Upload
others
View
23
Download
0
Embed Size (px)
Citation preview
IBM Endpoint Manager for Software UseAnalysisV 9.0
"P5w
���
IBM Endpoint Manager for Software UseAnalysisV 9.0
"P5w
���
IBM Endpoint Manager for Software Use Analysis 9.0 "P5w
>f>JCZ IBM Endpoint Manager for Software Use Analysis V9.0 0yPsx"PfM^)f,1=ZBf>PmPyw*9#
© Copyright IBM Corporation 2002, 2013.
?<
Software Use Analysis 9.0 "P5w . . 1V^T . . . . . . . . . . . . . . . . 2
yw . . . . . . . . . . . . . . . . 5Lj . . . . . . . . . . . . . . . . . 6
© Copyright IBM Corp. 2002, 2013 iii
iv "P5w
Software Use Analysis 9.0 "P5w
>D55wKv?&\"20T0V^T#
Z]
v :XZ>"Pf;
v :53hs;
v :20 Software Use Analysis 9.0;
v Q*Jb
XZ>"Pf
IBM® Endpoint Manager for Software Use Analysis 9.0 G;nJCZ IBM Endpoint Man-
ager M'D&CLr,IBM Endpoint Manager M'ITS IBM Endpoint Manager for
Software Use Analysis Fixlet >cBXK&CLr#Software Use Analysis +U/PX
M'y!a9P20Dm~M2~DE"#|9+>\;@@Gqzc IBM Md{m
~)&LDm~mIhs#ya)D(fIoz IBM M'7#zc IBM S]?mI
hs,"R9>K<CD IT \m\&#Software Use Analysis 9.0 IT7(+Y9C
ry>49CDm~,Sx9oz5MI>#
IBM Endpoint Manager for Software Use Analysis 9.0 a)KBPv?&\:
v S]?(f#C'ITi4(f4i$kTm~LrF}D&mw[5%*}#
C'IThCT:D(f1d6',"RIT+(f<v* CSV q=#
v Gme#G<3fODGme|,;i43dMC}D0Z!?~#
v sFU>#yP0lmI$9Civd|DC'n/<+G<B4,"RI)i4
M<v* CSV M PDF q=#
v 3;(h#VZ,;v(hLr,1CZiR){Dm~(hMiR2~E"D]
?(h#+TD~53xP(hTiRm~}]M]?}],"R;P;v Fixlet C
Z(h?p#
v T/+%#m~?<+T/+%=yPKc#
53hs
Software Use Analysis ~qw20v'V Red Hat Enterprise Linux 6.3 x86(64 ;)
r|_f>#'V+ IBM Endpoint Manager 9.0 ~qww*}]4#*i4yP Soft-
ware Use Analysis 9.0 2~Mm~hs,kND6208O7rE"PDD20f.?
V#ITS IBM Endpoint Manager for Software Use Analysis 9.0 CJ+2E"PD#
20 Software Use Analysis 9.0
*q!p=208>E",kND208O,C8OIw* PDF D~q!2IZE"
PDPq!#ITS IBM Endpoint Manager for Software Use Analysis 9.0 CJ+2
E"PD#
*c:^(+ Software Use Analysis DH0f>}6= Software Use Analysis V9.0#
© Copyright IBM Corp. 2002, 2013 1
Q*Jb
*q!#{Jb"I\Dbv=8Md{JOoOE"DPm,kNDE"PDDJ
OoOM'V?V#ITS IBM Endpoint Manager for Software Use Analysis 9.0 C
J+2E"PD#
V^T
vf1Q*DV^T#
1Y>z?<<kM<v
Z Software Use Analysis DH0f>P,ITS;vz75}P<v(F?<Z]"
+d<km;v5}TO"(F}]#Z10"PfP,K&\;IC#
Z|,ibKc\mwD73PzmLrX4
1 VMware ODibzIibKc\mwxP\m1,Endpoint Manager XF(M Soft-
ware Use Analysis P+T>X4DzmLr:4TomFczDzmLrM4TibC
MDzmLr#5JzmLrC<jxPKjG#
VvtTfZZ`v>cP
,;VvtTITfZZ`vb?>cP#ZbVivB,VvyU/D}]I\4
Tb)>cPDN;>c,x;;(4T$Z>c#*K\bU/=bbD}],k
7#z!qDVv4T}7D>c#Z Software Use Analysis %?D<=8P,%w
\m,;s%wTBN;tT:9CivtT"|tTM UNIX |tT#%wtTD{
F,;sZ“}]4tT”PmPli>cGq}7#>c{F+T>ZtT{FB
=#g{>c;}7,kTdxP|D#
PDF (fPD1dTk*%;m>
Z(fP,3)P|,Tk*%;m>D1d5,xZz7C'gfO,b)5T|
cZK`DADq=xPT>#
Software Use Analysis M Subcapacity Reporting 2f
;\Z Software Use Analysis M Subcapacity Reporting .d2m;v IBM Endpoint
Manager ~qw#fZk2f`XDX*V^T#*q!|`E",kNDz7E"P
DPa)D2f"bBnwb#
IBM z7DO,;\'V
IZZ?-r,TZZm~?<P!qD IBM z7,IT4=X4Du?#}r*g
