Reading an email on the big list...

Now that is something I hadn't considered but should 
be headslap obvious.  The operating system security 
features for user authentication and access privileges 
can actually be a control in a virtual reality fiction 
because it depends on roles.

Kinda of a warped way to do it, but perfectly doable 
and exactly how we make access to information and 
modules configured in enterprise systems.


Len 
http://www.mp3.com/LenBullard

Ekam sat.h, Vipraah bahudhaa vadanti.
Daamyata. Datta. Dayadhvam.h

Reply via email to