Approach 4: Proxy Logins
Let users log in to their hand-held terminals; let the terminals act as proxies when talking to other systems.
There isn’t enough extra memory in the terminals.
How do we administer the logins on these terminals?
The rest of the system architecture isn’t built for that sort of thing.