Is it still possible to get NWSBS 6.6 upgrade user licenses?

Hi guys,
Strange as it is, it looks like nobody sells NetWare licenses. The only place I was able to locate was Insight. But even there I am not sure that they will be able to process my order.
Can somebody advise where I can get additional 5 user licenses for NetWare Small Business Suite 6.5?
Thank you,
Vladimir Mikhelson

Vladimir,
We are looking to try to purchase an additional 5 user licenses for our Novell SBS v6.5 setup. So far the Novell reseller has told us this is not possible and we "MUST" upgrade to NOW.
Can you tell me who you discussed this with at Novell to find you could do what you have done and apply the MLA license from media part number 892-000416. I dont want to go ahead with purchasing NOW licenses and that media if it will not work or is illegal.
Thanks for your help.
David
>>> Vladimir Mikhelson<[email protected]> 8/08/2008 3:25 pm >>>
OK. Finally my media has arrived. The right p/n is 892-000416.
On the Netware 6.5 SP7 Operating System CD I have found a LICENSE
directory containing the .nlf file described in TID #7000769. Exactly as
Novell customer response explained on the phone.
I followed the TID, rebooted the server, and so far I am a happy camper.
Since after the new license installation the User Licensing Model
changes to "Audited" there is no concern about the physical user
licenses compatibility. Per Novell's advice I purchased additional NOWS
licenses.
I read carefully the new Novell Software License Agreement provided in
the same LICENSE directory and it sounds like that is all I need to do.
If somebody is about to install the new unlimited license I would
definitely recommend to read Joe Collins' posting in another thread
http://forums.novell.com/novell-prod...ml#post1587720
It helped me a lot. Thank you, Joe.
-Vladimir
VMikhelson wrote:
> Marcel and Mark,
>
> Thank you for your replies.
>
> I was referred to the TID # 7000769, aka known as # 10100768
> "Understanding the Unlimited Licensing Model"
>
> Take a look. It is interesting.
>
> I am still waiting for my shipment to arrive. I will update the thread
> with the results.
>
> -Vladimir
>
>

Similar Messages

  • I have downloaded adobe reader but it still says i need to accept the end user license agreement, i have searched everywhere and i have no idea how to "accept" this agreement

    i have downloaded adobe reader but it still says i need to accept the end user license agreement, i have searched everywhere and i have no idea how to "accept" this agreement

    yes i have for sure launched it this is what it looks like at the bottom of my computer, it says by downloading adobe you already agree to the license agreement but I've tried googling, "how to accept the end users license agreement" and it brings me to the agreement but there is no link or button to press on in order to accept it

  • Is it possible to get Adobe Illustrator CS 5 server license?

    Hi,
    We need to deploy Adobe Illustrator on the server and then call it through script so that it could convert raster image provided through script into FXG format file. The implementation is for commercial use. Please let me know the process and possibility of getting license.
    -Sanjay

    Hi,
    We need to deploy Adobe Illustrator on the server and then call it through script so that it could convert raster image provided through script into FXG format file. The implementation is for commercial use. Please let me know the process and possibility of getting license.
    -Sanjay

  • HT3302 I recently fried my iPhone 3GS in water. Is it still possible to get pictures from the SIM card and transfer them to my new iPhone 5s?

    I recently fried my iphone3gs from accidental water submersion . Is it possible to retrieve any photos from the some card and transfer to my new iphone5

    It depends on what kind of sim card and carrier you have, but the most likely answer is no. Contacts, maybe, but pictures are very unlikely. Sorry.

  • Is it still possible to get the LATEST VERSION of ppro cs4?

    my ppro version is 4.0.0, some months ago i see here that ppro lates version is 4.4.2
    I want to download that but today i can not find it anywhere...
    anyone know where to download it at adobe.com site?  thanks

    All Adobe updates start here... and select product
    http://www.adobe.com/downloads/updates/
    The latest for v4 is update 4.2.1

  • HT1369 My apple ID has been disabled so I can not update my apps.  I went to AT&T store 4 days ago and reset it but I still can't get my apps to upgrade?

    My Apple ID was disabled per my request because someone kept hacking into my icloud account and charging over $1000 worth of games.  I went to AT&T yesterday and had them reset my password and said everything would be fine now.  Well, its not.  Nothing with upgrade.  It still says my Apple ID is disabled.  Is there anyone out there who can help me to reset my code correctly and to be able to upgrade my phone, my ipad and my home computer?  I just had surgery and am not able to leave the house.  Thank you!

    Contact iTunes support.

  • Possible to get the name of the user filling in the pdf?

    is there a way to get the name (or user name or network name) of the user who is filling out the pdf?   We'd like to incorporate their initials in the file path for saving the document.

    Only if you install a script on the local machines of each of the users
    using the file.

  • Is it possible to get the URL from which user came to Apex Application?

