I have recently been investigating converting Windows XP into a virtual machine using VMware's free products v Center Converter Standalone and VMware Player and have been thoroughly impressed with both the process and the results.
Using the v Center Converter, I converted a live Windows XP system into a set of virtual machine files.
However, the technology does exist for taking a physical Windows XP system and converting it into a virtual machine.
In fact, there are products from Microsoft and other mainstream vendors that will allow you to perform such an operation with relative ease.
In a recent tip (Accessing the Windows File System from SQL Server) options were outlined to capture files from a specific directory into a temporary table or table variable for additional processing.
A similar file operations task that is needed in particular T-SQL code is to validate a specific file exists or not.
NOTE1: Module descriptions are provided by the module vendors and have not been verified for accuracy by the CMVP. Additionally, the descriptions may not necessarily reflect the capabilities of the modules when operated in the FIPS-Approved mode. #4318 and #4319); CKG (vendor affirmed); CVL (Certs. #4149, key wrapping; key establishment methodology provides 128 bits of encryption strength)Multi-Chip Stand Alone"The Lenel On Guard Access Control Cryptographic Module's primary purpose is to provide secure communications with external access control devices. #4090, #4092, #4095 and #4097); CKG (vendor affirmed); CVL (Certs. #1313, key wrapping; key establishment methodology provides 112 bits of encryption strength)Multi-chip standalone"Check Point VPN-1 Security Gateway allows enterprises and managed service providers to provide firewall, VPN, and intrusion prevention functionality on a single hardware platform." CAST 40; CAST 128; HMAC-MD5; MD5; DES; AES-CMAC (non-compliant); Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 or 150 bits of encryption strength); Triple-DES (Cert. The Hi PKI Saf Guard 1200 HSM provides secure identity-based authentication using smart cards and data encryption using FIPS approved Triple-DES and AES encryption." AES (non-compliant); AES (Cert. All key materials are maintained exclusively within the confines of the hardware. #1482, key wrapping)Multi-chip standalone"The Harris AES Software Load Module is a single software component which provides cryptographic services directly to a Digital Signal Processor (DSP) application on Harris terminals." AES (Cert. The module delivers core cryptographic functions to mobile platforms and features robust algorithm support, including Suite B algorithms. ESKM supports high availability with automatic multi-site clustering, replication, and failover."(Validated when tamper evident labels are installed as indicated in the Security Policy and when operated in FIPS mode.
I then copied those files over to a Windows 8 system and used VMware Player to run a fully functional Windows XP virtual machine.
In this article, I'll show you how to use these VMware products to convert your existing Windows XP system into a virtual machine and then run it in Windows 8.
Unfortunately, xp_fileexist is not a documented extended stored procedure in SQL Server Books Online.
As such, be aware that the functionality may change over time, although to the best of my knowledge this extended stored procedure has maintained its functionality between SQL Server 20.