fbpx

Search results for: Certification C_SIGDA_2403 Exam Infor 🐃 Certification C_SIGDA_2403 Exam Infor 🦚 C_SIGDA_2403 Free Learning Cram 🤎 Search for 「 C_SIGDA_2403 」 and easily obtain a free download on 「 www.pdfvce.com 」 🛷C_SIGDA_2403 Detailed Study Plan

Sassafras Software Launches a Major New Release of Award-Winning KeyServer Application

…er-defined URL patterns are accessed, how often, and for how long. As it becomes more common for software to have purely web-based components, this unified view of usage is critically important. KeyServer’s desktop and web-based interfaces provide user-friendly, comprehensive asset usage statistics for any size network, from small lab facilities with just a few dozen computers to global enterprises managing tens of thousands of computers across gl…

Read more

Contact

…European Union TStat S.r.l tstat.it tstat@tstat.it +39 0864 210101 Japan QualitySoft Corporation quality.co.jp sales@quality.co.jp +81-3-5275-6121 Central and South America Software Shop software-shop.com India License Estate licenseestate.com info@licenseestate.com +91 98806 89020 Australia Cyclone cyclone.co.nz sales@cyclone.co.nz +64 0800 686 686 New Zealand Cyclone cyclone.co.nz sales@cyclone.co.nz +64 0800 686 686 Trusted by hundreds of compa…

Read more

Counting K2 Client Licenses for Thin Clients (Citrix, RDS)

…ake you will configure this in K2 as described here: https://www.sassafras.com/hrl/7.1/comp_ids.html. Dedicated vs Leased Logins The simple counts above assume that all computers in K2 are configured as Dedicated clients. This is the default for all computers (physical, virtual, or thin client). KeyServer can however be configured to give clients a “Leased” login type in which the KeyServer seat is freed up after a certain amount of inactivity. Th…

Read more

Photoshop This! The Adobe Licensing Decision

…n Adobe products to see where you stand. When pricing is released, you can easily compare the costs between pricing models, make the right choice, backed up by data, and be the hero. You haven’t had a policy in place, but you have some time before your current subscription expires. Great! Make sure your computer divisions are in order, run an audit report to determine what’s installed where, and create a site policy now to track Adobe usage. When…

Read more

Deploying KeyAccess with JAMF to Mojave

…en creating your Configuration Profile. Most likely you’ll apply it at the Computer level. After uploading, if you examine it you’ll see that it just specifies that KeyAccess should be allowed to send AppleEvents to each major browser, e.g.: Second, as an alternative, you might decide that you don’t need to track any URLs and would like to disable this functionality entirely on the client. To do so, modify the script that sets the KeyServer addres…

Read more

7.9.0.9 Yep Already

…cluded in a find by the way: Name, Serial, User, and MAC. Icons in Product Search List When linking a Purchase to a Product in the Web, search results were a little hard to differentiate. While naming usually is a tip off, we have added the Family/Edition icons so there is a much better visual cue. Remember it’s important to link a Purchase to the proper Product based on the license terms for accurate accounting. If it’s an annual agreement that i…

Read more

8.0.0.4 Enhances Communication

…of all available Software in that location to pick from. Local IP added to Computer information. This does a best effort to pull the IP the computer is using to communicate with the server. This differs from the Last Address we have long had which is the IP we see the connection coming from. The latter can be masked by a NAT where the former is not. However, what the OS tells us when the system has a lot of interfaces may not be what you’d want it…

Read more

Statement on Secure Coding Practices

…, enforce buffer size constraints, and perform input validation. This is a common and common sense development practice, and encapsulates many of the recommendations in our general policies. Because the bulk of our code is written in C/C++, this practice is of primary importance. C provides precision and performance, but does not isolate the programmer from the sorts of low-level data manipulation that can be a source of many errors. 2) Our primar…

Read more

IT Cost Reduction Strategies with Sassafras

…quantify how much each product has been used on each machine. Finally, the Compliance (PROD x comp) report can give you a detailed analysis of license consumption and usage that can help with high level questions of value and ROI for individual software products. Application Rationalization Also known as Application Portfolio Management — Application Rationalization is a more conscious process of determining what software products to support (and

Read more

Custom Workflows with JavaScript

…KeyConfigure, here are a few examples from the page linked above: The List Computers script will take a list of computer names from a text file and open a new window containing the associated computer records. After “selecting” a list of computers with the script above, the Move Computers script allows you to change the Login Type, Division, Lifecycle Stage, and/or Anchor status for the listed computers en masse. Like a “Reverse Audit” report, the…

Read more

Get started

If you want to get a free consultation without any obligations, fill in the form below and we'll get in touch with you.

Live Demo

  • Sassafras will not share your personal information, period. We take privacy seriously. You may opt out of our communications at any time.