The current discussion on license keys prompts this.  If an ISV doesn't use a 
key tied to a date and a machine serial number,  what other mechanism is there 
to insure there are no pilfered copies of the ISV's product running somewhere, 
and the ISV doesn't have a clue?  From a user's perspective, if the ISV is 
timely in his delivery of license keys, why is it a big deal?  I'm not asking 
this last question sarcastically, I'd like to know if there are issues with 
this that I'm not taking into account.

    --Dave

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to