An Audit by Another Name: IBM’s new IASP Program

Comments (0)
This year, IBM announced that it was going to present certain customers with the opportunity to participate in its new IBM Authorized SAM Partner Services (“IASP”).  In a recent webinar that it co-0presented with KPMG,...

Be Wary of Certain ISV and Embedded Software Agreements

Comments (0)
It is common for software solution providers to use third-party products to support the functionalities those providers have developed for their solutions. For example, a network-monitoring solution may incorporate IBM Cognos functionality, or an accounting...

Can a Software Publisher Force You to Audit Your Customers?

Comments (0)
Many software-solution vendors utilize third-party infrastructure or application programs as frameworks for embedded solutions that they sell to their customers and install on their customers’ computers. Licenses for those third-party products typically can be acquired...

Fundamentals of Software Audit Data Collection

Comments (0)
In order to effectively manage their software usage and to mitigate software license-compliance exposure, companies need to know how to gather information regarding their product usage. While some software products may have unique data-collection requirements...