It can be stored on OneDrive and doing so allows you to access your information from almost anyhwere using almost any device.
That also allows Microsoft to access my data.
Since others have said the free version requires the use of storage on Microsoft's computers, I suspect Microsoft will be scanning the OneNote data for monetizing purposes. Why else would they prevent the free OneNote users from storing data on non-Microsoft servers?
.
If all she really needs is email and a browser, look for the simplest, cleanest UI you can find that provides that very basic functionality. Then configure the UI to looks like what she is used to - Windows XP.
Don't over complicate the transition with things you might think are cool, just keep it complicated enough to meet her needs, no more.
"Any intelligent fool can make things bigger and more complex... It takes a touch of genius --- and a lot of courage to move in the opposite direction."
--Albert Einstein
.
Dell is desperate for revenue at this point, and when companies are desperate for revenue they do customer-antagonistic things.
Then you shouldn't install its signing certificate on your computer.
In a work environment, I may not have that option.
trusted proxy
Trusted by whom? I certainly don't trust a MiTM proxy, even when it has the word "trusted" in its name.
.
I know you are a proponent of strlcpy. Why do you think some projects resist using it so much?
For example, I think there is a problem with our healthcare system when we end up as a nation (USA) consuming 80% of all painkillers prescribed worldwide
Painkillers are a social addiction problem, not a healthcare problem.
.
In order to solve a problem, you first must identify it accurately.
.
It is far easier to remain ignorant and wallow in your collection of misinformation, than to understand the scientific evidence.
Normally, I don't have an issue with ignorant people choosing to remain ignorant. Unfortunately, in this instance it means more disease for all of us.
.
Just trying to figure out which version of which browser supports what subset of CSS is one of the greatest puzzles facing mankind.....
If you care about Internet security, especially what we call "end-to-end" security free from easy snooping by ISPs, carriers, or other intermediaries, heads up! You'll want to pay attention to this.
You'd think that with so many concerns these days about whether the likes of AT&T, Verizon, and other telecom companies can be trusted not to turn our data over to third parties whom we haven't authorized, that a plan to formalize a mechanism for ISP and other "man-in-the-middle" snooping would be laughed off the Net.
But apparently the authors of IETF (Internet Engineering Task Force) Internet-Draft "Explicit Trusted Proxy in HTTP/2.0" (14 Feb 2014) haven't gotten the message.
What they propose for the new HTTP/2.0 protocol is nothing short of officially sanctioned snooping.
UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker