On Sat, 2007-02-17 at 20:45 +0000, Dave Salt wrote:

> There are products that don't require jumping through hoops to enter a key, 
> and if you ever use one then maybe you'll feel differently about them. And 
> maybe you could then go back to the other vendors and say "why aren't your 
> keys as easy to use as this?".

I can understand vendors wanting to protect their IP, and generate all
the legitimate income they can.
The problem I see is the plethora of schemes in use.

Some products only get used by individual users, and key updates for
them tend to be flat-file and picked up the next time the product is
"called". Easy.
Except it's the user that gets the expiry message, and that has to
filter up to the correct (contracts) team who have to verify/authorise
payment, and may even get the new key. Then it needs to filter back to
some-one who can do the update.
This may be a customer problem, but it's also a vendor problem if they
get dropped because all the agro isn't worth the effort.

That's the *easy* case - it's all downhill from there.

- License STCs that need to be bounced with every key update. In 24x7
production environments ???. Do these people have any idea what that
takes to get okay'ed ???.
- stop all updates, switch to batch mode, re-cycle. Huh ??? See comment
above.
- unpack the XMIT'd load module, copy to running system(s) ...

I have one customer that I do all of the above (and more) for.
Telling the customer to swap out these products is not an option.

Shane ...

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to