Alen,

That is a good use case.  I would love to see a paper written on it.

On Apr 12, 2007, at 3:24 PM, Alen Peacock wrote:

On 4/12/07, Justin Chapweske <[EMAIL PROTECTED]> wrote:
The major use case for this seems to be where multiple people upload
fairly similar versions of the same file.  This approach might be
interesting technically, but I don't think this is useful for many
real-world use cases beyond piracy.

 Actually, there are *plenty* of use cases beyond illicit
file-sharing.  I'll give you one:

 In the realm of remote data backup, this is *highly* useful, because
people often move files around, rename them, make extra local copies,
etc.  None of that will be optimized away by rsync (each copy and
rename has to be uploaded from scratch), but virtually all can be
detected with a SET-like approach.  Of course, people also tend to
email work documents around to each other, and each recipient also
might save the file and back it up, and then the savings that an
approach like this brings really start to show.

 Alen
 http://www.flud.org
_______________________________________________
p2p-hackers mailing list
[EMAIL PROTECTED]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

_______________________________________________
p2p-hackers mailing list
[EMAIL PROTECTED]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to