USB flash drives with Live Lernstick distro deliver educational software in schools
The map provided by imedias shows that Lernstick is mainly used in Switzerland and Austria . The Institute for Research and Development at FHNW summarizes the experience it has gained in a brochure  that provides numerous tips and hints for teachers, educational institutions, and anyone else who wants to use the system. The "Checklist" box summarizes the key points.
- Take time to set up the USB flash drive and test the system extensively
- Think about what programs the students really need, and uninstall all other applications.
- Do not duplicate the system until it is fit for the purposed use.
- Ensure the disk runs on the variety of computers used.
- Procure a uniform supply of USB sticks.
- Keep at least one USB stick as a backup system.
- Inform the parents in advance about the use of Lernsticks. Ideally, give them a copy to take home. The appendix of the Lernstick brochure has a template of a letter to parents.
- Most students are only familiar with Mac OS X or Windows, so assign some time for instruction in the use of Lernstick.
- Make using the Live system mandatory.
- Only assign homework with Lernstick, if you are sure it works on your students' computers at home.
Beyond this, imedias even cites hardware that works particularly well  with the system, according to the developers. This list is short and contains just two older notebook models. For more information, you can look at the detailed manual  (which is now obsolete in many important parts); a Google+ group exists for questions .
Lernstick demonstrates its advantages, especially in a classroom of diverse devices, and simplifies administration, providing a uniform working environment.
The system is based on an extremely stable current Debian, has been in hands-on use for several years, and even runs on less powerful computers. This makes it an interesting alternative even for facilities without additional funds to invest in educational software and hardware.
Becoming familiar with the system, along with the hopelessly outdated documentation (only in German) and an excessively wide range of software, makes Lernstick somewhat complicated in the beginning. If you want to advocate the use of Lernsticks as a teacher, you might need to plan a block of time for training your colleagues.
- Lernstick: http://www.imedias.ch/projekte/lernstick/lernstick_abstract_english.cfm
- "iTalc" by Tobias Doerffel, Linux Magazine, December 2008, pg. 84, http://www.linuxpromagazine.com/Issues/2008/97/iTalc
- Software on Lernstick 2010: https://docs.google.com/document/view?id=1sNeEIBgIHj-d7SOlpYY0Agi1NAUxfOFMD13qD7tIftg&hl=de&authkey=CKPLr6wG&pli=1#
- Lernstick ISOs: http://www.imedias.ch/projekte/lernstick/downloads.cfm
- Pre-configured USB sticks: http://lernstick.educa.ch/de/bestellformular-lernstick (in German)
- Sugar: http://wiki.sugarlabs.org
- Locations of Lernstick users: http://www.imedias.ch/projekte/lernstick/karte/?lightbox[iframe]=true&lightbox[width]=90p&lightbox[height]=90p
- Guide for using Lernstick in schools: http://www.imedias.ch/myUploadData/files/Lernstick_Broschuere_v2B.pdf (in German)
- Hardware recommendations: http://www.imedias.ch/projekte/lernstick/kaufempfehlungen.cfm (in German)
- Manual: https://docs.google.com/document/d/1FjEOtl78w7LoSoYWmTYuCSff8mbAJYBi_uMBZ102Hf8/edit?authkey=CL3InfME< (in German)
- Discussion forum: https://groups.google.com/forum/#!forum/lernstick
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm