|
|
You want me to do what?
I'll agree that not everyone will find this useful, but only because it requires action on the part of the user. Anyone else in computer support will probably understand this instantly. The problem is not the idea, rather the same problem encountered in the importance of backing up your computer. Everyone should do it, all the time, but it's rare that it's taken seriously. Ask someone if they want better security, and the answer will undoubtedly be yes. Ask the same person to spend a little money and time to get it, and see what happens. This is the future of security, but until your new Mac comes with a Keychain keychain (heh) people won't do it. It will be more up to Apple to support this kind of sensible solution to security in software/hardware. I can't wait until you are wirelessly authenticated by the tiny device in your pocket or built into your watch as you approach any computer, and logged out when you walk out...
You want me to do what?
I can't wait until you are wirelessly authenticated by the tiny device in your pocket or built into your watch as you approach any computer, and logged out when you walk out...
That might be an interesting business opportunity.. I'm surprised someone hasn't already done it, given the Apple already supports bluetooth. Jim
You want me to do what?
It seems that a watch or a device in a pocket would be a lot easier to steal than a password...
You want me to do what?
>>> I can't wait until you are wirelessly authenticated by the
You want me to do what?
you mean like clicker? http://homepage.mac.com/jonassalling/Shareware/index.html
You want me to do what?
>I can't wait until you are wirelessly authenticated by the tiny
Clicker for Tungsten T...?
... or any other BlueTooth device besides the Sony Ericsson phones? Or a program with similar capabilities for alternative BlueTooth devices? TIA.
Well...
What I meant is I can't wait until there's wireless pocket authentication that's easy, built-in, and available to everyone, not just people with a certain phone or gadget, supported third-party. When this happens, your pocket I.D. could carry your login prefs and other such things, so if you went to work, or a friend's house, or a public computer, you'd get logged in, presented with your own desktop, with your own user home connected via internet. Seamless transitions wherever you go... |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.09 seconds |
|