"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1818\/revisions"}],"predecessor-version":[{"id":4305,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1818\/revisions\/4305"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}