Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment What do YOU recomend? (Score 1) 202

The discussion thus far: civvies use CD-R's and businesses use tape.

...HOWEVER...

As a new professional to the field, I am unsure what I should be recommending to my family and friends. CD's and even DVD's aren't bad options, but their size becomes problematic when storing volumes of family photographs and video, in addition to the personal detritus of an online presence: funny photos, music, recipes, chat logs, etc. Tape is noted for its capacity, and longevity under the correct circumstances, but is expensive and susceptible to the same troubles as cassettes. I have also used active hard drives, but have found trying to keep data long-term on a spinning disk is just begging for a head-crash. Flash media is expensive, of limited size, and untested in long-term storage (I have lost most of my data stored on early flash drives).

So, what do I recommend to my family and friends? Should I continue to recommend quality CD's, DVD's, and correct storage procedures? Should I set up a http://blog.backblaze.com/2009/09/01/petabytes-on-a-budget-how-to-build-cheap-cloud-storage/ (with a RAID setup) like service for them and be prepared to transfer files to a new system every 7-10 years? What do I do about changing file types?

Comment 200 -- No Thermopylae Pass (Score 1) 300

$200 is a reasonable target.
Last year, I bought a computer I intended to keep for several years: the cpu/mb/ram cost me $120 from a box-mart. Now, I'll throw in another 70 to 90 dollars for case/psu/kbd/mouse depending on styles and wattages.
In addition, I often see pre-assembled towers for $150. If you need a computer for cheap, talk to your friendly neighborhood nerd/geek/dork. (except that if you are here, you likely are that person: yes, we are pretty much doomed)

Comment Widespread Encryption (Score 5, Interesting) 294

...And I say we need to be encrypting our traffic anyway. The average computer contains more than enough processing power, and the average 'pipe' width can easily handle the extra resources needed for widespread use of encryption in day-to-day use.

In addition, the recent trend in government is towards snooping and perv-ish behavior: China with its "great" firewall, USA with its unwarranted spying and packet sniffing, and now the UK with its new "three-strikes" policies. I pay my ISP a significant sum of money to deliver me 1s and 0s as fast as they can, and there are very, very few exceptions in which they have a need to know what those 1s and 0s add up to.

I call upon the open source community to lead the way -- while I would love to see the big leagues (Microsoft, Apple, etc) apply their tonnage behind such a problem, pigs are more likely to fly first. How hard would it be for a browser to automatically attempt to negotiate a secure connection for every visited web page and only use normal, unencrypted access when a secure connection fails or cannot be completed in a secure amount of time? People running web servers would not have to make major modifications, only implement a new protocol.

Comment Options (Score 1) 699

"The Internet interprets censorship as damage and routes around it." -- John Gilmore

My personal recommendation is to build/buy a cheap server to act as an intermediate machine. This machine can be patched and posed as required to use the school networks, and you can run whatever you want on your personal machine. This intermediate doesn't have to be anything special or powerful and I'll bet your local CS student/ friendly neighborhood haxor can put something together for under $50. I would recommend a dual NIC setup.

You do still have all the traditional options of swapping out NICs every 2 weeks, reverse engineering the software (which would be helpful for the rest of us), etc

Comment Historical Analogies (Score 1) 426

Are there any papers out there that compare the evolution and eventual separation of the air-forces of the world to the evolution of the modern computer forces? Originally airplanes were contained within the branches of the Armies and Navies and led by generals and admirals who were unable and unwilling to use them to their fullest extent. I see the same pattern today.

Comment Fighting the good fight. (Score 1) 931

Point #1: This is an unknown United States High School of an unknown State. Rules and regulations vary between states and public and private high schools.
Point #2: You (student) own the physical property consisting of the binder, the paper, the ink you wrote with, the tabs, etc. You also own the derivative intellectual property of both the notes from her class and any other class you took notes in that happen to be in that binder. You also own the the absolute intellectual property of any doodles, poetry, and notes you took on subjects not related to the classes you took (ie. "I love Sarah", "My economics teacher is a moron"). If the binder in question was a zipper binder like I use, you also own the pens, the disks, the Scantrons, the gum wrappers, etc contained within.
Point #4, Followup: If this teacher is somehow still teaching next semester, form a student club (or just a bunch of trustworthy dudes/gals who are skilled at taking notes), and scan their notes. Post to a blog or the Pirate Bay.
Point #5:For further ideas, read Cory Doctorow's Little Brother, or just about any blog or article on privacy rights. Hell, read the constitution.

Slashdot Top Deals

I cannot draw a cart, nor eat dried oats; If it be man's work I will do it.

Working...