Intro to Digital Preservation

  • 224 views
Uploaded on

A very brief introduction to TDR criteria, historic context of digipres, and innovations in web based emulation.

A very brief introduction to TDR criteria, historic context of digipres, and innovations in web based emulation.

More in: Technology , Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
224
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
4
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. AN INCOMPLETE CRASH COURSE INDIGITAL PRESERVATION [IN 20 MIN]WITH AN EMPHASIS ON THE TRAC CRITERIA & CHECKLIST
  • 2. • CONTEXT• HISTORIC CASES• OVERVIEW OF TRAC CHECKLIST• TOOLS• PROJECTS OF NOTE
  • 3. CONTEXTSTAKEHOLDERS LIBRARIES + ARCHIVES MUSEUMS + GALLERIES GOVERNMENTS SCIENCE & MEDICINE PRIVATE SECTOR INDIVIDUALS
  • 4. CONTEXTDONOR COMMUNITIES AUTHORS + WRITERS ARTISTS + COLLECTORS CORPORATE OFFICES SCIENTISTS + DOCTORS
  • 5. CONTEXTMATERIALS RARE BOOKS & MANUSCRIPTS FINE ART PERSONAL PAPERS FINANCIAL / LEGAL GEOSPATIAL / MAPS RESEARCH DATA
  • 6. HISTORIC CASES
  • 7. DOOMED
  • 8. • 1986 DOMESDAY PROJECT• 1999 HARDLY ANY SYSTEMS LEFT• 1999 CAMILEON BEGINS WORK• 2001 ADRIAN PEARCE BEGINS• 2002 CAMILEON EMULATION• 2003 BBC DIGITAL MASTERS• 2004 PEARCE PUBLISHES DATA• 2008 PEARCE DIES, SO DOES SITE• PRESENT: HTTP://WWW.BBC.CO.UK/HISTORY/DOMESDAY
  • 9. AFTER A LOT OF ££ AND EFFORT
  • 10. TRAC CRITERIA & CHECKLIST
  • 11. TRAC CRITERIA & CHECKLIST WHAT IS IT ?
  • 12. A. ORGANIZATIONAL INFRASTRUCTUREA.1 GOVERNANCE AND VIABILITY 1. MISSION STATEMENT 2. SUCCESSION / CONTINGENCY PLAN
  • 13. A. ORGANIZATIONAL INFRASTRUCTUREA.2 STRUCTURE AND STAFFING 1. PROPER STAFF POSITIONS 2. ENOUGH STAFF 3. PROFESSIONAL DEVELOPMENT
  • 14. A. ORGANIZATIONAL INFRASTRUCTUREA.3 PROCEDURAL ACCOUNTABILITY 1. COMMUNITY IDENTIFIED 2. MECHANISMS FOR REVIEW OF PROCEDURE 3. WRITTEN LEGAL POLICY RE: PERMISSIONS 4. PERIODIC TECH UPDATE 5. USER FEEDBACK 6. GENERAL TRANSPARENCY & ACCOUNTABILITY
  • 15. A. ORGANIZATIONAL INFRASTRUCTUREA.4 FINANCIAL SUSTAINABILITY 1. SHORT & LONG TERM BUSINESS PLAN 2. ANNUAL [AT LEAST] REVIEW OF PLAN 3. TRANSPARENT & COMPLIANT FINANCIALS
  • 16. A. ORGANIZATIONAL INFRASTRUCTUREA.5 CONTRACTS, LICENSES, LIABILITIES 1. DEPOSIT AGREEMENTS [INCLUDING PRESERVATION RIGHTS] 2. TRACK AND MANAGE INTELLECTUAL PROPERTY
  • 17. B. DIGITAL OBJECT MANAGEMENTB.1 ACQUISITION AND INGEST 1. IDENTIFY PROPERTIES TO PRESERVE 2. SPECIFY METADATA REQUIRED AT INGEST 3. ABLE TO AUTHENTICATE SOURCE 4. SUFFICIENT PHYSICAL CONTROL 5. APPROPRIATE FEEDBACK TO DEPOSITOR 7. RECORD OF ALL PRESERVATION ACTIONS
  • 18. B. DIGITAL OBJECT MANAGEMENTB.2 CREATING AN ARCHIVABLE PACKAGE 1. WRITTEN DEFINITION OF ALL AIP’S 2. DOCUMENTATION OF SIP => AIP PROCESS 3. NAMING CONVENTION FOR IDENTIFIERS 4. REPRESENTATION / FORMAT INFORMATION 5. DOCUMENTED PROCESS FOR ‘RENDER’
  • 19. B. DIGITAL OBJECT MANAGEMENTB.3 PRESERVATION PLANNING 1. DOCUMENTED PRESERVATION STRATEGIES 2. OBSOLESCENCE MONITORING MECHANISMS 3. MEANS TO CHANGE 1 BASED ON 2 4. EVIDENCE OF EFFECTIVENESS
  • 20. B. DIGITAL OBJECT MANAGEMENTB.4 ARCHIVAL STORAGE 1. PRESERVE CONTENT INFORMATION 2. ACTIVELY MONITOR FIXITY INFORMATION
  • 21. B. DIGITAL OBJECT MANAGEMENTB.5 INFORMATION MANAGEMENT 1. SPECIFY MINIMUM METADATA REQUIREMENTS FOR DISCOVERABILITY 2. MEET THIS REQUIREMENT 3. DEMONSTRABLE REFERENTIAL INTEGRITY
