On Sun, 25 Feb 2007 16:50:04 -0600 "Joel C. Ewing" <[EMAIL PROTECTED]> wrote:

:>Binyamin Dissen wrote:
:>> On Sat, 24 Feb 2007 20:25:24 -0600 "Joel C. Ewing" <[EMAIL PROTECTED]> 
wrote:
 
:>> :>Particularly in the case of processor upgrades, or in DR, there is no 
:>> :>reliable way for us to verify that new keys from the vendors are correct 
:>> :>and correctly installed until we are running on the new processor.  If 
:>> :>they aren't and a hard failure results, there is a high likelihood that 
:>> :>this failure will be seen in some way by the end users, even if the 
:>> :>vendor key support is 24x7.
> 
:>> In the case of a processor upgrade: if you get a hard error during 
production
:>> due to a bad ISV key, your testing criteria are way too lax.

:>Really?  Explain how one tests a dynamic CPU upgrade consisting of IBM 
:>non-disruptively turning on one or more CP's on your only production 
:>processor complex. At least 75% of our upgrades are now of this nature. 

That causes a change in the CPU id?

Live and learn.

:>  Depending on what the vendor product is examining and how often it 
:>checks, it either sees an instantaneous change in production of the 
:>processor type at the time the new CP is enabled, or it sees that change 
:>when some vendor-specific future event (possibly the next IPL, POR, etc) 
:>occurs.  There is no way to reliably test the new keys in advance, even 
:>if the product allows "installing" the new keys in advance.  When 
:>changing to a completely new processor box, it is certainly desirable 
:>and generally possible to have an overlap and have the new machine as a 
:>test bed for new keys, but I can envision cases where there would be 
:>unavoidable constraints that would prevent that overlap (and have lived 
:>through some major push-pull scenarios with no overlap).
 
:>> In the case of DR: if you do test runs, you will be quite aware of this 
issue.
:>> If you never do test runs, refer to the "processor upgrade" above. If you do
:>> not test, this is not likely to be your only problem. Or a major one.

:>Vendors can always change their key validation logic with maintenance 
:>and release changes and our mix of ISV products drifts as well.

Always important to redo the DR test after significant changes (for some value
of "significant").

:>                                                                 Some 
:>products fail without new keys on a DR processor only when running 
:>without VM; others fail in all cases.  When we find a vendor product 
:>that has key validation problems at DR testing, the resolution for that 
:>product gets incorporated into our DR procedures.  That we have 
:>occasionally encountered new failures in the past during DR testing 
:>tells us there is always the potential for an unexpected failure at an 
:>actual DR.  DR testing reduces the exposure, but cannot eliminate it.

Granted.
 
:>> :>While I can understand the vendors concerns, my goal is to focus on our 
:>> :>own system reliability and the needs of our end users; and any hard 
:>> :>failures in ISV products are an enemy of that goal.
 
:>> First, work on what you can change - get your accounting people up to speed.
:>> Keep track of the ISV products and expirations, and follow up on them.

:>Our accounting people have never been a problem, neither have we had any 
:>significant problem tracking ISV product expirations.  The problem is 
:>that we do not work in a static environment. It has been contract 
:>negotiation and the reluctance of vendors to adapt reasonably to 
:>changing hardware/software environments that has been the greatest 
:>source of problems, especially when hardware upgrades are to support 
:>application growth that is unrelated to the vendor's product!

:>> Improve those test procedures.
:>See above.
 
:>> Am I a little harsh? Perhaps. 

:>A vendor only has to deal with the familiar idiosyncrasies of his own 
:>product's key management.  On the customer side we have to deal the 
:>unfamiliar and changeable idiosyncrasies of many vendor products.
 
:>> Yes, you would like to not have to worry about the ISV key, and the ISV 
would
:>> love not having to worry about collecting.
> 
:>> But you should be aware that there is a bit of a partnership here.

:>Granted.  Perhaps a vendor should cut much more slack with a company 
:>that has been a consistent paying customer for years by selectively 
:>making key management less onerous for such customers.

I am sure they do.

Do not vendors supply a means for customers to get an unrestricted full-use
temporary key (expires within a week - or less?) to handle the DR bumps in the
road?

--
Binyamin Dissen <[EMAIL PROTECTED]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to