This document discusses the benefits of migrating from software license certificates to activations. It outlines that activations provide more flexibility in managing the license lifecycle by allowing licenses to be canceled, returned, or upgraded at any time without needing a persistent connection to a license server. Activations also allow for more visibility into customer license usage through structured, auditable transactions. The document provides guidelines on when activations are most appropriate based on the frequency of license lifecycle events and compares activations to certificates. It also describes changes needed to applications, license servers, and operations servers to support activations.
Effective Strategies for Distributed TestingAnand Bagmar
Thoughts, experiences and case studies on how to convert Testing principles into practices. We focus on the practices of making testing effective on distributed teams by keeping things simple, yet effective.
http://testing.thoughtworks.com/events/effective-strategies-distributed-testing
“Specification by Example” is a set of process patterns that helps to validate the application for faster feedback and minimal documentation. With Specification by Example, teams write just enough documenta- tion to facilitate change effectively in short iterations or in flow-based development.
This presentation outlines the CBDI-SAE SOA Exception Management Framework that provides a structured approach to specifying exception conditions and dealing with them at run-time. It primarily considers exception management within Service-based solutions.
Effective Strategies for Distributed TestingAnand Bagmar
Thoughts, experiences and case studies on how to convert Testing principles into practices. We focus on the practices of making testing effective on distributed teams by keeping things simple, yet effective.
http://testing.thoughtworks.com/events/effective-strategies-distributed-testing
“Specification by Example” is a set of process patterns that helps to validate the application for faster feedback and minimal documentation. With Specification by Example, teams write just enough documenta- tion to facilitate change effectively in short iterations or in flow-based development.
This presentation outlines the CBDI-SAE SOA Exception Management Framework that provides a structured approach to specifying exception conditions and dealing with them at run-time. It primarily considers exception management within Service-based solutions.
Parasoft Concerto A complete ALM platform that ensures quality software can b...Engineering Software Lab
Parasoft Concerto is a complete software development management platform that ensures quality software can be produced consistently and efficiently–in any language.
By integrating policy-driven project management with Parasoft Test's quality lifecycle management as well as Parasoft Virtualize's dev/test environment management, Parasoft Concerto ensures predictable project outcomes while driving unprecedented levels of productivity and application quality.
This presentation was presented by Ken Deters of NACCO Material Handling and Roshan Pinto, Director Manufacturing Practice, Tavant Technologies at the Warranty Chain Management Conference 2013. This talks about a company's approach to choose a Warranty Solution apt for their business needs.
Whose View is it Anyway: Addressing Multiple Stakeholder Concernssferoz
Talk at Agile India 2012 Conference.
The presentation is about using Supportability Framework to transform stakeholder concerns relating to quality attributes such as modifiability, extensibility, deployability etc. into features and concrete user stories, and creating a roadmap that lets the system evolve across all its abilities, not just functionality.
Read the full narration at http://www.canopusconsulting.com/canopusarchives/?p=343
DfSS Webinar Part 2: Delivering better ROI on DFSS Projectsmjames1
Creating a systematic process for design is important for any business – whether it’s designing a new product, creating a new process or leading a new service proposition. Design projects need to be structured to reduce risk, in-build efficiencies from day one and to ensure optimal financial return. But once you have selected your DFSS project and learnt the tools, how do you make sure you can track its success and optimize the business results?
NCS offers "World class one-stop CAM and Front End Solutions" for PCB Manufacturers. Based out of Bangalore, the silicon valley of India, NCS has serviced front-line customers across the world. The team at NCS has manufacturing and DFM experience with global exposure, which helps deliver critical projects to customers with delivery excellence at par with global players.
This Presentation gives a snapshot of Gateway\'s Remote IT infrastructure Management Division and its capabilities around various Services of Network, Server, IT Security Infrastructure and desktop / help desk support services.
“Clinical Grade" Requirements to Enable a Mobile Health and Advanced Workflow Environment by Laurence Beaulieu; Chief Architect, Healthcare Solutions
Nortel Business Solutions
Application of HALT at design stage becomes more and more common in electronics industry. Many discussions and disputations of the HALT test interpretation are in full swing. With our HALT test experiences in notebook, desktop and server products, we intend to share and discuss the safety factor of exact product operating limits to its operation specifications in temperature and vibration and common failure modes stimulated thereby. A general perspective of the test setup techniques by product types and its influence is also provided. The distinctive roles of HALT on board level and system level from thermal flow field point of view are also shared in this paper.
