Where I worked, before retirement, we were using a CAC to access our workplace machines for over 6 years. A friend who works for a civilian agency lives with a system that has each machine dedicated to a specific user. If his machine goes down or he goes to another office/location, he cannot log on to a computer. With the CAC, we were theoretically able to log on to access any similarly protected, networked computer. A new account automatically created for the new user on that machine. This made the change-out of defective equipment very easy which minimized downtime for the employee. Obviously, this strategy works when all user data is available on networked shares or in "the cloud".
YMMV > > A complacent attitude about the technology plans of the new > administration opens to door for fear mongers to take over... > > http://www.nytimes.com/2008/12/09/technology/09security.html > > "Restricting Internet access is one of a series of recommendations that a > group of more than 60 government and business computer security > specialists will make in a public presentation, "Securing Cyberspace in > the 44th Presidency," on Monday. The report has been prepared during the > last 18 months under the auspices of the Center for Strategic and > International Studies, a Washington policy group, after a number of > break-ins into government computer systems." > > This will certainly make it easier for advertisers to track and measure > consumer behavior. And easier to nail those bald guys who criminally > claim otherwise. > > ************************************************************************* ** List info, subscription management, list rules, archives, privacy ** ** policy, calmness, a member map, and more at http://www.cguys.org/ ** *************************************************************************
