I've been looking for something exactly like that, but for my Windows Vista notebook, that way, I can use my notebook mics and speakers as a hands free phone. HFP for Linux would be great, but not being much of a Microsoft code monkey, I doubt I could get it to work.
Patrick (thpdg (519053)), any ideas if the software for those dongles would work with the "HP Integrated Module with Bluetooth 2.0 Wireless Technology" in my notebook?
I don't know. I'm kinda fond of the real ones. And last I checked, they still worked OK. We just may need a few more of them. Maybe we could plant them on the top of some of those buildings.
This sounds somewhat like the way the "Stargate" works in Stargate SG-1 and Atlantis, the main difference is this is a bubble rather than a tube between locations that are generating the "extremely large amounts of energy". We just need to find a few Zero Point Modules. Problem solved!
There's been a male contraceptive for a long time! All you need to do is put a sharp rock in your left shoe. It makes you limp.
While this was an interesting article, the XP and the Vista versions used by the USAF are the same ones used by the general public. The only differences are the security setting, the firewall configuration, and the user configuration. No one is an admin unless they need to be, and no normal day-to-day work is done in admin mode (same thing you do in Linux, no doubt).
I didn't know this article was going to be published, but when I found it, I was not surprised by the comments. I've been working on this program for more than 2 years. Users hate it. Developers loathe it. Network security staff loves it.
Nothing can make Windows (or any other OS) completely secure if it's connected to a network. This is as close as the federal government as ever come.
OK, while I agree that cyber- anything has been over used, the Air Force has already stepped forward ahead of the other services to stand up a "Cyber Command". However, USSRATCOM has Cyber warfare and defense in its mission statement. A joint task force is the most likely form of any cyber-related activity, either offensive or defensive. The big problem is, how can you defend against something when it's already inside your walls? The Pentagon's networks have been infiltrated more times than I can count with bare feet and my pants down (more than 21). Not to mention DOE computers. All networks are vulnerable if they are connected to the Internet. No one service can do the entire job.
I know from experience that, in the USAF at least, there is a technology lag WRT power savings. Too many old computers that won't wake-on-LAN, too many older servers that won't support Microsoft's SCCM (the new flavor of SMS). We are constantly dealing with computers not getting updated because they were powered off, making them more vulnerable than other computers on the network. And if PCs are put in "sleep" mode and will WOL, if the server isn't running SCCM, you can't send the WOL to wake them up before pushing patches.
It all comes down to this: you need to spend money to save money. The federal government mandated that all agencies use less energy, but they're all spending more than the savings to get there.
I think I missed something somewhere.
Leveraging always beats prototyping.