The JISC PoWR Handbook Some suggested approaches Ed Pinsent, ULCC
Summary <ul><li>What do we mean by preservation? </li></ul><ul><li>What options do you have? </li></ul><ul><li>What have y...
What does preservation mean? <ul><li>Preservation is possible! </li></ul><ul><ul><li>1. Not everything </li></ul></ul><ul>...
What options do you have? <ul><li>Business as usual </li></ul><ul><li>Policy review </li></ul><ul><li>Quick wins </li></ul...
Embedding PoWR <ul><li>Convince the decision-makers </li></ul><ul><li>Espida methodology </li></ul><ul><li>Include Web Pre...
What have you got? <ul><li>Where are your web resources, what are your web resources, why have you got them, who wants the...
Whose job is it? <ul><li>Collaborate – don’t go it alone </li></ul><ul><li>Team of information professionals: </li></ul><u...
Policies <ul><li>Find your policies </li></ul><ul><li>Assess them </li></ul><ul><li>Interpret them </li></ul>
What are your requirements? <ul><li>Appraise and select </li></ul><ul><li>Record, publication or artefact? </li></ul><ul><...
What can you do? <ul><li>What to do now: </li></ul><ul><ul><li>Domain harvest </li></ul></ul><ul><ul><li>Migrate </li></ul...
Who wants it kept? <ul><li>Who wants what </li></ul><ul><li>Why </li></ul><ul><li>For how long </li></ul><ul><ul><li>Inter...
Conclusion <ul><li>It can be done </li></ul><ul><li>Solutions not exclusively technological </li></ul><ul><li>You have man...
Upcoming SlideShare
Loading in …5
×

The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)

1,085 views
1,031 views

Published on

Presentation given at the JISC PoWR workshop 3 (Embedding Web Preservation Strategies Within Your Institution), given in the Flexible Learning Space, centre for Excellence in Enquiry-Based Learning (CEEBL), University of Manchester on Friday 12th September 2008.

Published in: Education, Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,085
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)

    1. 1. The JISC PoWR Handbook Some suggested approaches Ed Pinsent, ULCC
    2. 2. Summary <ul><li>What do we mean by preservation? </li></ul><ul><li>What options do you have? </li></ul><ul><li>What have you got? </li></ul><ul><li>Whose job is it? </li></ul><ul><li>What policies do you have? </li></ul><ul><li>What are your requirements? </li></ul><ul><li>What can you do? </li></ul><ul><li>Who wants things kept? </li></ul>
    3. 3. What does preservation mean? <ul><li>Preservation is possible! </li></ul><ul><ul><li>1. Not everything </li></ul></ul><ul><ul><li>2. Not every version of every resource </li></ul></ul><ul><ul><li>3. Not forever </li></ul></ul><ul><ul><li>4. Not perfect </li></ul></ul><ul><li>Manage your resources </li></ul><ul><li>Protect your resources </li></ul><ul><li>Keep some of them permanently </li></ul>
    4. 4. What options do you have? <ul><li>Business as usual </li></ul><ul><li>Policy review </li></ul><ul><li>Quick wins </li></ul><ul><li>A finite solution </li></ul><ul><li>A strategic approach </li></ul>
    5. 5. Embedding PoWR <ul><li>Convince the decision-makers </li></ul><ul><li>Espida methodology </li></ul><ul><li>Include Web Preservation in policy </li></ul><ul><li>Preservation-friendly features in future procurements </li></ul><ul><li>Resources to manage capture and curation of resources </li></ul>
    6. 6. What have you got? <ul><li>Where are your web resources, what are your web resources, why have you got them, who wants them… </li></ul><ul><li>Ways of finding out: </li></ul><ul><ul><li>1. Survey </li></ul></ul><ul><ul><li>2. Research </li></ul></ul><ul><ul><li>3. Ask DNS manager </li></ul></ul><ul><ul><li>4. Compile IAR </li></ul></ul>
    7. 7. Whose job is it? <ul><li>Collaborate – don’t go it alone </li></ul><ul><li>Team of information professionals: </li></ul><ul><ul><li>IT manager </li></ul></ul><ul><ul><li>Web master </li></ul></ul><ul><ul><li>Sys admin </li></ul></ul><ul><ul><li>Information manager </li></ul></ul><ul><ul><li>Asset manager </li></ul></ul><ul><ul><li>Records manager </li></ul></ul><ul><ul><li>Archivist </li></ul></ul>
    8. 8. Policies <ul><li>Find your policies </li></ul><ul><li>Assess them </li></ul><ul><li>Interpret them </li></ul>
    9. 9. What are your requirements? <ul><li>Appraise and select </li></ul><ul><li>Record, publication or artefact? </li></ul><ul><li>Exclude things </li></ul>
    10. 10. What can you do? <ul><li>What to do now: </li></ul><ul><ul><li>Domain harvest </li></ul></ul><ul><ul><li>Migrate </li></ul></ul><ul><ul><li>Use repositories or EDRMS </li></ul></ul><ul><li>Strategic thinking: </li></ul><ul><ul><li>ILM (Information Lifecycle Management) </li></ul></ul><ul><ul><li>RM (Records management) </li></ul></ul><ul><ul><li>Continuity </li></ul></ul><ul><ul><li>Selective approaches </li></ul></ul>
    11. 11. Who wants it kept? <ul><li>Who wants what </li></ul><ul><li>Why </li></ul><ul><li>For how long </li></ul><ul><ul><li>Internal drivers </li></ul></ul><ul><ul><li>Stakeholders’ requirements </li></ul></ul><ul><ul><li>External drivers </li></ul></ul>
    12. 12. Conclusion <ul><li>It can be done </li></ul><ul><li>Solutions not exclusively technological </li></ul><ul><li>You have many options </li></ul><ul><li>Find out what you have </li></ul><ul><li>Collaborate and get help (internal and external) </li></ul><ul><li>Use your policies </li></ul><ul><li>Be selective </li></ul>

    ×