Where I worked, before retirement, we were using a CAC to access our
workplace machines for over 6 years. A friend who works for a civilian
agency lives with a system that has each machine dedicated to a
specific user. If his machine goes down or he goes to another
office/location, he cannot log on to a computer. With the CAC, we were
theoretically able to log on to access any similarly protected,
networked computer. A new account automatically created for the new
user on that machine. This made the change-out of defective equipment
very easy which minimized downtime for the employee. Obviously, this
strategy works when all user data is available on networked shares or
in "the cloud".

YMMV


>
>  A complacent attitude about the technology plans of the new
>  administration opens to door for fear mongers to take over...
>
>  http://www.nytimes.com/2008/12/09/technology/09security.html
>
>  "Restricting Internet access is one of a series of recommendations that a
>  group of more than 60 government and business computer security
>  specialists will make in a public presentation, "Securing Cyberspace in
>  the 44th Presidency," on Monday. The report has been prepared during the
>  last 18 months under the auspices of the Center for Strategic and
>  International Studies, a Washington policy group, after a number of
>  break-ins into government computer systems."
>
>  This will certainly make it easier for advertisers to track and measure
>  consumer behavior. And easier to nail those bald guys who criminally
>  claim otherwise.
>
>


*************************************************************************
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*************************************************************************

Reply via email to