On Fri, Mar 28, 2014 at 9:06 AM, Joel C. Ewing <[email protected]> wrote: <snip>
> I seem to recall a case where the vendor wanted to change contract terms > at renewal in a way that was unacceptable to our corporate management > and it took several months of negotiations past the formal expiration of > license between our lawyers and theirs before a renewal agreement was > finally reached. We had been a customer for at least a decade, had > other products from the vendor, and it was clear it was in both party's > interest that some agreement would eventually be reached; but we lived > on temporary keys for several months. Any sort of automated validation > system would have to be flexible enough to allow for unusual cases like > this. > > -- Joel C. Ewing, Bentonville, AR [email protected] > > Yes. I forgot to mention "temp" keys and "DR" keys which, if would guess, would be valid on _any_ processor until a given date, encoded in the key. Any valid key results in execution without IP connection to the outside world. I also like a previous poster's mention that a key file can contain any number of keys and the program will run quietly so long as at least one checks as "valid". And, of course, stops checking keys once a valid keys is read. But all of this is just "if the software is key locked". Personally, I don't like such. But, then again, I am an FSF member. -- There is nothing more pleasant than traveling and meeting new people! Genghis Khan Maranatha! <>< John McKown ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