Parasoft Concerto A complete ALM platform that ensures quality software can b...Engineering Software Lab
Parasoft Concerto is a complete software development management platform that ensures quality software can be produced consistently and efficiently–in any language.
By integrating policy-driven project management with Parasoft Test's quality lifecycle management as well as Parasoft Virtualize's dev/test environment management, Parasoft Concerto ensures predictable project outcomes while driving unprecedented levels of productivity and application quality.
This presentation was presented by Ken Deters of NACCO Material Handling and Roshan Pinto, Director Manufacturing Practice, Tavant Technologies at the Warranty Chain Management Conference 2013. This talks about a company's approach to choose a Warranty Solution apt for their business needs.
Whose View is it Anyway: Addressing Multiple Stakeholder Concernssferoz
Talk at Agile India 2012 Conference.
The presentation is about using Supportability Framework to transform stakeholder concerns relating to quality attributes such as modifiability, extensibility, deployability etc. into features and concrete user stories, and creating a roadmap that lets the system evolve across all its abilities, not just functionality.
Read the full narration at http://www.canopusconsulting.com/canopusarchives/?p=343
DfSS Webinar Part 2: Delivering better ROI on DFSS Projectsmjames1
Creating a systematic process for design is important for any business – whether it’s designing a new product, creating a new process or leading a new service proposition. Design projects need to be structured to reduce risk, in-build efficiencies from day one and to ensure optimal financial return. But once you have selected your DFSS project and learnt the tools, how do you make sure you can track its success and optimize the business results?
NCS offers "World class one-stop CAM and Front End Solutions" for PCB Manufacturers. Based out of Bangalore, the silicon valley of India, NCS has serviced front-line customers across the world. The team at NCS has manufacturing and DFM experience with global exposure, which helps deliver critical projects to customers with delivery excellence at par with global players.
This Presentation gives a snapshot of Gateway\'s Remote IT infrastructure Management Division and its capabilities around various Services of Network, Server, IT Security Infrastructure and desktop / help desk support services.
“Clinical Grade" Requirements to Enable a Mobile Health and Advanced Workflow Environment by Laurence Beaulieu; Chief Architect, Healthcare Solutions
Nortel Business Solutions
Application of HALT at design stage becomes more and more common in electronics industry. Many discussions and disputations of the HALT test interpretation are in full swing. With our HALT test experiences in notebook, desktop and server products, we intend to share and discuss the safety factor of exact product operating limits to its operation specifications in temperature and vibration and common failure modes stimulated thereby. A general perspective of the test setup techniques by product types and its influence is also provided. The distinctive roles of HALT on board level and system level from thermal flow field point of view are also shared in this paper.
LinkedIn is one of the most effective networking tools available, and can help your sales staff fill the pipeline with future leads. See how to leverage the network at your dealership the right way.
The New Networking: Using Social Media to Land Your Next JobStephen Murphy
There's a big problem in recruiting today. Companies are posting jobs one place, and applicants are applying elsewhere. This gap is the reason why there are more than 4.5 million unfilled jobs in the US, despite nearly 10 million unemployed Americans on the market.
In this new presentation, we'll show you how to close the gap by focusing job search efforts on one of the fastest growing platforms: social media. We'll discuss the main social networks you need to be on, how to optimize your profiles for success, and where to find the best jobs.
How to maximise the benefit of your software costs in compliance with the software licence agreements?
How an enhanced software asset management can help optimizing your IT costs?
Integrating Novell Access Governance Suite with Novell Identity ManagerNovell
This session will discuss the reasons and methods for integrating Novell Access Governance Suite with your existing Novell Identity Manager implementation. You will learn how to implement the integration and what benefits you will realize from doing so.
Continuous Delivery has reduced software development cycles from months to weeks or even days, but testing has failed to keep up with these advancements.
Learn how Continuous Testing brings agile processes to testing and provides reduced time-to-release without software quality compromises.
