I believe that at least a small amount of organization is empowering. It is frustrating to spend time and effort finding or creating a document only to have to do it again next time it is needed because it gets lost or is otherwise unavailable.

I have many files that I like to have readily available on whatever computer I am using. These items are manuals, technical references, web links, notes, audio files and other things.

What they have in common is that they are:

  • Small, typically less than 10MB
  • Do not contain sensitive data
  • Useful for quick retrieval
  • Things that I, at times, need to share with one or more people
  • Revised over time, such as a notes and other personal documents
  • The result of an investment to create or otherwise obtain

I have experimented with various ways of managing the types of files described above and have found a free tool that works well for me. It is called 1. It is both piece of software and a service. It permits one to use cloud storage to safely manage files. One can interact with Wuala using the Wuala web portal and or the Java based Wuala client application. There are many alternatives to Wuala such as iDisk, Dropbox, GoogleDrive, even a USB thumb drive.

The following are the features that I find most useful. More information about Wuala can be found on the www.wuala.com web site.

Privacy/Security
I do not store sensitive documents using Waula, or any other service that employs cloud storage. It is my belief that one must maintain physical control, or fully understand and accept the physical stewardship of the data. These criteria can not be achieved with cloud storage. That being said, the most attractive feature of Wuala is in the way it implements privacy and security. My files even though they are not sensitive, are my property to share as I see fit. Files stored with Wuala are broken into fragments and stored using strong encryption. The details of how this done, can be found here. The pass-phrase is not kept with the managed files and the encryption/decryption process is performed on one’s local computer. This means that the file fragments are secure both during transmission to and from remote storage as well as on the remote servers/cloud storage. The data are thus protected even from Wuala employees.
Revision management
Wuala manages revisions of files. It seems reliable and is extremely simple to use. This is perfect for files that do not need a more elaborate revision control system like git.
Synchronization across multiple computers
It is useful to be able to have a folder of files synchronized across multiple computers. This way one may access files locally without network connectivity, then have revisions shared across participating computers when connectivity is restored. This is one of those features that is surprisingly nice.
Sharing
It is possible to define access controls for folders such that one may make some content public, some private and some shared with particular Wuala users. It is also possible to provide a non-wuala user a private2 URL link to content. This private link feature is great for one-off sharing.
Value
All of these features are available for a free account. A free account makes 5GB of storage available. More storage can be purchased for a reasonable price. You would surprised how many small files can be stored in 5GB. If you need to backup and entire disk or store large files then a different solution may be better suited to your needs.

I know this article sounds a bit like an advertisement, but I am not an affiliate for Wuala, though based on my experience with the product, I would surely consider it if such a program existed. I have tried so many solutions, it is exciting to finally find one that works so well!

  1. Likely a play on the French word VoilĂ . 
  2. It is not exactly private but so long as you control access to the URL fewer people will find the content than one would expect for a public folder. This is not security but rather a handy way to make the content more difficult to find for anybody but the intended recipient. It may not be a secure solution, but it is often all that is needed.