  • 22. B. DIGITAL OBJECT MANAGEMENTB.6 ACCESS MANAGEMENT 1. COMMUNICATE ACCESS OPTIONS 2. POLICY FOR DOCUMENTATION OF ACCESS 3. RESPECTFUL OF ACCESS AGREEMENTS 4. DOCUMENTED ACCESS POLICIES 5. LOG INAPPROPRIATE ACCESS 6. DISSEMINATE COPIES OF ORIGINAL OBJECTS TRACEABLE TO THE ORIGINAL
  • 23. C. TECHNOLOGY, INFRASTRUCTURE, SECURITYC.1 SYSTEM INFRASTRUCTURE 1. REPOSITORY RUNS ON WELL SUPPORTED SYSTEMS (I.E. LINUX/UNIX) 2. ADEQUATE SUPPORT FOR BACKUP 3. REPOSITORY MANAGES BACKUPS 5. MECHANISMS TO DETECT, REPORT, AND ACT UPON CASES OF CORRUPTION 6. HARD/SOFTWAREWARE UPGRADE PROCEDURE 7. MEANS TO TEST SYSTEM CHANGES
  • 24. C. TECHNOLOGY, INFRASTRUCTURE, SECURITYC.2 APPROPRIATE TECHNOLOGIES 1. HARDWARE / SOFTWARE APPROPRIATE TO DESIGNATED COMMUNITY & SERVICES
  • 25. C. TECHNOLOGY, INFRASTRUCTURE, SECURITYC.3 SECURITY 1. SYSTEMATIC ANALYSIS OF DATA, PERSONNEL, PHYSICAL PLANT, AND SECURITY NEEDS. 2. STAFF HAVE AUTHORIZATION RELEVANT TO ROLE WITHIN SYSTEM 3. WRITTEN DISASTER PREPAREDNESS AND RECOVERY PLAN. 4. OFFSITE BACKUPS. OFFSITE RECOVERY PLAN.
  • 26. TOOLS
  • 27. PRESERVATION PLANNINGSUSTAINABLE FORMATS 1. DISCLOSURE 2. ADOPTION 3. TRANSPARENCY / SELF DOCUMENTATION 4. EXTERNAL DEPENDENCIES 5. PATENT ISSUES 6. DRM
  • 28. PRESERVATION PLANNINGSUSTAINABLE FORMATS IDENTIFICATION?
  • 29. PRESERVATION PLANNINGSUSTAINABLE FORMATS JHOVE UNIX FILE UTILITY FITS FIDO DROID
  • 30. Evaluation of Characterisation Tools Part 1: IdentificationAuthorsJohan van der Knijff, National Library of the NetherlandsCarl Wilson, British LibrarySeptember 2011
  • 31. COOL PROJECTS - OR -OK SO YOU’VE PRESERVED THIRTYYEARS OF DISK IMAGES. NOW WHAT.
  • 32. EMULATION [DEMO]
  • 33. Digital Forensicsand Born-Digital Contentin Cultural HeritageCollectionsby Matthew G. KirschenbaumRichard OvendenGabriela Redwinewith research assistance from Rachel DonahueDecember 2010Council on Library and Information ResourcesWashington, D.C.
  • 34. Statistical Tools for Digital Forensics Alin C. Popescu and Hany Farid ? Department of Computer Science at Dartmouth College Abstract. A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longer hold the unique stature as a definitive recording of events. We describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature. In particular, we quantify statistical correlations that result from specific forms of digital tampering, and devise detection schemes to reveal these correlations.1 IntroductionThe advent of low-cost and high-resolution digital cameras, and sophisticated photo-editing software, hasmade it remarkably easy to manipulate and alter digital images. In addition, digital forgeries, often leaving no
  • 35. SOAA_SP10 23/5/06 3:33 PM Page 159 T H E A M E R I C A N A R C H I V I S T “The Old Version Flickers More”: Digital Preservation from the User’s Perspective Margaret L. Hedstrom, Christopher A. Lee, Judith S. Olson, Clifford A. Lampe Abstract Most criteria for evaluating digital preservation strategies are based on needs and require- ments from the archivist’s perspective. In the CAMiLEON Project, we wanted to learn what significant properties users consider worth preserving. In this article, we present the results of two experiments that used human subjects to learn about user preferences for different formats of preserved digital objects. We tested subjects’ reactions to digital materials that were
  • 36. A FEW PEOPLE TO FOLLOW[INCOMPLETE LIST, BUT OH WELL] @TEXTFILES @MKIRSCHENBAUM @KARIKRAUS @ITPARCHIVE @AVPRESERVE @UMD_MITH @JUSPAR @JENGUILIANO @JONVOSS @EMORYDISC @DOUGRESIDE @READYRESOURCES @EUANC AND MANY MORE……