Binyamin Dissen wrote:
On Sat, 24 Feb 2007 20:25:24 -0600 "Joel C. Ewing" <[EMAIL PROTECTED]> wrote:

:>Particularly in the case of processor upgrades, or in DR, there is no :>reliable way for us to verify that new keys from the vendors are correct :>and correctly installed until we are running on the new processor. If :>they aren't and a hard failure results, there is a high likelihood that :>this failure will be seen in some way by the end users, even if the :>vendor key support is 24x7.

In the case of a processor upgrade: if you get a hard error during production
due to a bad ISV key, your testing criteria are way too lax.

Really? Explain how one tests a dynamic CPU upgrade consisting of IBM non-disruptively turning on one or more CP's on your only production processor complex. At least 75% of our upgrades are now of this nature. Depending on what the vendor product is examining and how often it checks, it either sees an instantaneous change in production of the processor type at the time the new CP is enabled, or it sees that change when some vendor-specific future event (possibly the next IPL, POR, etc) occurs. There is no way to reliably test the new keys in advance, even if the product allows "installing" the new keys in advance. When changing to a completely new processor box, it is certainly desirable and generally possible to have an overlap and have the new machine as a test bed for new keys, but I can envision cases where there would be unavoidable constraints that would prevent that overlap (and have lived through some major push-pull scenarios with no overlap).


In the case of DR: if you do test runs, you will be quite aware of this issue.
If you never do test runs, refer to the "processor upgrade" above. If you do
not test, this is not likely to be your only problem. Or a major one.

Vendors can always change their key validation logic with maintenance and release changes and our mix of ISV products drifts as well. Some products fail without new keys on a DR processor only when running without VM; others fail in all cases. When we find a vendor product that has key validation problems at DR testing, the resolution for that product gets incorporated into our DR procedures. That we have occasionally encountered new failures in the past during DR testing tells us there is always the potential for an unexpected failure at an actual DR. DR testing reduces the exposure, but cannot eliminate it.

:>While I can understand the vendors concerns, my goal is to focus on our :>own system reliability and the needs of our end users; and any hard :>failures in ISV products are an enemy of that goal.

First, work on what you can change - get your accounting people up to speed.
Keep track of the ISV products and expirations, and follow up on them.

Our accounting people have never been a problem, neither have we had any significant problem tracking ISV product expirations. The problem is that we do not work in a static environment. It has been contract negotiation and the reluctance of vendors to adapt reasonably to changing hardware/software environments that has been the greatest source of problems, especially when hardware upgrades are to support application growth that is unrelated to the vendor's product!

Improve those test procedures.
See above.

Am I a little harsh? Perhaps.

A vendor only has to deal with the familiar idiosyncrasies of his own product's key management. On the customer side we have to deal the unfamiliar and changeable idiosyncrasies of many vendor products.

Yes, you would like to not have to worry about the ISV key, and the ISV would
love not having to worry about collecting.

But you should be aware that there is a bit of a partnership here.

Granted. Perhaps a vendor should cut much more slack with a company that has been a consistent paying customer for years by selectively making key management less onerous for such customers.

--
Binyamin Dissen <[EMAIL PROTECTED]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel
...

--
Joel C. Ewing, Fort Smith, AR        [EMAIL PROTECTED]

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to