In all your other examples, they represent well-meaning individuals circumventing company security.
As an administrator, I'd be worried about showing employees how to by-pass security because it's convenient to do so. Who's to control their access after that?
Zach Dennis wrote:
Bob Hartung wrote:
Since my last posting, I've been trying to play devil's advocate with this technology. I've been trying to imagine legitimate scenarios for using this technology in a business environment. So far, I haven't been able to do it. It still seems to be a technology whose primary purpose is to thwart firewalls and company usage policies.
Well for starters. This is a great tool for the IS/IT dept in a company and especially for admins. Maybe this won't work well for a typical end user on a large corporate network, but this is great in smaller to medium sized businesses and even SOHOs. If this works well with VNC, then the worth of this product just went 100% in my book.
Here are some example scenarios:
- In the northern country where it snows, the finance gal gets snowed in or runs into a ditch (its happened before) so she works from home. She needs to access some files from her work computer. (Her home computer is also a company laptop). She calls the IT dept and makes a request. The IT dept set her up to vnc into her machine from home and to drag over her files (thx hamachi).
- A programmer codes both at home and at work. He does some sample coding at home late last night and then finds out tomorrow morning he needs that code. He vnc's in to his computer and drags the files over. (thx hamachi).
- Engineers from a regional office are visiting headquarters. Their meeting is at 2pm, it's 10am now. What to do for 4 hours. They get on an extra workstation and vnc into their up north computer and review some of their revisions from yesterday. They decide to include the new ideas in their 2pm meeting. So they generate a pdf of their latest cad files. They drag the pdf over to the current workstation, and print it out. (thx hamachi)
These are all scenarios our company has hit. And if I understand Hamachi right, the solution should be similar to what they are above in each example. If I dont' understand Hamachi right, please tell me.
Zach _______________________________________________ VNC-List mailing list VNC-List@realvnc.com To remove yourself from the list visit: http://www.realvnc.com/mailman/listinfo/vnc-list
-- ============================
Bob Hartung, Dir of I.T. c\o Wisco Industries, Inc. P. O. Box 10 736 Janesville St. Oregon, WI 53575
Phone: (608) 835-3106 x215 Fax: (608) 835-9644
email: bhartung(at)wiscoind.com _______________________________________________ VNC-List mailing list VNC-List@realvnc.com To remove yourself from the list visit: http://www.realvnc.com/mailman/listinfo/vnc-list