2018-04-25 Image Released

The April 25 image has been released, which includes version 7.4.2.0 of all K2 components. This release fixes a bug where Histogram Logins (DIV) does not display in KeyReporter, fixes some minor bugs involving purchase tags, and fixes a Mac only KeyAccess bug where usage tracking fails to work in certain uncommon environments. Various other […]

Rochester Institute of Technology College of Imaging Arts and Sciences Integrates KeyServer Data with 3rd-Party Management Tools

Like many of our clients, Rochester Institute of Technology College of Imaging Arts and Sciences originally purchased their KeyServer many years ago for management of concurrent use software titles like Adobe Creative Suite, and although the KeyServer has been running steadily for the last 20 years, the shift toward cloud has reduced their need for […]

US Navy Allegedly Pirates Over Half a Billion Dollars Worth of VR Software

Without a Software Asset Management product monitoring installation and usage of software, comparing them to entitlement counts using the correct metric, it can be nearly impossible to remain in compliance with publishers’ terms and conditions. And although it’s the government’s job to enforce contract law—and it has been particularly aggressive in doing so over the […]

2018-03-03 Image Released

The March 3 image has been released, which includes version 7.4.1.9 of all K2 components. This release fixes a bug where in certain conditions (mainly when KeyServer runs on linux), PRS updates are not applied. A rare crash and data corruption has been fixed, and additional configuration options have been added for KeyReporter. For full […]

Upcoming Events in 2018

As spring approaches (though you wouldn’t believe it by looking out the window), we’re finalizing our schedule this year for conferences we will be attending. If you will be at any of these, we hope you’ll stop by to say hello. Also listed are upcoming webinars. March 27-28 – NERCOMP NERCOMP Annual Conference 2018 in […]

Choosing a Computer ID type

With any system that maintains a database of computers, a critical question is how each record is uniquely identified. For many organizations, identifying computers simply by Computer Name is sufficient – but there can be reasons to consider other data points. In particular, if computer names are not well regulated, it is safer to create […]