Download presentation
Presentation is loading. Please wait.
Published byJulian Paul Modified over 8 years ago
1
Operated by Los Alamos National Security, LLC for DOE/NNSA LANS Company Sensitive — unauthorized release or dissemination prohibited U N C L A S S I F I E D Software Licensing Strategies and Insuring Compliancy NLIT 2008 Birds of a Feather LA-UR-08-2549
2
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 2 Facilitator
3
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 3 What’s a BOF? “Birds of a Feather” An informal discussion group Attendees group together based on a shared interest Carry out discussions without a pre-planned agenda Everyone participates
4
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 4 Who Can Participate? This presentation is open to Attendees only Please consider attending if you are a an IT manager Procurement manager Licensing specialists Enterprise Service manager — SMS
5
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 5 Areas of Discussion Exploring various purchasing options License management best practices Leveraging auditing capabilities to ensure compliancy
6
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 6 Exploring various purchasing options Recommended areas of discussion Site licensing – versus – One-off purchasing User licenses – versus – Device license Concurrent user licenses Truing up Counting machines — Red networks considerations Secondary (laptop) use rights Virtual machines Terminal Server considerations
7
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 7 License management best practices Recommended areas of discussion Centralized management – versus – end-user management Leveraging software auditing/delivery tools Tying licenses to a device License recycling What about shrink-wrap?
8
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 8 Leveraging auditing capabilities to ensure compliancy Recommended areas of discussion Getting the install-base data — What tools are you using? Getting the procurement data Merging the datasets Working with large datasets Enforcement Surviving an audit
9
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 9 Tip! Counting unique values (i.e. Eliminating duplicate machine names.) =SUM(1/COUNTIF(A2:A14061,A2:A14061)) (then Shift-Ctrl-Enter)
10
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 10 Tip! Comparing two values with VLOOKUP (i.e. Comparing a list of licensed users against a list of installed users) =VLOOKUP(S3,$T$3:$T$6,1,FALSE) (then Shift-Ctrl-Enter)
11
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 11 Thank you for participating!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.