. . . . "Environments can be remotely manipulated and accessed from computers, terminals, web browsers, handheld devices, or other devices." . .