On Fri, Mar 28, 2014 at 9:06 AM, Joel C. Ewing <[email protected]> wrote:
 <snip>

> I seem to recall a case where the vendor wanted to change contract terms
> at renewal in a way that was unacceptable to our corporate management
> and it took several months of negotiations past the formal expiration of
> license between our lawyers and theirs before a renewal agreement was
> finally reached.  We had been a customer for at least a decade, had
> other products from the vendor, and it was clear it was in both party's
> interest that some agreement would eventually be reached; but we lived
> on temporary keys for several months.  Any sort of automated validation
> system would have to be flexible enough to allow for unusual cases like
> this.
>
> -- Joel C. Ewing, Bentonville, AR [email protected]
>
>
Yes. I forgot to mention "temp" keys and "DR" keys which, if would guess,
would be valid on _any_ processor until a given date, encoded in the key.
Any valid key results in execution without IP connection to the outside
world. I also like a previous poster's mention that a key file can contain
any number of keys and the program will run quietly so long as at least one
checks as "valid". And, of course, stops checking keys once a valid keys is
read.

But all of this is just "if the software is key locked". Personally, I
don't like such. But, then again, I am an FSF member.

-- 
There is nothing more pleasant than traveling and meeting new people!
Genghis Khan

Maranatha! <><
John McKown

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to