Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Does the droid and iPhone do this?! (Score 1) 668

Well if you don't want to play with the rom, try this shell, I run and enjoy it, it doesn't have the same issues you'll find with the htc sense, although some features are different from the htc sense configuration, I feel she will enjoy it as much if not better, it also has a droidish flavor to it. http://www.youtube.com/watch?v=kW62zRLns3w

Comment Re:Does the droid and iPhone do this?! (Score 1) 668

Seems like a powerful tool to have; i use the hd2 and enjoy the platform. Unfortunately, it seems that I would need a mix of the services available on this tool, I don't need everything Professional offers but need more than basic; For now however, I am satisfied using rdp with my phone, most my tools I need are on my computer and can access them from my phone. However, it is interesting to find out that these features are supported on both the android and iPhone, I think I will test the Android out first before deploying on the network; since I don't need to jail-break the Android to use ssh, vnc, and rdp.

Comment Does the droid and iPhone do this?! (Score 0) 668

Support remote desktop? I work in an enterprise environment and have found the feature very useful when away from my desk. When I'm on the production floor troubleshooting an issue and need to do a novell password reset; I just unlock my phone, enable remote desktop connection, log into my work machine and reset the password without ever having to leave the machine i'm trouble shooting. This saves me time; otherwise I would have to walk back to my terminal just to reset a password and then walk back to the client machine and continue troubleshooting. Any takers?

Comment Are we going to far?! (Score 1) 804

I can understand the basic principle. If they allow leniency on one student breaking a rule then they allow all students breaking all rules. This logic may sound contrived - and I agree is a generalization - it's principles are not. Essentially, if they excused her then more students would follow suit. However, we are speaking about a candy and not a violent crime. Should we consider behavior modification over punishment? I believe that if you educate and inform individuals they will understand their crimes and why it is a crime ( or breaking rules ) they over time will modify their behavior, but if you only punish a student without educating them why they are receiving that punishment they will lack that understanding and will not modify their behavior. Really, it boils down to personal liberties and the over-reaching-hand of the state administrators. I understand that child obesity is a serious health concern for all U.S. states, it not only impacts the health of students but also taxes our tax dollars - not to be a pun. We will spend more money for child and adult health care for health issue's resulting from an unhealthful diet. I say adults because the children will maintain their poor eating habits well into their adulthood and continue to stress our health care system. This is why I say education and information over punishment. The child doesn't look overweight to me and she has all her teeth, so it seems to me that through deductive reasoning I can deduce that poor nutrition is not an issue for this child. I mean give her a break, it was a Jolly Rancher and not a pistol.
Desktops (Apple)

Submission + - As Macs make their way into the enterprise, IT nee (infoworld.com)

irreverant writes: Many IT and security managers who have focused on securing Windows need to turn their attention to the Mac OS, as these six Mac security flaws attest. And with Macs increasingly making their way into the enterprise, they shouldn't wait: According to a recent Yankee Group study, 80 percent of senior managers at 700 companies had Macs in house, with 21 percent boasting 50 or more Macs in use.

Comment What's really scary.... (Score 5, Insightful) 115

Is the fact that they were trying to sell the knock-offs to the DOD for use with Marine Corp forces. My cousin is out there right now, and to know that operation critical hardware could fail because it's a knock-off and poorly manufactured - is the worst crime. These are our troops, brothers, sisters, friends, and family members. I would hate to think my cousin died because somewhere in someplace a network card failed to relay operational data.

Comment It was never a battle..... (Score 1) 389

Does any one remember WinNuke and 95, 98.a, since then it's been a joyride, cDc with back orifice. There will always be methodologies to penetrate microcomputers as long as an incentive exists. The only way to win this 'battle' is to remove the user from the equation; We all know this won't be happening... so live ignorantly and make do with your computer in some state of fault. Happy surfing!

Slashdot Top Deals

There's nothing worse for your business than extra Santa Clauses smoking in the men's room. -- W. Bossert

Working...