Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Just like regular mail (Score 2, Interesting) 451

"When a person uses the postal service, the user's actions are no longer in his or her physical home; in fact he or she is not truly acting in private space at all. The user is generally accessing the postal service with a zip code and mailbox owned by the United States Postal Service. All materials in transit, whether they are letters or packages, are physically temporarely stored on facilities owned by the USPS. When we send a letter or a postcard from the comfort of our own homes to a friend across town the message travels from our home to facilities owned by a third party, the USPS, before being delivered to the intended recipient. Thus, "private" information is actually being held by third-parties."

Comment Re:Different tools for different purposes (Score 1) 421

It seems what he needs is "Fast System VerSioning" (FSVS) http://fsvs.tigris.org/

It is a complete backup/restore/versioning tool for all files in a directory tree or whole filesystems, with a subversion repository as the backend. You may think of it as some kind of tar or rsync with versioned storage.

In which ways is FSVS better than subversion?
* FSVS keeps the modification timestamp, the owner, group and access mode of your files in the repository, and restores them on update/export.
* svn is restricted to files, directories, and symlinks; FSVS does device nodes too.
* The svn client needs the .svn-directories, with the full-text of your text-base in them; that means 4 times the inodes, and more than 2 times the space needed in your filesystem.

Wireless Networking

Wireless Internet Access Uses Visible Light, Not Radio Waves 264

An anonymous reader writes to tell us that a company has demonstrated a new form of wireless communication that uses light instead of radio waves. "Its inventor, St. Cloud resident John Pederson, says visible-light embedded wireless data communication is the next step in the evolution of wireless communications, one that will expand the possibilities in phone and computer use. The connection provides Web access with almost no wiring, better security and with speeds more than eight times faster than cable."
Education

How To Help Our Public Schools With Technology? 378

armorer writes "I'm a programmer engaged to an inner-city public school teacher. I've been thinking for a long time now about what I can do to help close the technology gap, and I finally did something (very small) about it. I convinced my company to give me a few old computers they were replacing, refurbished them, installed Edubuntu on them, and donated them to her classroom. I also took some vacation time to go in, install everything, and give a lesson on computers to the kids. It was a great experience, but now I know first-hand how little technology these schools have. I only helped one classroom. The school needs more. (Really the whole district needs more!) And while I want to help them, I don't really know how. With Thanksgiving a week away and more holidays approaching, I suspect I'm not the only one thinking about this sort of thing. I know it's a hard problem, so I'm not looking for any silver bullets. What do Slashdot readers do? What should I be doing so that I'm more effective? How do you find resources and time to give back?"
Data Storage

Tips For Taking Your Laptop Into and Out of the US? 940

casualsax3 writes "I'm going to be taking a week long round trip from NYC to Puerto Vallarta Mexico sometime next month, and I was planning on taking my laptop with me. I'll probably want to rip a few movies and albums to the drive in order to keep busy on the flight. More important though, is that I'm also going to be taking pictures while I'm there, and storing them on the laptop. With everything in the news, I'm concerned that I'll have to show someone around the internals of my laptop coming back into the US. The pictures are potentially what upsets me the most, as I feel it's an incredible violation of my privacy. Do I actually need to worry about this? If so, should I go about hiding everything? I've heard good things about Truecrypt. Is it worth looking into or am I being overly paranoid?"
Cellphones

Submission + - RAM for Free (ieee.org)

wakaramon writes: ""Novel data compression doubles the memory in embedded systems while hardly slowing them down. Although the price of RAM has plummeted fast, the need for memory has expanded faster still. But if you could use data-compression software to control the way embedded systems store information in RAM, and do it in a way that didn't sap performance appreciably, the payoff would be enormous.""

Slashdot Top Deals

Interchangeable parts won't.

Working...