TRANSCRIPTEnglish

Video iU292bhfp_k

19m 19s2,490 words427 segmentsEnglish

FULL TRANSCRIPT

0:01

hello guys good

0:03

morning I hope you all are doing

0:06

well so in today's session we are going

0:10

to discuss about some important

0:13

terminologies which we are most

0:15

frequently using in it Asset

0:19

Management the first

0:22

term which we are using most frequently

0:25

is software

0:28

publisher so what is soft Ware

0:31

publisher software publisher is going to

0:34

be the Godfather of

0:37

software the reason

0:39

being software publisher is the one who

0:42

develops the

0:44

software based on the requirement those

0:47

are coming from end user or their

0:52

customer so basically software is going

0:55

to

0:56

help different customers to solve their

1:00

business

1:02

problems and publisher is targeting

1:04

those

1:05

problems and they are developing the

1:09

software based on the customers

1:13

need so whole and sole owner of the

1:17

software is going to be the software

1:22

publisher the second important term is

1:24

going to be the software license so what

1:27

is software

1:28

license

1:30

so software license is nothing but the

1:33

legal

1:34

Authority which is hold by software

1:38

publisher and has been granted to end

1:41

user or the customer who has bought that

1:46

software if any customer is claiming

1:48

that they have a software license it is

1:52

indicating that that customer or that

1:55

end user is going to be legal user or

2:00

legally authorized

2:02

entity who can use that software by

2:05

following some certain terms and

2:07

condition those has been said by

2:09

software

2:13

publisher you bought the software it

2:15

doesn't mean that you are become the

2:17

owner of the

2:19

software you just got and right to use

2:22

that software so we got legal authority

2:25

to use that

2:27

software the next term is

2:30

what is software deployment or what is

2:32

software

2:35

installation in order to get this

2:37

software installed on end users machine

2:41

that software needs to be deployed or

2:44

pushed onto the end users

2:47

machine early this job is getting

2:51

done with the help of service disk team

2:55

or it support

2:57

team sofware deployment

3:00

and software installation is going to be

3:02

the

3:04

same unless and until we install the

3:07

software application on end users

3:09

machine they will not be able to use

3:12

that software they will not be able to

3:15

work on the business requirement and if

3:17

you failed to install the software if

3:21

you didn't get the software installed on

3:23

your machine then you will fail to

3:25

achieve the business requirement and

3:27

definitely it is going to impact on the

3:29

business of your

3:31

organization so that's why installing

3:34

software on end users machine on time is

3:37

really very very important task which is

3:41

getting done with the help of it asset

3:43

management

3:45

team what is software

3:48

uninstallation software uninstallation

3:50

is nothing but removing the installed

3:52

software from end users

3:57

machine whenever we

4:00

done with the usage and there is no need

4:03

of software in that situation we may get

4:07

that software

4:08

uninstalled and we can use the same

4:12

software for another

4:14

user that is called as software reh

4:18

harvesting so in order to do the reh

4:20

harvesting software uninstallation is

4:22

very

4:23

important and most of the customer fail

4:25

to get the software uninstalled from the

4:28

xuser and without uninstalling they Ed

4:32

to Grant Authority or allocate that

4:34

license to the Y and that is going to be

4:37

the audit risk and they have to face a

4:40

lot when it comes to the audit so keep

4:42

in mind before transfer any software to

4:45

another user we have to get that

4:47

software uninstalled from the first user

4:50

for which we have done the

4:52

location and after that only we can

4:55

install it for the another

4:57

user next term is sof license Matrix

5:01

software license Matrix is very very

5:03

important aspect of the term in software

5:07

Asset Management because this

5:09

fundamental is going to help us to

5:12

understand the software usage the way we

5:15

can buy the

5:16

software we can measure the usage of

5:19

software and based on that we can

5:23

decide how much we have to pay to the

5:25

vendor or the

5:27

publisher how many quantities we are

5:29

going to use so usage measurement is

5:33

going to track with the help of software

5:35

license

5:36

metrics we will discuss different

5:39

metrics in upcoming sessions but for now

5:43

just keep in mind software license

5:44

metrics is helping us to understand the

5:48

usage of software the next time is

5:50

software reseller the software reseller

5:53

is a kind of bridge in between the

5:55

software publisher and the end user or

5:57

the customer who needs software

6:01

every time we cannot directly reach out

6:03

to the publisher or the owner and buy

6:07

the software from

6:09

them in that situation sometime we have

6:13

to buy the software or proc software

6:15

with the help of

6:17

reseller like

6:22

Shi you have to pay to the reseller and

6:24

you will get the software you have to

6:27

collect the purchase

6:28

proof and you can start using the

6:30

software by purchas purchasing it from

6:33

the

6:35

reseller then we have software product

6:40

description be it Hardware or

6:43

software each and every asset have some

