X compression techniques (was Re: VNC server based on kdrive using damage extension?)

Gian Filippo Pinzari pinzari@nomachine.com
Fri, 20 Feb 2004 21:40:12 +0100


Jim Gettys wrote:
> Getting a decent authentication and authorization model is also
> needed; 

This is an interesting field that X has left behind
that's worth exploring.


> But it is well understood that
> applications level security may be more desirable in many
> circumstances.

Absolutely right.

/Gian Filippo.