K,* IBM z74(O,D&\I\^(}#KP,"R;&9C#k"b,Soft-
ware Use Analysis PDO,v'VyZ20DmI$,rK;JCZs`} IBM m~#
PX^D IBM z7D?<Z]DV^T
IZ IBM a)K?<Z]"Jm"V8uyP IBM z7,rK;Dx^D IBM z
7D?<#mb,IZZ?-r,zI\a4=;) IBM z7X4,b9C^(^D
}7Du?#TZb`z7,;&xP^D#
2 "P5w
“m~V`”feODoTGy]/@whC4h(D
Software Use Analysis ITdC*9C Web /@woT73,r_9CZ&CLrE
*D~PhCDoT73#“m~V`”fe;'VZC'E*D~P8(D(FoT
73hC - Kfev9CZ/@whCP8(DoT73#
?~EOXM<k4G<"T>Z“sFzY”feP
?~E<kI\a0lT//s(#+G,Z Software Use Analysis 9.0 P,?~ED
OXM<k4G<ZsFzYP#
Z3)feO,P(CJy!FcziDC'ITi4yPFczD}]
ZkmI$9Civ(fMm~V``XDfeO,yPC'<ITi473PDy
PFcz,bkC'E*D~PVdxC'DFczi^X#K}]TbV==T>
D-rG,^FFczwCr+0lmI$9CivE","R+h*XBFcyZ
10C'CJ(^FD5#
"P5w - IBM Endpoint Manager for Software Use Analysis 9.0 3
4 "P5w
yw
>E"G*Z@za)Dz7M~q`4D#
IBM I\Zd{zRrXx;a)>D5PV[Dz7"~qr&\XT#PXz10
yZxrDz7M~qDE",krz1XD IBM zmI/#NNT IBM z7"L
rr~qD}C"GbZw>r5>;\9C IBM Dz7"Lrr~q#;*;V8
IBM D*6z(,NN,H&\Dz7"Lrr~q,<ITzf IBM z7"Lrr
~q#+G,@@Mi$NNG IBM z7"Lrr~q,rIC'TP:p#
IBM +>I\Q5Pr}Zjkk>D5Z]PXDwn({#a)>D5"4ZhC
'9Cb)({DNNmI#zITCif==+mIi/Dy:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.
PX+VZV{/ (DBCS) E"DmIi/,kkzyZzRrXxD IBM *6z(
?E*5,rCif==+i/Dy:
Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
1623-14, Shimotsuruma, Yamato-shi
Kanagawa 242-8502 Japan
>un;JC"zrNNbyDunk1X(I;;BDzRrXx: INTERNA-
TIONAL BUSINESS MACHINES CORPORATION“4V4”a)>vfo,;=PNN
V`D(^[Gw>D9G5,D)#$,|(+;^Z5,DPXGV("JzM
JCZ3VX(C>D#$#3)zRrXxZ3);WP;Jmb}w>r5,D
#$#rK>unI\;JCZz#
>E"PI\|,<u=f;;<7DX=r!"ms#K&DE"+(Z|D;b
)|D+`k>JODBf>P#IBM ITf1T>JOPhvDz7M/rLrxPD
xM/r|D,x;mP(*#
>E"PTG IBM Web >cDNN}C<;G*K=cp{Ea)D,;TNN==
d1TG) Web >cD#$#G) Web >cPDJO;G IBM z7JOD;?V,
9CG) Web >cx4DgU+IzTPP##
IBM IT4|O*J1DNN==9CrV"zya)DNNE"x^kTzP#NN
pN#
>LrDmI$VP_g{*KbPXLrDE"To=gB?D:(i) JmZ@"4(
DLrMd{Lr(|(>Lr).dxPE";;,T0 (ii) JmTQ-;;DE"
xP`%9C,kkBPX7*5:
© Copyright IBM Corp. 2002, 2013 5
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 79758 U.S.A
;*qXJ1Du~Mun,|(3)iNBD;(}?D6Q,<IqCb=fD
E"#
>JOPhvDmILr0dyPICDmIJOyI IBM @] IBM M'-i"IBM
zJm~mI-irNN,H-iPDuna)#
f0G IBM z7DE"ISb)z7D)&L"dvf5wrd{I+*qCDJO
Pq!#IBM ;PTb)z7xPbT,2^(7OdT\D+7T"f]TrNNd
{XZG IBM z7Dyw#PXG IBM z7T\DJb&1rb)z7D)&La
v#
>E"|,ZU#5qYwP9CD}]M(fD>}#*K!I\j{X5wb)
>},>}PI\a|(vK"+>"7FMz7D{F#yPb){V<Gi9
D,k5JL5s5yCD{FMX7DNNW,?tIO#
Lj
IBM"IBM UjM ibm.com G International Business Machines Corp., Z+rm`\=
xrDLjr"aLj#d{z7M~q{FI\G IBM rd{+>DLj#Web >
c“Copyright and trademark information”(www.ibm.com/legal/copytrade.shtml) a)K IBM
LjDnBPm#
Intel"Intel Uj"Intel Inside"Intel Inside Uj"Intel Centrino"Intel Centrino Uj"
Celeron"Intel Xeon"Intel SpeedStep"Itanium M Pentium G Intel Corporation rdS
+>Z@zMd{zRrXxDLjr"aLj#
Java MyPyZ Java DLjMUjG Oracle M/rdS+>DLjr"aLj#
Linux G Linus Torvalds Z@zM/rd{zRrXxD"aLj#
Microsoft"Windows"Windows NT M Windows UjG Microsoft Corporation Z@z
M/rd{zRrXxDLj#
UNIX G The Open Group Z@zMd{zRrXxD"aLj#
6 "P5w
����
Printed in China