6:47

detailed information that is called as

6:51

description if you talk about Hardware

6:53

asset like laptop desktop and server

6:56

whenever we are buying Hardware asset we

6:59

have have to collect the information

7:01

like the type of asset which you have

7:04

purchased the name of the vendor from

7:06

whom we have bought the uh

7:09

Hardware we should not the number of

7:11

quantities which we have purchased we

7:13

also have to track the warranty

7:18

details and we have to keep the purchase

7:20

proof handy with us because that is

7:23

going to be the one of the evidence for

7:26

us for the purchase of the asset when it

7:30

comes to the

7:32

software we have to collect the

7:34

information like

7:35

software name or the title of software

7:38

which we have purchased we should know

7:40

the number of quantities we have

7:41

purchased we should have information

7:44

about the software license metrics the

7:46

way we can use that

7:48

software we also know under which

7:51

agreements or contracts we have bought

7:53

the software

7:55

license we should know the license model

7:59

if the purchase software is Perpetual or

8:01

non-

8:04

Perpetual also we have to keep a track

8:06

about the

8:08

software user or the software allocation

8:11

to whom we are going to Grant the rights

8:14

to use that

8:16

software so these are the few basic

8:20

details which we have to capture in

8:22

order to collect the information about

8:24

the asset which we have

8:26

onboarded so next to that we have

8:31

software maintenance and Assurance the

8:33

software maintenance and Assurance is

8:36

helping us to understand the service

8:39

level which we have received from the

8:41

vendor or the

8:43

publisher with the help of software

8:45

assurance and maintenance we can upgrade

8:50

downgrade we can do the cross Edition

8:53

cross

8:56

platform based on the need if it don't

8:59

have active maintenance and

9:02

Assurance you won't be able to upgrade

9:04

your software you cannot expect the

9:07

support from the

9:10

publisher so that's the importance of

9:12

software assurance and maintenance

9:14

software agreement software agreement is

9:16

nothing but

9:18

the bonding or I will say the mutually

9:22

agreement in between two different

9:24

parties

9:26

where both the parties are agreed on

9:29

some certain terms and conditions by

9:32

accepting these terms and condition they

9:34

have to obey that terms and condition

9:37

there will like you will found some dos

9:39

and don't under the software license

9:42

agreement it will talk about the

9:45

security risk it will talk about the

9:47

usage rights it may talk about the

9:50

duration of your software contracts and

9:53

agreement your agreement started your

9:55

agreement

9:57

ended your renewal to

10:02

FMS so there are a lot of information

10:05

which is available in software

10:06

agreements which needs to be accepted by

10:09

publisher as well as the

10:12

customer along with that we will try to

10:14

understand different usage right or the

10:17

software usage

10:18

right here we have the software upgrade

10:22

right software downgrade right so

10:24

software upgrade right is talking about

10:27

upgrading your software from old version

10:29

into new version let's take an example

10:32

if we are using Windows

10:35

7 and due to the change in your

10:37

organization we have to move to the

10:38

Windows

10:40

10 so it is indicating that you are

10:43

moving from old version to new version

10:47

and that is called as software upgrade

10:50

right what about software downgrade so

10:53

software downgrade is talking about

10:55

moving down from latest version to old

10:58

version

11:00

if you take same example in reverse

11:02

order if you are already using Windows

11:04

10 and because of some reason you want

11:06

to move back to the Windows

11:08

7 it means that you want to downgrade

11:11

your software so moving down from latest

11:14

version to old version is your software

11:17

downgrade

11:18

right we also have cross Edition

11:22

route as we know there are lot of

11:25

editions available in the market

11:26

different publisher is having their own

11:28

Editions

11:30

but we will take some hypothetical

11:32

scenario where we know the home basic

11:35

Edition then we we are aware about the

11:38

standard edition we know the

11:40

professional Edition and we also know

11:42

the Enterprise

11:43

Edition so if you are using home basic

11:46

and you want to move to the standard so

11:49

what exactly you are expecting you want

11:51

to move from one edition to the another

11:53

Edition from home basic to standard or

11:57

standard to professional or professional

11:59

to Enterprise so if someone would like

12:02

to move from one software Edition to the

12:04

another software Edition so that is

12:06

going to be the cross Edition

12:09

right so how additions are

12:13

differ let's say your basic Edition

12:16

might have some minimal functions your

12:19

standard may have some additional

12:20

functions which is not available in

12:22

basic professional is having some

12:24

additional functions those are not

12:26

available in basic as well as standard

12:28

and

12:29

finally Enterprise includes all the

12:31

functions which we have in basic

12:33

standard and

12:34

professional and on top of that they

12:36

might have some extra functions those

12:40

are not available in three of them so

12:43

that is about the

12:47

