http://bukhantsov.org/2011/08/how-to-determine-businessobjects-service-pack-and-fix-pack/
The table below is helpful.
Reference
BOE XI 3.x
12.0.0.y
|
BOE XI 3.0 |
12.0.x.y
|
BOE XI 3.0 FPx
|
12.1.0.y
|
BOE XI 3.1 |
12.1.x.y
|
BOE XI 3.1 FP1.x
|
12.2.0.y
|
BOE XI 3.1 SP2 |
12.2.x.y
|
BOE XI 3.1 SP2 FP2.x
|
12.3.0.y
|
BOE XI 3.1 SP3 |
12.3.x.y
|
BOE XI 3.1 SP3 FP3.x
|
BOE XI R2
11.5.0.313 |
BO XIR2 RTM |
11.5.3.417 |
BO XIR2 + SP1 |
11.5.7.608 |
BO XIR2 + SP1 + MHF1 |
11.5.7.811 |
BO XIR2 + SP1 + MHF1 + CHF16 |
11.5.7.852 |
BO XIR2 + SP1 + MHF1 + CHF17 |
11.5.7.1048 |
BO XIR2 + SP1 + MHF1 + CHF20 |
11.5.8.826 |
BO XIR2 + SP2 |
11.5.8.826 |
BO XIR2 + SP2 + FP2.1 |
11.5.8.939 |
BO XIR2 + SP2 + FP2.2 |
11.5.8.963 |
BO XIR2 + SP2 + FP2.3 |
11.5.8.998 |
BO XIR2 + SP2 + FP2.4 |
11.5.8.1030 |
BO XIR2 + SP2 + FP2.5 |
11.5.8.1061 |
BO XIR2 + SP2 + FP2.6 |
11.5.8.1111 |
BO XIR2 + SP2 + FP2.7 |
11.5.8.1187 |
BO XIR2 + SP2 + FP2.8 |
11.5.8.1237 |
BO XIR2 + SP2 + FP2.9 |
11.5.9.1076 |
BO XIR2 + SP3 |
11.5.9.1101 |
BO XIR2 + SP3 + FP3.1 |
11.5.9.1138 |
BO XIR2 + SP3 + FP3.2 |
11.5.9.1176 |
BO XIR2 + SP3 + FP3.3 |
11.5.9.1202 |
BO XIR2 + SP3 + FP3.4 |
11.5.9.1227 |
BO XIR2 + SP3 + FP3.5 |
11.5.9.1265 |
BO XIR2 + SP3 + FP3.6 |
11.5.9.1330 |
BO XIR2 + SP3 + FP3.7 |
11.5.9.1378 |
BO XIR2 + SP3 + FP3.8 |
11.5.9.1449 |
BO XIR2 + SP3 + FP3.9 |
11.5.10.1263 |
BO XIR2 + SP4 |
11.5.10.1298 |
BO XIR2 + SP4 + FP4.1 |
11.5.10.1332 |
BO XIR2 + SP4 + FP4.2 |
11.5.10.1358 |
BO XIR2 + SP4 + FP4.3 |
11.5.10.1404 |
BO XIR2 + SP4 + FP4.4 |
11.5.10.1426 |
BO XIR2 + SP4 + FP4.5 |
11.5.10.1460 |
BO XIR2 + SP4 + FP4.6 |
11.5.10.1491 |
BO XIR2 + SP4 + FP4.7 |
11.5.10.1554 |
BO XIR2 + SP4 + FP4.8 |
11.5.10.1619 |
BO XIR2 + SP4 + FP4.9 |
11.5.10.1681 |
BO XIR2 + SP4 + FP4.10 |
11.5.10.1765 |
BO XIR2 + SP4 + FP4.11 |
11.5.10.1854 |
BO XIR2 + SP4 + FP4.12 |
11.5.11.1470 |
BO XIR2 + SP5 |
11.5.11.1545 |
BO XIR2 + SP5 + FP 5.1 |
11.5.11.1578 |
BO XIR2 + SP5 + FP 5.2 |
11.5.11.1610 |
BO XIR2 + SP5 + FP 5.3 |
11.5.11.1639 |
BO XIR2 + SP5 + FP 5.4 |
11.5.11.1673 |
BO XIR2 + SP5 + FP 5.5 |
11.5.11.1732 |
BO XIR2 + SP5 + FP 5.6 |
11.5.11.1797 |
BO XIR2 + SP5 + FP 5.7 |
11.5.11.1856 |
BO XIR2 + SP5 + FP 5.8 |
11.5.12.1838 |
BO XIR2 + SP6 |
分享到:
相关推荐
How to Determine the Type of Supervisor Module
Understand how to formulate problems, think creatively about solutions, and write programs clearly and accurately Determine which development techniques work best for you, and practice the important ...
discovering how to turn colloquial expression and vague descriptions of a business problem first into qualitative models and then into well-defined quantitative models (using data mining) that can ...
Unable to determine default Pin/Port configuration! CCS 3.3烦人的提示,最终也没找到原因,太烦了,所以用APIHOOK,把它搞掉了 附带源程序 有需要的联系gongxd $ 126.com,
How to determine how many trees to use in a random forest Just where does the "randomness" come from Out of Bag Errors & Cross Validation - how good of a fit did the machine learning algorithm make...
review of hydrologic and hydraulic methods to determine instream environmental flow,Onikpo Claude Randyx Martin,,To provide to their lives, humans need water. So it is used for irrigation purposes,...
We will then examine Heat, the OpenStack Orchestration Service, where you will learn how to trace errors, determine their root cause, and effectively correct the issue. Finally, you will get to know...
The book tackles the process of optimization by first describing how to determine where a game is limited and then providing detailed solutions and examples to solving this limitation. All the ...
Introduction 2 The parallel computing memory architecture 3 Memory organization 6 ...How to determine the current thread 37 How to use a thread in a subclass 39 Thread synchronization with Lock and RLock
Determine if you have performance problems and how to diagnose them Use common performance tools such as Keynote and Gomez Explore web performance challenges outside of the US Dives into mobile web ...
TF-IDF 简介。浅显易懂,值得学习。
Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a...
The main purpose of this presentation though is to show the reader how to...and how to determine if they are satisfied what to do when the assumptions are not satisfied sometimes we may still use linear ...
This chapter discusses how to determine what hardware is available and illustrates how to deal with the major sensors on iOS devices: the accelerometer, magnetometer, camera, and GPS. Chapter 10, ...
But it is also important to protect the database objects and data from either accidental or intentional damage. Sharon discovers that security is complex and requires careful planning. outcomes • ...
Covers how to trigger and disable the Knowledge Consistency Checker (KCC), how to query metadata, force replication, and determine what changes have yet to replicate between domain controllers. ...
You’ll learn how to determine what kind of tool is appropriate for which purpose, and how certain tools can be combined to form the foundation of a good application architecture. You’ll learn how ...
用手机识别用户的交通方式,如跑步,步行,骑车,开车等等
Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you’ll gain the foundations of ...