    Hi,
    I have 1 web site which is created by Apex. And I have to create similar sites with slight differences. For example, even though the contents are almost same, each telephone # have to be modified.
    So, if possible, I want to use only 1 web site and depending on the URL from which user came, change some information on the page. Is it possible?
    And if it is possible, what if the user set Apex URL as favorite and visit it after some days?

    Thank you Scott,
    This is the one.
    But I have another issue.
    If a user comes to our page from their link directly, I can identify where he come from. But if he added our site to Bookmark and comes to our site through the link, is it possible to identify his original route?
    If it is impossible, I will create other Apex Application and put each URL to the link in order to catch where the user is from.

  • Is it still possible to upgrade from cs5 to cs6 standalone

    i have a copy of cs5 which is an upgrade from elements and wondered if it is still possible to upgrade to cs6.

    Sure, start here:
    http://www.adobe.com/products/catalog/cs6._sl_id-contentfilter_sl_cata log_sl_software_sl_creativesuite6.html
    Note that you can get to the upgrade prices after you click the Buy link.
    -Noel

  • Is it possible to get the table by knowing its name only (string)

    public bool IsShowTable
    get { return _IsShowTable; }
    set { _IsShowTable = value;
    if (_IsShowTable)
    //Type type = Type.GetType(GraphSelected);
    //Object o = (Activator.CreateInstance(type));
    using (var ctx = new PD5500DBEntities())
    DataGridSrc = new ObservableCollection<object>(ctx.G2_2_6_0dot01_0dot0); //Using here the TableName in String
    NotifyPropertyChanged();
    private ObservableCollection<Object> _DataGridSrc;
    public ObservableCollection<Object> DataGridSrc
    get { return _DataGridSrc; }
    set { _DataGridSrc = value;
    NotifyPropertyChanged();
    In the code I used ctx.TableName, would it be possible to get a reference by knowing the string of the TableName only. 
    I mean
    TableName = "MyTable";//Type type = Type.GetType("TableName");
    //Object o = (Activator.CreateInstance(type));

    Thanks Magnus.
    But now I have difficulty setting it to datagrid source 
    //public ObservableCollection<Object> DataGridSrc
    // get { return _DataGridSrc; }
    // set
    // _DataGridSrc = value;
    // NotifyPropertyChanged();
    or
    private ICollectionView _DataGridSrc;
    public ICollectionView DataGridSrc
    get { return _DataGridSrc; }
    set
    _DataGridSrc = value;
    NotifyPropertyChanged();
    using (var ctx = new PD5500DBEntities())
    Type type = Type.GetType("PressureVessels.Database.G2_2_6_0dot01_0dot0");
    var entities = ctx.Set(type);
    DataGridSrc = (ICollectionView)entities.Local;
    //or
    //DataGridSrc = new ObservableCollection<object>(entities.Local);
    Before when I was using 
    DataGridSrc = new ObservableCollection<object>(ctx.G2_2_6_0dot01_0dot0);
    it worked but now it doesn't. Though now by using the namespace.name I get the type but still cannot assign it to datagridSr which is ObservableCollection or ICollectionView. 

  • Is it possible to get 15 minute appointment times on the calender without them all bunching up and being unable to follow?

    Is it possible to get 15 minute appointment times on the calender without them all bunching up and being unable to follow?
    I am wanting to replace all my PC's with Macs, ipads and iphones for my business.
    I love the whole system but as a small Physio business, I need to be able to add 15min & 20min appointments to the callendar and share with my colleagues.
    The problem I have is that they just bunch up and overlap and it becomes impossible to follow. There is no way of telling if you have any appointment spaces as it no longer shows the gaps. Also, are you able to set a default time for the appointments as it currently defaults to 1 hour (small pain in the arse but thought i'd ask while i'm here)
    If there is a way to do this or if there is any other apps out there, I'm sure it would become a very useful business tool and many more small businesses would invest in Apple systems, I've talked it through with friends with other businesses and they agree.
    Anybody have any solutions, or do Apple fancy making some simple upgrades to the software?
    Thanks
    Mark

    Yep, that's basically what I'm trying to to detect JJ; which layers overlap the blue area would be the ideal result.  Which objects overlap the blue layer's bounds is an ok method, but not 100% accurate (as demonstrated by your example).  The bounds method does narrow down what layers I need to check it against, but it still returns 2 layers I need to then take extra time to check against for the actual overlap, which wouldn't be necessary if we can get the check more detailed.
    Since a more detailed way of getting the overlaps is still being looked into, I'm thinking of using EnsilZah's and/or c.pfaffenbichler's suggestions in tandem with some code they helped me with previously (here: http://forums.adobe.com/message/6256651#6256651 ) to get the actual overlaps by process of elimination on a narrowed return result using current suggestions; at least until a better/more efficient solution comes along.  I am still open to other ideas, on this topic, though.