additions now next we have the Ula end

12:50

user license

12:52

agreement you will always found Ula at

12:56

the time of installation of software we

12:59

have to accept some terms and

13:02

conditions while installing the software

13:04

we used to click

13:05

on we have to double click on the

13:08

executable file that is exe then we have

13:11

to click on next next and then we have

13:16

to click on some check bar check mark or

13:19

check bar where we have to accept some

13:23

terms and conditions and that is called

13:26

as Ula this terms and condition is

13:28

called as Ila Ila is nothing but your

13:31

end user license agreement that Ila is

13:35

helping us to

13:37

understand how can we use that software

13:40

what are the important dos and don'ts

13:44

has been written under the

13:47

Ula next term which we have OEM license

13:51

so what is OEM OEM is the original

13:53

equipment

13:54

manufacturer so em software is kind of

13:57

software which lives and dies with

14:00

Hardware so basically these are the

14:03

machine based softwares which comes with

14:06

hardware and dies with Hardware that's

14:10

why we are calling it out as a machine

14:12

based software those are attached to the

14:18

machine so life of em software will

14:20

always depend on the life of

14:22

Hardware we cannot transfer em software

14:26

from one machine to the another machine

14:31

if your Hardware crashed then your life

14:35

of your om software will

14:37

be

14:39

off or it will get

14:42

expired next we have the operating

14:44

system what is operating system it's

14:47

kind of system software without

14:49

operating system there is no value to

14:52

your laptop doesn't matter from which

14:55

brand you have purchased it even it's

14:58

Mac if we don't

15:00

have operating

15:02

system on your

15:06

MacBook then there is no value how much

15:09

you have spent to buy that

15:12

software so operating system is playing

15:15

very important role in order

15:18

to get your softwares or the application

15:21

software installed on your machine and

15:22

use your

15:26

laptop so what is EOL software or end of

15:31

life software so end of life software is

15:34

one of the

15:35

category where Publishers has announced

15:37

that they are no longer going to support

15:40

to these softwares even they are

15:43

Perpetual user can use this software on

15:46

their own risk but we cannot expect

15:49

support from the publisher like

15:51

Microsoft Adobe Oracle VMware so these

15:55

are the top Publishers we have hundreds

15:57

of publisher but I just called out name

15:59

of few

16:01

Publishers if they declare any product

16:04

end of life it is indicating that the

16:06

support from vender is over for that

16:08

product we have to use this on our own

16:11

risk and I will highly recommend if any

16:14

publisher announce any software end of

16:16

life don't use that

16:20

software because there will be very high

16:23

security risk and

16:27

if you got an attack you will have

16:31

to pay a lot for the same so request you

16:35

to don't go with the softwares those are

16:37

already announced by publisher as the

16:39

end of

16:40

life now we will try to

16:43

understand the inra of our organization

16:47

there is something called as data center

16:48

cluster server processor and core so

16:51

data center is one of the highly secured

16:54

zone of our organization where we can

16:57

expect the server so data center is also

17:00

called as server room so once we open

17:03

the data center you will found the

17:05

cluster so there will be different

17:07

cluster based on the bation of

17:10

application or the server or the usage

17:14

So within a data center you will found

17:15

different cluster like cluster a cluster

17:17

B cluster C within a cluster you will

17:20

found different server so group of

17:23

server is called as cluster So within a

17:26

server there is a import important part

17:30

which is processor and on top of

17:32

processor you will found core so One

17:35

processor might have multiple core and

17:38

one server might have multiple

17:41

processors so that is the basic

17:44

understanding about the data center

17:46

cluster server processor and core we are

17:50

going to discuss this in more detail

17:53

when it comes to the

17:57

licensing so now finally we are going to

18:00

discuss here about the software Security

18:02

Management as I have already explained

18:06

if any publisher announces any software

18:08

end of support we have to stop using

18:12

that software due to the security

18:15

compliance

18:17

risk also we have to make sure that we

18:21

are not going to use any software which

18:24

is

18:25

unauthorized which has been downloaded

18:27

from any Third Party Source

18:29

which is not verified by security and

18:32

compliance

18:34

team so once we done with that review

18:37

and we found that software is good to

18:39

install there is no risk associated with

18:41

that software then and then only we can

18:44

install that software in our

18:48

infrastructure so that security check is

18:51

very

18:52

important which we have to do before

18:55

installing any software so that's the

18:57

importance of Security

19:00

Management so guys in this session I

19:02

have tried my best

19:05

to explain multiple

19:09

terminologies at least I have given some

19:12

basic understanding what these terms

19:14

refers and then

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.