Yeah, I knew that. But between the irrelevance and Random Capitals I
couldn't resist.
English, ya know...native speakers don't have an excuse for not being able
to use it effectively, eh?

On Fri, Mar 9, 2018 at 2:21 AM, Mike Schwab <mike.a.sch...@gmail.com> wrote:

> https://en.wikipedia.org/wiki/Gopher_wood
> The wood used in Noah's Ark.  Location believed to be Eastern Turkey
> or Northern Iraq
>
> On Thu, Mar 8, 2018 at 9:40 PM, zMan <zedgarhoo...@gmail.com> wrote:
> > Where was Gopher Wood? Is that near Norwegian Wood? What kind of market
> did
> > they have that Noah cornered? Or was Noach someone different?
> >
> > Inquiring minds want to know.
> >
> > On Thu, Mar 8, 2018 at 12:54 PM, Seymour J Metz <sme...@gmu.edu> wrote:
> >
> >> Even without an explicit license clause there's the issue of the DMCA.
> >> It's always best to read the license and communicate concerns prior to
> >> signing.
> >>
> >> The issue is strictly a legal one; you've been able to specify the
> virtual
> >> CPUID since old man Noach cornered the market in Gopher Wood.
> >>
> >>
> >> --
> >> Shmuel (Seymour J.) Metz
> >> http://mason.gmu.edu/~smetz3
> >>
> >> ________________________________________
> >> From: IBM Mainframe Discussion List <IBM-MAIN@listserv.ua.edu> on
> behalf
> >> of Brian Westerman <brian_wester...@syzygyinc.com>
> >> Sent: Thursday, March 8, 2018 12:21 AM
> >> To: IBM-MAIN@listserv.ua.edu
> >> Subject: Re: Product license key program
> >>
> >> No violation is performed, unless the vendor specifically prohibits it
> >> (which I doubt anyone would do).  Simulating the CPU serial has existed
> >> under VM for as long as I can remember.  There is no violation from
> doing
> >> this as the z/OS CVT freely identifies that it's an "emulated" system.
> >> Most key modules check for this and it's up to the vendor to decide
> whether
> >> or not to allow it and under what circumstances and for how long.
> >>
> >> Brian
> >>
> >>   On Wed, 7 Mar 2018 16:16:40 +0000, Seymour J Metz <sme...@gmu.edu>
> >> wrote:
> >>
> >> >Simulating the CPUID may violate the license agreement. If you're going
> >> to use keys, explicitly address the issue.
> >> >
> >> >
> >> >--
> >> >Shmuel (Seymour J.) Metz
> >> >http://mason.gmu.edu/~smetz3
> >> >
> >> >________________________________________
> >> >From: IBM Mainframe Discussion List <IBM-MAIN@listserv.ua.edu> on
> behalf
> >> of Brian Westerman <brian_wester...@syzygyinc.com>
> >> >Sent: Wednesday, March 7, 2018 12:57 AM
> >> >To: IBM-MAIN@listserv.ua.edu
> >> >Subject: Re: Product license key program
> >> >
> >> >The problem with just using a date, is that the software could be moved
> >> to any machine and duplicated any number of times and you would never
> know
> >> about it to keep it from being unlawfully duplicated without payment.
> >> >
> >> >This doesn't mean that you don't trust your clients.  In effect, while
> >> some might argue, it's really just like locking your car or your home or
> >> having a bike lock.
> >> >
> >> >Lets say that you generate your software and the people at company "X"
> >> pay the license until January of 2020.  In the mean time, 40 people who
> >> used to work for company "X", decide that it's soooo good that they
> want to
> >> take it to their new site with them.  That would be great if you got
> >> revenue from that movement, but you can't unless they call you and tell
> you
> >> that they moved the software and their "new" company would like to
> license
> >> it.  Also, maybe the people at company "X" decide that they want to
> defray
> >> the cost of the software they licensed from you, so they sell copies on
> the
> >> internet to other sites.  It will run until January of 2020, so there is
> >> nothing to keep it from happening.  I'm not saying that every client is
> >> dishonest, but it only takes one person to make it bad for you.
> >> Admittedly, this is probably a bit far fetched, but it's late and I'm
> >> tired. :)
> >> >
> >> >On the other hand, if you had a check in your module for the CPU Serial
> >> number, (and machine type or LPAR name, or any of several limiting
> >> factors), the client is in no way harmed or inconvenienced, because it
> will
> >> operate as before with no impediments, save that the software can't be
> >> "moved" without your permission.
> >> >
> >> >This should not cause any problems with DR testing or a real disaster
> >> because most, (if not all) DR sites run under VM and will simulate the