Want to find out more? Download the whitepaper: http://info.blazemeter.com/continuous-testing
Different Types of User Acceptance Test, Are you performing all?BugRaptors
Bugraptors always ensures that while testing an application, the main focus is to verify the requirements. To minimize the bugs experienced by end users, Bugraptors perform User Acceptance Testing (UAT) at the last phase of the software testing process to make sure that it can handle real scenarios.
At Grazitti Interactive, we know that early and prompt bug fixing can save a lot of time and resources. We therefore, follow international test parameters to provide end- to - end quality assurance testing and ensure smooth end user experience. Starting with creating an exhaustive list of test cases, we do various types of testing including smoke testing, functional testing, and regression testing; and also provide automated testing expertise.
Pro JavaFX Platform - Building Enterprise Applications with JavaFXStephen Chin
Presentation given by Stephen Chin and Jim Weaver at JavaOne 2010. Covers enterprise application development with JavaFX, the JavaFX 2.0 announcement, and alternative languages for JavaFX.
Making the leap from "gatekeeper" to strategic business partner often requires the QA/test group to centralize and standardize the selection of test tools, the development of test processes and templates and the training of testing staff. Only then can it break the organizational silos which typically hobble testing efforts, present a consistent and credible face to their business customers and develop the specialized expertise needed to meet today's testing challenges.
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Flexera
Context is Critical to IT and an Accurate CMDB is Vital to Context
A near-real time accurate CMDB is an important requirement but a major challenge for modern IT organizations. Bad and missing data can significantly impact the business and result in business impacting service outages, increased business risk and exposure to security threats.
ServiceNow provides the essential management and big picture visibility that is crucial to an effective CMDB. And Flexera | RISC Networks provides detailed discovery data, context and analysis to push into your ServiceNow instance, making the picture of the current state accurate and contextually relevant.
10 Tips to Optimize, Automate, and Govern your Hybrid IT EnvironmentFlexera
Join our webinar for 10 tips to help you manage your hybrid environment, erase waste from your IT spend and reallocate spend to critical initiatives – enhancing your bottom line and accelerating your company.
Using Automated Policies for SaaS Governance and ComplianceFlexera
Learn to use automated SaaS policies to enforce governance and compliance, including unsanctioned spend alerts, detecting suspicious user activity, onboarding and offboarding, and detecting inactive user accounts.
The Practical Approach for End-to-End SaaS ManagementFlexera
Watch this webinar and get the answers to help you learn to effectively manage software-as-a-service. Learn to optimize SaaS spend, manage multiple vendors and their pricing models, and right-size contracts with detailed usage and cost data.
7 Things You Need to Know for Your Cloud-First StrategyFlexera
One of your top priorities is implementing a cloud-first strategy. Learn to make the shift as efficiently and cost-effectively as possible. Watch this webinar and learn the best practices for cloud migration, optimization, governance and automation.
The Role of In-House & External Counsel in Managing Open Source SoftwareFlexera
Amy Chun, Partner at Knobbe Martens and Marty Mellican, VP & Associate General Counsel at Flexera discuss the role of in-house counsel to better manage any potential legal risks that might be inherent with OSS use.
Addressing Open Source Risks During M&A: A Legal ViewFlexera
Amy Chun, Partner at Knobbe Martens and Marty Mellican, VP & Associate General Counsel at Flexera discuss why a carefully planned audit of open source should be part of every due diligence effort.
Having Trouble Managing All Your Cloud Services? We Know!Flexera
Most businesses have at least 3 or more cloud services, and it’s hard enough to control spend for just one. That’s why Flexera acquired RightScale, the leading multi-cloud management provider. With cloud services making up 20% of most IT budgets, the spend optimization stakes are high. This year’s Rightscale State Of The Cloud report shows that up to 35% of cloud services spend may be wasted.
View these slides to see how RightScale Optima helps you find that 35% and act on it.
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityFlexera
View this webinar with Forrester analyst Charlie Betz and Forrester consultant Stephen Odell, as they present the detailed findings of their study. After the webinar, you will have a better understanding of the benefits of Flexera Data Platform.
Webinar: What's New In FlexNet Manager Suite 2018 R1Flexera
Learn about the new features in FlexNet Manager Suite for Enterprises 2018, which brings new capabilities to extend Flexera's leadership in Software Asset Management.
