In <[EMAIL PROTECTED]>, on 06/09/2005
   at 10:55 AM, Mark Zelden <[EMAIL PROTECTED]> said:

>That is nice for us users. But eventually someone will probably want
>CPU checking after they realize you've lost hundreds of thousands of
>dollars due to illegal usage of your product(s).

One lawsuit could cost more than all of the lost sales to pirates, as
could getting dropped by GSA. It is important that the measures the
vendors take to prevent unauthorized use do not prevent authorized
use. Where keys are involved, it is imperative that the vendors
provide news keys within the time frame promised in the contract.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to