Invitation to Participate in Testing ISO/IEC 19770-3 Software License Entitlement Standard

ISO/IEC 19770 SAM Standards

Development of the ISO/IEC 19770-3 software license entitlement standard has recently reached a milestone achievement with the publication of Committee Draft 2, which has recently been distributed to national standards bodies for international review and balloting. And with that achievement, John Tomeny (the convener of the team responsible for the development of 19770-3) is extending […]

Clutter: when to delete, when to hide

trash

The KeyConfigure user interface supports deletion of any of the main objects, but you should think twice before deleting. Often the motivation for deleting objects is to “clean up” the data. However, there are better ways to clean up than simply deleting data. Deleted objects can no longer be displayed in reports and this can obscure […]

The KeyServer Client Communication Protocol

Computer Network

The K2 client-server communication protocol is lightweight yet robust.  It is also fault tolerant, and supports your configured license Policies with the greatest possible transparency to end users. UDP port 19283 is opened on the KeyServer host in order to receive client connections.  As a KeyServer administrator, there is generally no need to understand the details […]

Sassafras Software Congratulates new 2013 IAITAM Fellows

IAITAM Fellow

Sassafras would like to congratulate Barbara Sellers, IT Director and IT Asset Manager at USAA, and Heather Young, Microsoft Global Director of SAM Programs, as the newest members of the internationally respected IAITAM Fellowship program. The IAITAM Fellow designation is the highest level of personal professional recognition offered by IAITAM, and is awarded on a […]

Using Asset ID for IT Asset Management (ITAM) with K2

Asset ID in K2 QR code

There are various ways to identify computers uniquely based on hardware properties. In particular, a MAC address or a hardware Serial Number typically are unique across all computers and are readily available in any systems containing computer records. K2 uses these properties as well as others to maintain a unique ID for each computer. However, […]

BSA report on SAM in Cloud Computing

The Cloud

The Software Alliance (a.k.a the “BSA”) has published an interesting paper on the importance of Software Asset Management (SAM) in Cloud Computing. In summary, Cloud computing does not exempt an organization from their need for SAM but rather, the cloud requires its own additional management policies and procedures. Fortunately, usage and entitlement optimization reporting for […]