The current discussion on license keys prompts this. If an ISV doesn't use a
key tied to a date and a machine serial number, what other mechanism is there
to insure there are no pilfered copies of the ISV's product running somewhere,
and the ISV doesn't have a clue? From a user's perspective, if the ISV is
timely in his delivery of license keys, why is it a big deal? I'm not asking
this last question sarcastically, I'd like to know if there are issues with
this that I'm not taking into account.
--Dave
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html