Help refine how SWID tags are used in the real world

Help-Refine-How-SWID-Tags-are-Used-in-the-Real-World

Ever wanted to be part of a Standards development process? – now’s your chance!

Until May 31, the Trusted Computing Group has the SWID Message and Attributes specification available for review and public comment.

This is a relatively vertically focused standard and will be primarily of interest to people who are familiar with the TCG Trusted Network Connect architecture.

Software Identification (SWID) tags are gaining significant traction in the industry as IBM now deploys all their non-mainframe software with SWID tags, and Microsoft, Symantec and other large commercial entities are also deploying SWID tags with their software titles. SWID tags allow significantly more automation of organizational IT Asset Management, Security and Logistics processes, and will make these processes significantly more accurate and less costly to manage. For more information on SWID tags, see http://tagvault.org.

The web page provided above gives the details on how to download the specification and report any issues/problems you discover.

Share this post

Share this post on your favourite social media platform.

Find this article useful?

If so please click here