Re: Show what I'm doing, show what you're doing

Subject: Re: Show what I'm doing, show what you're doing
From: Tony Chung <tonyc -at- tonychung -dot- ca>
To: Gregory P Sweet <gps03 -at- health -dot- state -dot- ny -dot- us>
Date: Fri, 16 Nov 2012 16:48:44 -0800

Add TeamViewer to the list. And behind the company firewall we've always
used MS Remote Desktop.

And if screen casting is all that's required, our
UX team were big on Jing.


On Friday, November 16, 2012, Gregory P Sweet wrote:

> There really are not any unsecured screen sharing applications on the
> market today. GotoMeeting, WebEx, Adobe Connect, are the big players in the
> marketplace.
> WebEx and Connect offer free version of their products that allow for up to
> 3 participants.
> WebEx and Connect both allow remote participants to take over Mouse and
> Keyboard from the presenter, but there is no security concern there since
> the presenter can cancel the access by just clicking on the screen.
> Connect allows you to create pods for just about anything, including
> multiple screen sharing pods you can assign to the remote participants --
> handy if you want to watch a group complete a task ala the instructor
> standing behind the row of students.
> All 3 provide the ability to share your entire desktop or specific
> applications
> WebEx and Connect can also share single documents
> WebEx and Connect everything shared is also a whiteboard with group
> annotation if allowed.
> Goto does not allow group annotation
> Since I've been using WebEx for about seven years that where my expertise
> lies. One of the major security features of WebEx (at least before Cisco
> bought them, not sure how much of this Cisco has torn down, they don't talk
> about it) was the Mediatone network -- WebEx owned and maintained a
> private, world-wide, real-time switched network. None of what you shared
> was persistent on the network it was just switched from your machine to
> your remote participants. Once the pack was at the remote participants
> there was nothing on the servers to steal.
> Most of these systems work and achieve the efficiency they do (think
> broadcast slides to 3000 end points with fraction of second latency) by
> taking a snapshot of your screen and broadcasting it. Then they constantly
> take snapshots (like a movie camera) but only transmit the pixels that
> change, so even if some data did leak out, chances are it would be a
> useless slice of screen near the mouse. Someone would have to break in and
> steal the whole stream to get anything useful. In most cases, unless you
> record the session and store it on the hosts servers or upload documents to
> the host servers, nothing persists after the session.
> -Greg
Writer Tip: Create 10 different outputs with Doc-To-Help -- including Mobile and EPUB.

Read all about them:

You are currently subscribed to TECHWR-L as archive -at- web -dot- techwr-l -dot- com -dot-

To unsubscribe send a blank email to
techwr-l-leave -at- lists -dot- techwr-l -dot- com

Send administrative questions to admin -at- techwr-l -dot- com -dot- Visit for more resources and info.

Looking for articles on Technical Communications? Head over to our online magazine at

Looking for the archived Techwr-l email discussions? Search our public email archives @


Show what I'm doing, show what you're doing: From: McLauchlan, Kevin
Re: Show what I'm doing, show what you're doing: From: Gregory P Sweet

Previous by Author: Re: Quark 8 to InDesign 6
Next by Author: Re: Article: "What is it like to be a business analyst?"
Previous by Thread: Re: Show what I'm doing, show what you're doing
Next by Thread: RE: Show what I'm doing, show what you're doing

What this post helpful? Share it with friends and colleagues:

Sponsored Ads