Author Topic: Remote Desktop Connections: The future?  (Read 1295 times)

Oh, yeah, I heard about something like that, where graphics could be rendered remotely and sent to you basically as a streaming video. I wonder about latency, though.
OnLive, it renders games on low settings at 720p.  Not great.  Sandy Bridge is way better of a solution

Soon enough, computers will have a system where all you buy is the monitor with an ethernet jack. The computer itself is somewhere else in the world with incredible hardware, but you get to control it locally. Can you imagine the possibilities with this?
You've basically described a thin client.

Not really the future, because physical computers will never become truly obsolete. Especially considering a remote connection would NEVER be done for the government, makes hacking way easier.
I'm not sure I understand your post. These sorts of connections are done all the time by the government and private companies and have been done for decades. Traffic encryption is easily taken care of using some sort of VPN client and a Verisign, RSA, or similar security token on a keychain in addition to a standard password login. It's true that most places have a policy against using public computers (like a library) to access content, but there is nothing stopping me from sticking a bunch of rack mountable computers in a server rack and just issuing a monitor, keyboard, and a booksized computer that basically holds a network interface and a graphics card to my employees. There can be maintenance, power consumption, and efficiency advantages to this setup, and it's no less secure than a normal office setup.

I'm not sure I understand your post. These sorts of connections are done all the time by the government and private companies and have been done for decades. Traffic encryption is easily taken care of using some sort of VPN client and a Verisign, RSA, or similar security token on a keychain in addition to a standard password login. It's true that most places have a policy against using public computers (like a library) to access content, but there is nothing stopping me from sticking a bunch of rack mountable computers in a server rack and just issuing a monitor, keyboard, and a booksized computer that basically holds a network interface and a graphics card to my employees. There can be maintenance, power consumption, and efficiency advantages to this setup, and it's no less secure than a normal office setup.



I guess yeah, you could use a Verisign security token and the password log in. I was thinking of it in this sense;

Basically the user doesn't get to choose where their central hub is located, and I kinda figured it would have been the same for the government until I thought that out and realized how irrationally stupid that sounded. Essentially yeah it is perfectly secure, but wouldn't it open a lot of doors for hackers to physically bridge a connection? Say they have physical access to the hub of computers the government uses, they could just throw their rig in there, plug into their connection(if they use the ethernet method mack was talking about) and then basically fish their data through the public connection?