> >> serials and MT for just this purpose.  You can also check for running
> under
> >> VM and disallow it (or generate warnings), but that is not normally
> >> necessary and gets away from the point I'm making.
> >> >
> >> >Also, your key code needs to take into account that the site might have
> >> multiple physical processors (separate mainframes), so you want to make
> >> sure that your "key" code supports multiple entries.  This will also be
> >> useful for those sites that use "friend" arrangements for their DR sites
> >> (other companies who share each other's sites as Disaster Recovery sites
> >> for each other).
> >> >
> >> >You can/should also add code that temporarily allows the product to
> >> function when the key doesn't match, for use as a trial or for when
> "stuff"
> >> happens that the site for some reason needs to use the code on another
> box
> >> "temporarily".  You can limit it for a period of time, or number of
> uses,
> >> or whatever you think is reasonable, it's your software, you make the
> >> rules, while generating messages that let the site know in no uncertain
> >> terms that the the license is not "currently valid".
> >> >
> >> >There are lots of nice features you can add to the key process, and you
> >> can do as many vendors have and set up a web page to generate
> "emergency"
> >> keys for, well.... emergencies.  The reason is because "stuff happens"
> and
> >> no one is happy if the product can't be used for some reasonable reason
> and
> >> they can't contact the vendor until the next day because no one happens
> to
> >> be on call that night.
> >> >
> >> >If you are going to implement keys, you might as well do it right and
> >> make sure you test-test-test the process before you send it out to your
> >> client(s).  It's a good way to lose them if you mess up something like
> >> this.  All sites will understand the necessity of you having keys in
> your
> >> software, but no one will understand if it isn't rock solid.  It's such
> a
> >> little nit to implement correctly, but all it takes is one error in the
> key
> >> generation program to ruin your day.
> >> >
> >> >Brian
> >> >
> >> >
> >> >On Tue, 6 Mar 2018 21:02:37 +0000, Savor, Thomas (Alpharetta) <
> >> thomas.sa...@fiserv.com> wrote:
> >> >
> >> >>Brian,
> >> >>
> >> >>Never thought about Using CPUID and/or machine type as part of a
> >> software key.
> >> >>
> >> >>Generally speaking we try to stay away from tying application to any
> >> kind of machine.
> >> >>Our application is typical Cobol/Asm, Batch/CICS and VSAM/DB2 system.
> >> >>Cobol 5 was first change in years that required major changes to our
> >> application.
> >> >>Usually a change to the Operating System has no effect on application
> >> executing properly.
> >> >>
> >> >>But having said that, since I didn�t know really what makes up a key
> and
> >> how they work, this is an interesting change in direction and thinking.
> >> >>Thanks for the ideas.
> >> >>
> >> >>And thanks for the ofrer of help....I will almost certainly need it.
> >> >>
> >> >>Thanks,
> >> >>
> >> >>Tom Savor
> >> >>
> >> >>----------------------------------------------------------
> ------------
> >> >>For IBM-MAIN subscribe / signoff / archive access instructions,
> >> >>send email to lists...@listserv.ua.edu with the message: INFO
> IBM-MAIN
> >> >
> >> >----------------------------------------------------------------------
> >> >For IBM-MAIN subscribe / signoff / archive access instructions,
> >> >send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >> >
> >> >----------------------------------------------------------------------
> >> >For IBM-MAIN subscribe / signoff / archive access instructions,
> >> >send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >> ----------------------------------------------------------------------
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >> ----------------------------------------------------------------------
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >
> >
> >
> > --
> > zMan -- "I've got a mainframe and I'm not afraid to use it"
> >
> > ----------------------------------------------------------------------
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
>
> --
> Mike A Schwab, Springfield IL USA
> Where do Forest Rangers go to get away from it all?
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>



-- 
zMan -- "I've got a mainframe and I'm not afraid to use it"

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to