I should very much like to demand satisfaction from people who are badly in need of correction. Namely, those who use insults against me in lieu of argument. (I am not above answering insult with insult, of course.) When are we going to get internet VR boxing, so that I can realistically challenge some random dipshit who talks a lot of shit to a boxing match and announce his cowardice should he decline?
If you set ntlm auth = no, then Samba will reject plain NTLM and require either NTLM v2 (the normal case) or LANMAN (if you have bizzarely backdated your XP box). There is a risk that some software w2ill fail, so it's probably best if you create a pair of virtual servers, and set one up to use NTLMv2. As you find out what fails, you can move the unbroken services to the v2 server.
There is a duopoly of ISPs in Canada, so anything Bell Telephone or Rogers* Cable does affects a huge number of people, and an attempt to require anything that could be characterized as spyware would cause complaints to the Cabinet**.
* or any of the other local cable monopolies
** the Prime Minister and his heads of department
I think you're forgetting some of the benefits of paying someone else to do the work. I help maintain the cottage road, with a rake and shovel, and about ever 5 or 10 years we get a bulldozer and a load of gravel. I'd much prefer to pay the county a little bit every year in taxes, and get the road-grader to make an annual pass up and down the road.
They are a danger when you allow others to set controls on things you care about. The obvious example is UEFI boot, which is fine if you use it to select who can boot, and bad when Microsoft is making the decision about your device.
In the context of BYOD, I will happily grant MAC access over the camera and gps to an employer when I'm on their network, but they need to publicly agree with me on what they're doing. I and many other people will likely grant an employer the right to encrypt the company's files, so long as they agree not to encrypt or delete mine on the same device.
The asymmetry of power poses a risk even in the acceptable cases, so arguably one should only use mac-implementing programs from a trusted third party, like a Google or Apple.
Various companies happily allow BYOD phones, and allow one to expense a proportion of one's bill to the company. A subset of them expect BYOD pads and laptops.
In general, a company could permit almost any device if it provides "mandatory access controls", such as lockouts for the camera when in the office network, and encrypt-all-corporate-data using a company key. The general case was figured out circa 1985 (orange book) and encryption-as-MAC by the personal electronic health care records in the last few years.
It's more tied than that: I physically can drop the new engine into the Ford, but the surface had hardware to keep me from doing so. I have to use a motorcycle example for this: removing the engine from a Vincent black shadow renders it unrunnable, as the engine is a required part of the frame. Non-identical engines can't be substituted (unlike featherbed Nortons).
Personally, I want the better of the two Surface keyboards, which a colleague described as the best small keyboard he'd ever used. Alas, the keyboard is tied to the platform, which is tied to Windows 8. I suspect they'll only be available via purchasing a Surface for some considerable time, thus the interest in making the whole surface run Linux. I will definitely investigate the "plus", which reportedly does have an Intel processor, and may have the keyboard...
"We shall reach greater and greater platitudes of achievement." -- Richard J. Daley