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Flexera
There’s no second chance to make a first impression! Are your software upgrades making a good impression on your customers? Are your software delivery processes fast, scalable, and secure?
Join Forrester Principal Analyst David Johnson, Akamai and Flexera as they discuss what modern electronic software delivery processes should look like in this rapidly growing IoT world.
Fast!
No one likes to wait. Learn how a robust software delivery solution gets software and updates out to customers – without the wait.
Scalable!
File sizes and cadence of updates are faster than ever. Intelligent devices defy conventional software distribution models. Hear what you can do to keep up.
Secure!
Security has many aspects – where do you focus? Discover how to deliver your software in a secure way and only to those entitled to receive it.
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Flexera
Join Microsoft's Iris Fang and Nick Moseley, Technical Solutions Professionals, for an overview of the new business-friendly features coming in the Windows 10 Update 1709. Whether you have already migrated to Windows 10 and are planning for the upgrade, or preparing to migrate from Windows 7 to The Fall Creators update, this webinar will review what enterprises can expect in the new release.
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2Flexera
Cyber-criminals target these known vulnerabilities in both commercial and open source software. Many organizations are either unaware of what’s in their software or take too long to patch their systems. These gaps lead to ignorance of known vulnerabilities and/or a lack of efficient processes to apply critical patches quickly.
Watch this webinar on understanding these gaps, closing the risk window and reducing your risk of a breach. Find out how vulnerable code can be easy to discover and patch.
Announcing the availability of the largest and most comprehensive repository of technology asset data on the planet. Current and constantly curated. Available on the software industry’s first open platform for this data. It’s about time.
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Flexera
Join UpperEdge and Flexera in this webinar to learn the importance of getting more proactive control of your SAP relationship to drive predictable outcomes and increased value.
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsFlexera
Join us for this webinar as we discuss the spend management risks associated with cloud services and some of the strategies organizations can use to keep a lid on these costs using Software Asset Management processes and tools. We’ll use Amazon Web Services and Microsoft Office 365 as specific examples of cloud infrastructure services and SaaS applications, respectively, that can be managed for better cost efficiency.
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseFlexera
Organizations are under constant attack by hackers targeting applications used by the business. The University of Maryland recently quantified the near-constant rate of attacks on computers with Internet access to every 39 seconds. The best defense requires a holistic approach and collaboration of different teams in a concerted effort to reduce the attack surface for hackers. In this webinar we will discuss the roles and the impact that activities, not always associated with security, have in reducing risk. Whether you are an asset manager, a desktop or datacenter manager, or an IT security professional, your role has a significant impact on your organizations ability to reduce the risk of cyber-attack.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Climate Impact of Software Testing at Nordic Testing Days
Why Software Publishers are Migrating From Certificates to Activations
1. Why Software Publishers
are Migrating from
Certificates to Activations
October 13, 2010
David Znidarsic
Vice President of Technology
Flexera Software, Inc.
2. Agenda
Benefits of activations
When are activations appropriate?
Changes to application environment and operations server
Machine virtualization best practices
Activation components
Transactions with customers
Enterprise customers’ perspective
2
3. Terminology
Certificate license right expressed as one or more
license lines
Activation structured process for fulfilling a license right
Deactivation structured process for returning a license
right
Trusted storage technology necessary to implement
deactivation
3
4. Certificates Philosophy
Rights best managed by license server
Tampering of licensed machines cannot be detected
Operations and license server are control points
Implications
No means to cancel/return non-expiring rights
No means to cancel/return expiring rights prior to expiration
License server’s only control of license lifecycle results from
persistent connection with licensed machines
i t t ti ith li d hi
License lifecycle is linear
4
5. Activations Philosophy
Rights best managed by licensed machines
Tampering of licensed machines can be detected
Operations and license server are distribution and transfer hubs
Implications
Can cancel/return rights at any time
License lifecycle can be controlled without a persistent connection
(or any connection) to licensed machines
License lifecycle i cyclical
Li lif l is li l
Not all license lifecycle phases need to be overseen by publisher
5
6. Feedback Prior to Activations Support
Customers
Flexibility of certificates is great, but my customers have so much
flexibility that they get themselves into trouble and then overwhelm
my support organization.
Flexibility f
Fl ibilit of certificates i great, and I h
tifi t is t d have my customer
t
interactions under control.
Prospects
Flexibility of certificates is not great, there are too many choices;
you’re the experts, just tell me what to do and how to do it.
6
7. License Lifecycle
Trial use Goals
Fulfill Standardize transition
through lifecycle with
Update (subscriptions) minimal or reduced
Return (re-deployment / credit)
(re deployment involvement from
Upgrade (versions / features) publisher
Re-host Maintain existing flexibility
Emergency use
View
7
8. Improved Customer Experience
Structured interactions between publishers, channel partners,
and customers
Uses verifiable transactions instead of hard-to-manage file
transfers
Interface to install, un-install, change, and view rights on li
I f i ll i ll h d i i h licensed
d
machines guides customer
Transactions can even be communicated verbally
Self-service for all lifecycle events
Increased structure does not increase intervention
Optimized for customers’ mobile laptop usage
Supports lifecycle even with disconnected sites
Tolerates re-configuration of licensed machines
8
9. Improved Visibility into Customer’s Activities
All transactions can be:
Self service
Self-service
Verified
Audited
Any individual transaction can be allowed to be:
Private, but trusted
Bulk fulfills, updates, returns, and upgrades always can be:
Verified
Audited
A dit d
9
11. Comparison of Transactions
Transaction Activations Certificates
Yes, but publisher must be
Trial use Yes
involved
Activate (aka fulfill) Yes Yes
Renew (aka update) Yes Yes
Deactivate (aka return) Yes Yes, but can’t verify
Yes, but can’t verify previous
Upgrade Yes
version has been deactivated
Yes, but can’t verify it’s a
Transfer (aka rehost) Yes
move, not a copy
Yes, but publisher must be
Emergency use
g y Yes
involved
View Yes, via publisher’s interface Yes
11
12. Comparison of Other Factors
Factor Activations Certificates
Customer and channel self-service
Yes Limited
management
Structured and auditable Customer manages licenses
License management
transactions in text files
Yes, for verifiable
Information from cus o e
o a o o customer No
o
deactivation
d ti ti
Disconnected use
Better Yes, but…
(hybrid / borrowing)
Tolerant blended hostid, Single hostid, intolerant
License integrity better clock wind-back blended hostid, clock wind-
detection back detection
12
13. Frequency of Events Recommends Technology
If average time between lifecycle …then recommended technology
events is measured in units of…
of is…
is
concurrent certificates with persistent
minutes or seconds
connection to license server
borrowed certificates with intermittent
hours
connection to license server
activations with intermittent
days connection to license or operations
server
activations with no connection to
weeks
license or operations server
13
15. Changes to Application Environment
Application
Single API call can checkout certificates and activations
License server
Single license server can serve concurrent licenses and activate
licensed machines
Single license server can load concurrent licenses from certificates
or via activations
Activation utility
Use Activation API to create component to install, change, and un-
un
install licenses on either or both:
Licensed machine
License server machine
Li hi
15
16. License Server Availability
Role of license server for activations:
License server deploys licenses to licensed machines in advance
of their use
License server does not need to be operational at time of license
checkout or while license is being used
License server only needs to be operational:
At time of activation,
At time of de-activation
You reduce reliance on availability of:
License server process
License server machine
You reduce (or eliminate) reliance on the availability of:
Network connection to license server machine
16
17. Changes to Operations Server
Activation process best implemented with FlexNet Operations
Built in
Built-in support for all transactions (on-premise and on-demand)
(on premise on demand)
Converting to activations often a result of re-evaluating all license
management; therefore, FlexNet Operations often introduced to
optimize revenue recognition
ti i iti
Activation process can be implemented with or without FlexNet
Operations
License Generation Toolkit (LGT) can be integrated into your back-
office
Single operations server can manage both certificates and
activations
New t
N transactions must be supported
ti tb t d
17
18. Machine Virtualization Best Practices
Licensed application
Use concurrent certificates; the best “virtual” license
virtual
License server