  • Is it possible to get receipt for ipod bought at Apple Store

    Several months ago, my wife bought as a present an iPod and Logitech mm50 speakers at an Apple Store in the Mall nearby. Unfortunately, the receipt is long gone, if she even had one. Is it possible to get a receipt from the Apple store, if I (or wife) can determine when it was bought? I'm concerned about problems with the mm50 and will need proof of purchase in order to have Logitech to repair this under warranty. Thanks.

    Thanks for answering, but getting through to the actual store is next to impossible. Only 6 months left on the original warranty and the logitech system is still working fine.

  • Is it possible to get a mac virus?

    Hey,
    I was using a pc and I decided to get a mac, because you can do lots of creative work with it and I was sick of viruses. I was able to clean my pc up after I had a virus and I know how to reprogram it. And I still don't know why I always had a computer virus, because I had a fire wall/anti virus programs and surfed on safe intenet sites.
    Now, after buying a mac book I never feel safe, because I was used to have computer viruses
    Is it possible to get one on my mac?
    (I never download any suspicious stuff from the internet ex.:songs, videos etc I only use my mac for my writing at university, editing pictures and making music)
    Thank you

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Is it possible to get iPhone audio (telephone calls) from Lightning connection? Music works, but calls switch to internal or extenral speakers, not lightning (for e.g. docking station, car...)!

    Is it possible to get iPhone audio (telephone calls) from Lightning connection? Music works, but calls switch to internal or extenral speakers, not lightning (for e.g. docking station, car...)!
    I want to get the audio out of the lightning connection (the way you get audio when you connect it to a dock). It works properly with music, but when making a telephone call, it switches to the internal speraker. You can change to the external spekers, but you cannot select another audio out. It's also possible to get the telephone audio from the analogue connection, but that's not what I want. I want telephone audio from lightning...
    Would be so great if anybody has an idea

    I must also say that the second update ruined my Lumia's battery life.
    With the first (out-of-the-box) update the phone usually had 30 percent of battery after a quite hard day (e.g. more than an hour of talking via bluetooth handsfree, more than two hours of listening to the music via bluetooth, more than an hour of browsing via wifi, and reading hundreds of e-mails via two mail accounts). I never managed to discharge it after one day (e.g. 14-16 hours) of continous use, no matter how much I talked, listened and browsed.
    Now, with the secod update, it discharges to 20% after 12 hours of laying still almost without use (30 mins of music, less than 15 mins of talking and nothing more), and discharges completely with the usage pattern described above.
    Did the second update contain some Android code?

  • Is it possible to get an iPhone as an iPod...?

    I was just wondering. I do not have an iPhone but is it possible to get an iPhone without the AT&T contract?
    I guess my real question is can you get a refund of AT&T services when you cancel it right after buying iPhone? I thought it would be cool because it would be like an iPod Touch with a built-in camera. Also, I heard a lot of negatives associated with AT&T.

    You can purchase an iPhone without the 2-year commitment. But you have to purchase it from AT&T, you'll pay the full price ($499 to $699), and you will have to activate the iPhone with AT&T before the iPhone will do anything other than allow 911 calls, which means a voice and data plan even though you're not committed to a particular term. It's possible that you could cancel, but is having that camera really worth the $300 to $400 premium you'd be paying to get an iPhone. You can pick up iPhones used, but they still usually come at a premium price and you can get into all sorts of headaches with activation, or lack thereof.
    Sorry, but having an "iPod touch" with a camera isn't achievable in a practical sense right now. I'd recommend that you wait until September, which is when Apple usually releases new iPod models, and see if they release an iPod touch with a camera.
    Regards.
    Message was edited by: Dave Sawyer

Maybe you are looking for

  • BAPI for Create Interest Rate Instrument: BAPI_FTR_IRATE_CREATE

    Hi guys, I have problem about Create Interest Rate Instrument. First I created program bdc and recording Tcode: TM_51 and I found problem that I can't record tab memo.Because real world meno can dynamic by Tcode: TBCN I change method for Create Inter

  • I have a Macbook Pro 13" and a 24" external lcd monitor go gray (lock-up)

    If I plug my external monitor into my Macbook pro 13, via mini displayport, sometime durning the day, lately multiple times, the Mac and external monitor will go flat gray and "lock-up" only solution is to hold power button down and reboot.  This pro

  • Client not receive ip address - dhcp_reqd

    Hi, In my environment there's a  5508 (firmware 7.4.110.0) and ap 1600 with a ias radius server. All wlan are in flex-connect local switching, one client try to connect on a wlan but not receive ip address. After enabled debug aaa all i took the log

  • Loop in BPEL Process?

    Hello, Can I execute a loop in a BPEL Process? Or must I execute the loop in the program which invokes the BPEL Process by SOAP? Thanks!

  • Belkin tunetalk stereo with classic?

    I am having a weird problem with Belikin Tunetalk stereo & IPOD classics. I've asked Belkin & Apple & had nothing useful. Anyone add anything? background: Been using Belkin tunetalk stereos (2) with 2 Ipod 5G (video) for more than a year. They work o