Presentation is loading. Please wait.

Presentation is loading. Please wait.

Operated by Los Alamos National Security, LLC for DOE/NNSA LANS Company Sensitive — unauthorized release or dissemination prohibited U N C L A S S I F.

Similar presentations


Presentation on theme: "Operated by Los Alamos National Security, LLC for DOE/NNSA LANS Company Sensitive — unauthorized release or dissemination prohibited U N C L A S S I F."— Presentation transcript:

1 Operated by Los Alamos National Security, LLC for DOE/NNSA LANS Company Sensitive — unauthorized release or dissemination prohibited U N C L A S S I F I E D Software Licensing Strategies and Insuring Compliancy NLIT 2008 Birds of a Feather  LA-UR-08-2549

2 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 2 Facilitator

3 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 3 What’s a BOF? “Birds of a Feather” An informal discussion group Attendees group together based on a shared interest Carry out discussions without a pre-planned agenda Everyone participates

4 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 4 Who Can Participate? This presentation is open to Attendees only Please consider attending if you are a an IT manager Procurement manager Licensing specialists Enterprise Service manager — SMS

5 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 5 Areas of Discussion Exploring various purchasing options License management best practices Leveraging auditing capabilities to ensure compliancy

6 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 6 Exploring various purchasing options Recommended areas of discussion Site licensing – versus – One-off purchasing User licenses – versus – Device license Concurrent user licenses Truing up Counting machines — Red networks considerations Secondary (laptop) use rights Virtual machines Terminal Server considerations

7 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 7 License management best practices Recommended areas of discussion Centralized management – versus – end-user management Leveraging software auditing/delivery tools Tying licenses to a device License recycling What about shrink-wrap?

8 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 8 Leveraging auditing capabilities to ensure compliancy Recommended areas of discussion Getting the install-base data — What tools are you using? Getting the procurement data Merging the datasets Working with large datasets Enforcement Surviving an audit

9 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 9 Tip! Counting unique values (i.e. Eliminating duplicate machine names.) =SUM(1/COUNTIF(A2:A14061,A2:A14061)) (then Shift-Ctrl-Enter)

10 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 10 Tip! Comparing two values with VLOOKUP (i.e. Comparing a list of licensed users against a list of installed users) =VLOOKUP(S3,$T$3:$T$6,1,FALSE) (then Shift-Ctrl-Enter)

11 Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 11 Thank you for participating!


Download ppt "Operated by Los Alamos National Security, LLC for DOE/NNSA LANS Company Sensitive — unauthorized release or dissemination prohibited U N C L A S S I F."

Similar presentations


Ads by Google