Total Recall - C. Gordon Bell [85]
The real answer to what is the best backup is: have more than one.
STAY CURRENT, STAY GOLDEN
Some care is needed for file formats to make sure you can still read all your files fifty years from now. In order to avoid the Dear Appy scenario, follow three guidelines.
First, regularly convert your files to the latest formats. For example, suppose a new standard for photos called JPEG2015 takes the world by storm. Convert all your all JPEG photos to this new standard.
Second, whenever possible use “golden” formats that you believe will be supported “nearly forever.” A good hint of such a format is that it is used by millions of people millions of times. Even if such a format ever became obsolete, the large market for them would guarantee that solutions would be provided to convert the old format to something new. Good examples of golden formats are JPEG, MPEG-2, HTML, and PDF.
Third, make a print version of your interactive data. For example, every year I print out an annual report from Microsoft Money to PDF. That way, no matter what happens with the Money format files in the future, I have a version that I can at least look at and search for text.
PROTECT YOUR PRIVACY
As discussed in Chapter 8, everyone needs to be concerned about the privacy and security of his or her e-memories. As we wrote this book, Jim Gemmell had someone use his credit card number for a Las Vegas spending spree. I have found some solutions that work very well.
As with backups, I believe in layers of security to protect my privacy. Invest in a firewall as a first line of defense. Nearly all the home routers have a built-in firewall.
As a second layer, make your computer secure. Make sure it has all the latest patches and is running good security software. Protect access to your computer by use of a strong password (do a search on the Web to learn what constitutes a strong password). Make your notebook require the password whenever it is started up, so that if you lose it someone can’t just flip it open and get your stuff. The same goes for your smartphone—always password-protect it. Get a smartphone that also lets you remotely wipe the data if someone steals it.
As a third layer of defense, encrypt the data on your hard drive. That way, if someone pulls out your drive and puts it in another computer, he will not be able to read the contents. If you are Windows user, get a version of Windows that supports BitLocker, which implements this kind of drive encryption. Use this encryption for your external backup drive too.
ENJOY IT ALL TOO
Once you are lifelogging, I suggest buying some extra equipment to get the fullest enjoyment. Displaying your photographs and video cliplets throughout your home can be immensely rewarding, as a growing number of people are finding. You see something wonderful every day instead of waiting months to get the inclination to dust off the old memories.
If you don’t have a large-screen high-definition TV, buy one, and connect it to a device that can display. If you have Windows Media Center for one of your PCs, you can display media on the TV from the PC using an “extender” such as the Linksys DMA2100, or an Xbox 360. You can also buy LCD screens from HP with built-in extenders. If you are an Apple user, get an Apple TV.
Also, add some small-screen versions of the same thing, such as Samsung’s Photo Frame series. These little picture frames wirelessly connect to your home network to spread your e-memories all over your home, from your end table and kitchen counter.
With these three steps, you are well on your way to living in the Total Recall world. But it is just the beginning. In the coming years Total Recall will get much better as increased storage, better software, and a proliferation of sensor hardware makes the picture complete. Which brings me to the final step. . . .
STEP IV: BECOME AN ENTREPRENEUR