Deploy as an application or service
Limit to only a specified physical machine
Set ls_allow_vm=PHYSICAL, put a traditional hostid on SERVER line
Limit to any virtual machine running on a specified physical machine
Put a “bare metal” hostid on SERVER line
• Ethernet MAC address or hostname of physical machine
Use three servers f redundancy
U th for d d
Deploy as a virtual appliance
Set ls_allow_vm VM_ONLY, put a UUID hostid on SERVER line
ls allow vm=VM ONLY,
Use VMotion or Hyper-V Live Migration for redundancy
19
20. Distribution and Transfer Hubs
Activation transactions can be managed between:
Publisher hosted
Publisher-hosted operations and licensed machine
Flexera-hosted operations and licensed machine
Enterprise-hosted license server and licensed machine
Publisher-hosted operations and enterprise-hosted license server
Flexera-hosted operations and enterprise-hosted license server
Publisher-
hosted
operations
server
Enterprise-hosted Licensed
or license server(s) machine(s)
Flexera- optional
hosted
operations
server
21
21. Creating Trust
Must control the installation, change, and un-installation of
licenses
Create a license repository only written by publisher’s
components
Trusted Storage – encrypted, bound and anchored
Publisher’s components detect changes they didn’t make:
Tampering
Copying
Deleting
Restoring
New “repair” transaction to synchronize trusted store with what is
repair
known in the operations server
22
22. Components for Node-Locked Models
Licensed
omputer
Licensed
omputer
Licensed Licensed
Co
Co
Application Application
API API
File XML wrapper
Activation
API
License License License Utility
Trusted Store
e
License
23
23. Components for Concurrent Models
Licensed
Computer
Licensed
Computer
Licensed Licensed
Application Application
pp
API API
License
Server
License
Server
License License
L
L
Server Server
File
XML wrapper Activation
License License API
License Utility
Trusted Store
e
License
24
24. Compatibility
Licensed
Computer
License
Server
Licensed License
Application Server
API
File File
License
Li License
Li
Trusted Store
e Trusted Store
e
API
Activation Activation API
License Utility Utility License
License
XML wrapper
License
25
25. Compatibility (without application activation utility)
Licensed
Computer
License
Server
Licensed License
API
Application Server
API
File File
License
Li License
Li
Trusted Store
e Trusted Store
e
Activation API
License Utility License
License
XML wrapper
License
26
27. Transactions with Individual Computers
Publisher Channel Consumer or Enterprise
Portal
P t l XML or S
Short Code
C
Licens Com
sed
Portal XML or Short Code
API
FlexNet
mputer
Operations Portal XML or Sh t C d
Short Code
Network
Network*
* Network communicates the same XML as can be sent off-line
28
28. Transactions with Multiple Computers
Publisher Channel Enterprise
Portal
P t l XML XML
Computer
Licensed
API
Lice
Network*
ense Se
Portal XML
FlexNet
erver
Operations Portal XML XML
Computer
Licensed
API
Network
Network* Network
Network*
r
* Network communicates the same XML as can be sent off-line
29
30. Short Code Refers to Already Deployed XML
Example short code = 218656551957094464245011
31
31. Single or Composite Transactions
Communications can contain one or more transactions
Upgrade can occur in one round trip
No round trip for de-activation, then additional round-trip for re-
activation
Initial activation can occur in one round trip
No round trip for setup, then additional round-trip for activation
Composite transactions only supported by XML between:
Operations server and license server
Operations server and licensed machine
32
32. Enterprise’s Perspective
Help me stay in compliance
Give me a consistent view of my license lines
lmadmin and FlexNet Manager give view into license pools already
loaded into license server
Requirement for visibility on licensed machine might be cry for
visibility from operations server
Allow me to change and reorder license lines
Claim that certificates are sometimes not accurate
Allow me to use concurrent licenses on disconnected laptops
Allow me to continue to report on my license usage using
FlexNet Manager
g
33
33. Activations Summary
Improved customer experience
Publisher visibility into most
transactions even through
channel tiers
Customer and channel visibility
into all transactions and current
state
Can still support certificates
Compliance assurance
34
34. Thank You
David Znidarsic
Vice President of Technology 2860 De La Cruz Blvd,
David Znidarsic Santa Clara, CA 95050
davidz@flexerasoftware.com
Direct: davidz@flexerasoftware.com
(408) 642–3900 www.flexerasoftware.com
Cell: (408) 881–4834
35