<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2654.45">
<TITLE>RE: [AccessD] Secured vs. Unsecured FEs</TITLE>
</HEAD>
<BODY>
<P><FONT SIZE=2><...my goal at this stage of my retirement is to convince every client that I</FONT>
<BR><FONT SIZE=2>can support them over a high-speed VPN ...from Costa Rica :))))))))))))))))></FONT>
</P>
<P><FONT SIZE=2>No fair, u stole my idea :-)) High speed lines outside of San Jose can still be a problem, however.</FONT>
<BR><FONT SIZE=2>Jim h</FONT>
</P>
<P><FONT SIZE=2>-----Original Message-----</FONT>
<BR><FONT SIZE=2>From: William Hindman [<A HREF="mailto:wdhindman@bellsouth.net">mailto:wdhindman@bellsouth.net</A>]</FONT>
<BR><FONT SIZE=2>Sent: Monday, April 21, 2003 9:30 AM</FONT>
<BR><FONT SIZE=2>To: accessd@databaseadvisors.com</FONT>
<BR><FONT SIZE=2>Subject: Re: [AccessD] Secured vs. Unsecured FEs</FONT>
</P>
<BR>
<P><FONT SIZE=2>...send him to me! :)))</FONT>
</P>
<P><FONT SIZE=2>...my goal at this stage of my retirement is to convince every client that I</FONT>
<BR><FONT SIZE=2>can support them over a high-speed VPN ...from Costa Rica :))))))))))))))))</FONT>
</P>
<P><FONT SIZE=2>...the only objection I'd have is that you definitely want to work on one of</FONT>
<BR><FONT SIZE=2>their workstations rather than on their server ...otherwise, as long as you</FONT>
<BR><FONT SIZE=2>secure your code, I don't see the problem ...unless you mean he's actually</FONT>
<BR><FONT SIZE=2>expecting you to accomplish ALL development across the VPN rather than just</FONT>
<BR><FONT SIZE=2>interfacing with his systems for installation and maintenance ...now that</FONT>
<BR><FONT SIZE=2>could be a real drag since the term "high speed VPN" is essentially</FONT>
<BR><FONT SIZE=2>meaningless in a development mode ...he'd have to give you a dedicated T1 to</FONT>
<BR><FONT SIZE=2>keep you as productive as you are on a local workstation ...and even then</FONT>
<BR><FONT SIZE=2>there would be problems such as access to all your own code libraries,</FONT>
<BR><FONT SIZE=2>development tools, and template mdbs :(</FONT>
</P>
<P><FONT SIZE=2>William Hindman</FONT>
<BR><FONT SIZE=2>"All it takes for evil to prevail is for good men to do nothing." Edmund</FONT>
<BR><FONT SIZE=2>Burke</FONT>
</P>
<BR>
<P><FONT SIZE=2>----- Original Message -----</FONT>
<BR><FONT SIZE=2>From: "Michael R Mattys" <michael.mattys@adelphia.net></FONT>
<BR><FONT SIZE=2>To: <accessd@databaseadvisors.com></FONT>
<BR><FONT SIZE=2>Sent: Monday, April 21, 2003 10:05 AM</FONT>
<BR><FONT SIZE=2>Subject: Re: [AccessD] Secured vs. Unsecured FEs</FONT>
</P>
<BR>
<P><FONT SIZE=2>> I have a client who wants me to do all development</FONT>
<BR><FONT SIZE=2>> over a high-speed VPN on their server.</FONT>
<BR><FONT SIZE=2>></FONT>
<BR><FONT SIZE=2>> In what manner should I agree to this? Or not?</FONT>
<BR><FONT SIZE=2>></FONT>
<BR><FONT SIZE=2>> Mike Mattys</FONT>
<BR><FONT SIZE=2>></FONT>
<BR><FONT SIZE=2>> ----- Original Message -----</FONT>
<BR><FONT SIZE=2>> From: "William Hindman" <wdhindman@bellsouth.net></FONT>
<BR><FONT SIZE=2>> > ...yes, always unless the client stipulates otherwise ...and then I</FONT>
<BR><FONT SIZE=2>> include</FONT>
<BR><FONT SIZE=2>> > a clause about individual copyrights where such code is used AND charge</FONT>
<BR><FONT SIZE=2>> him</FONT>
<BR><FONT SIZE=2>> > a stiff differential for it ...client response varies ...most really</FONT>
<BR><FONT SIZE=2>don't</FONT>
<BR><FONT SIZE=2>> > care about the code, they get it confused with the ownership of their</FONT>
<BR><FONT SIZE=2>data</FONT>
<BR><FONT SIZE=2>> > ...but for those that do, its available.</FONT>
<BR><FONT SIZE=2>> ></FONT>
<BR><FONT SIZE=2>> > William Hindman</FONT>
<BR><FONT SIZE=2>> > "All it takes for evil to prevail is for good men to do nothing." Edmund</FONT>
<BR><FONT SIZE=2>> > Burke</FONT>
<BR><FONT SIZE=2>> ></FONT>
<BR><FONT SIZE=2>> > ----- Original Message -----</FONT>
<BR><FONT SIZE=2>> > From: "Stephen Bond" <stephen@bondsoftware.co.nz></FONT>
<BR><FONT SIZE=2>> > > William, do you ever assert ownership of the code at the beginning of</FONT>
<BR><FONT SIZE=2>a</FONT>
<BR><FONT SIZE=2>> > contract? Down here, the law says it is the client's unless asserted at</FONT>
<BR><FONT SIZE=2>> the</FONT>
<BR><FONT SIZE=2>> > start of the contract, so I do.</FONT>
<BR><FONT SIZE=2>></FONT>
<BR><FONT SIZE=2>></FONT>
<BR><FONT SIZE=2>> _______________________________________________</FONT>
<BR><FONT SIZE=2>> AccessD mailing list</FONT>
<BR><FONT SIZE=2>> AccessD@databaseadvisors.com</FONT>
<BR><FONT SIZE=2>> <A HREF="http://databaseadvisors.com/mailman/listinfo/accessd" TARGET="_blank">http://databaseadvisors.com/mailman/listinfo/accessd</A></FONT>
<BR><FONT SIZE=2>> Website: <A HREF="http://www.databaseadvisors.com" TARGET="_blank">http://www.databaseadvisors.com</A></FONT>
<BR><FONT SIZE=2>></FONT>
</P>
<BR>
<P><FONT SIZE=2>_______________________________________________</FONT>
<BR><FONT SIZE=2>AccessD mailing list</FONT>
<BR><FONT SIZE=2>AccessD@databaseadvisors.com</FONT>
<BR><FONT SIZE=2><A HREF="http://databaseadvisors.com/mailman/listinfo/accessd" TARGET="_blank">http://databaseadvisors.com/mailman/listinfo/accessd</A></FONT>
<BR><FONT SIZE=2>Website: <A HREF="http://www.databaseadvisors.com" TARGET="_blank">http://www.databaseadvisors.com</A></FONT>
</P>
</BODY>
</HTML>