On my school campus
Ok, it's pretty easy to see why you don't understand why email is still (unfortunately) relevant, but give it a couple years in a corporate or medium business; none of the services you mention have even half the features of email.
Word is still instruemental
Oh if only you had used Word (or Firefox, or OpenOffice) to compose this message it would have been spell checked!
I don't know of anyplace in the U.S where the speed limit is posted in minimums for that matter either.
I live in Baltimore, and I'm about to hop on I-83 to get to work, which has a 40mph minimum and a 50 mph maximum. As in there are signs that say "Minimum speed 40mph"
Blackberries on BES offer enterprise features simply unheard of with Winmobile or iphone devices.
Maybe unheard of to you. http://technet.microsoft.com/en-us/library/bb123484.aspx I count well over 100 group policy settings that can be applied through Activesync to a Windows Mobile 6.1 device. Some of these actually do work on an iPhone as well, such as the password and phone lock policies.
Windows mobile only recently got the much needed security features such as remote device deactivation and wiping.
Windows Mobile + Exchange 2003/2007 have had this functionality since 2005 at the release of Exchange 2003 SP2 http://www.microsoft.com/DOWNLOADS/details.aspx?familyid=535BEF85-3096-45F8-AA43-60F1F58B3C40&displaylang=en. It even works on an iPhone. I'd hardly call 2005 "recent" in the IT world.
Why, exactly, shouldn't it?
Uh... because when you're getting wrecked by those goddamn green hopping jerk bug things, you can't press "start," type in "Justin Bailey," kill them, turn the cheat off and then continue on.
For that matter, Contra also had a cheat built-in. Or does that one "not count" too?
Correct, it does not count. You can only activate it at the very beginning of the game, just like with Justin Bailey; you can't turn it on, pass a hard part, and then turn it off. That's what the summary is talking about.
Once the VPN is connected, for all intents and purposes the equipment on both ends of the line are on the same LAN
You're missing the point, which is that whether or not you're connected to the VPN, chances are good that your browser stores some credential information. If you're on a LAN that's the same subnet as your VPN endpoint, then once you disconnect, a malicious local user would be able to coax your browser to give up cookies about the VPN-accessed pages. Your browser uses IP addresses to associate a cookie with a host, which is what makes this possible, and explains why the certificate model of HTTPS on the corporate Intranet foils this attack.
"Religion is something left over from the infancy of our intelligence, it will fade away as we adopt reason and science as our guidelines." -- Bertrand Russell