Feeds

How to install a Vista upgrade on any PC

Unadvertised sale: Buy an upgrade, get a stand-alone version

High performance access to file storage

However, when I attempted to install the upgrade normally, it failed. It was not compatible with XP Professional - I assume because Vista Home Premium includes Media Centre, and can therefore be used as an update only for XP Media Centre edition. But note that the package failed to distinguish among XP editions. It did distinguish between 2000 editions, but it said flatly that I needed either the 2000 edition specified, or XP or Vista.

Nevertheless, when I attempted to upgrade my XP image, I was notified that it was impossible, and that my only options were to quit, or to do a clean install of Vista Home Premium, which would wipe out my XP image and all of my data with it.

Of course, I had to open the package to discover Microsoft's blunder. And that would make the software very difficult to return for exchange. So the idea of quitting was not terribly attractive. Neither was wiping my disk.

The Upgrade Advisor did recommend the Vista Business edition, but as I reported previously, the Upgrade Advisor is a joke. It couldn't detect half of my hardware, so I was hardly inclined to trust its software recommendations. And it never gave me the impression that I would experience an upgrade failure if I ignored its advice.

Microsoft has made a colossal mess of Vista upgrades with five separate editions that are each tied to specific previous editions of Windows, and very little in the way of guidance, except for a dysfunctional Upgrade Advisor. Few other companies would wager a product launch on a lame gimmick like that.

So when you think about it, the sensible thing would be to anticipate endless complaints from consumers stuck with the "wrong" update edition, and to try to placate them with the promise that if they would just part with all of their data, their installation problems can be solved.

It's a cheap thing to do, but it is in line with the company's overall attitude toward consumers. Hence the necessity of making every upgrade edition a stand-alone version, and the inevitable consequence that some bright empiricist will figure out how to force it to behave like one. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.