Emulation, Migration and Long-Term Preservation of Electronic Records Cal Lee University of Michigan School of Information ECURE 2001: Preservation and.

Slides:



Advertisements
Similar presentations
An Overview Of Virtual Machine Architectures Ross Rosemark.
Advertisements

Virtualisation From the Bottom Up From storage to application.
ICS103 Programming in C Lecture 1: Overview of Computers & Programming
Lecture 1: Overview of Computers & Programming
Java.  Java is an object-oriented programming language.  Java is important to us because Android programming uses Java.  However, Java is much more.
A New Computing Paradigm. Overview of Web Services Over 66 percent of respondents to a 2001 InfoWorld magazine poll agreed that "Web services are likely.
The Architecture Design Process
Chapter 1. Introduction This course is all about how computers work But what do we mean by a computer? –Different types: desktop, servers, embedded devices.
Copyright © 2006 Addison-Wesley. All rights reserved.1-1 ICS 410: Programming Languages Chapter 3 : Describing Syntax and Semantics Operational Semantics.
Introduction to Computers and Programming. Some definitions Algorithm: –A procedure for solving a problem –A sequence of discrete steps that defines such.
Computers: Tools for an Information Age
Computer Organization and Architecture
Outline Chapter 1 Hardware, Software, Programming, Web surfing, … Chapter Goals –Describe the layers of a computer system –Describe the concept.
1 CS 502: Computing Methods for Digital Libraries Lecture 27 Preservation.
SM3121 Software Technology Mark Green School of Creative Media.
Course Instructor: Aisha Azeem
Copyright Arshi Khan1 System Programming Instructor Arshi Khan.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 11 Slide 1 Architectural Design.
Different approaches to digital preservation Hilde van Wijngaarden Digital Preservation Officer Koninklijke Bibliotheek/ National Library of the Netherlands.
By N.Gopinath AP/CSE. Why a Data Warehouse Application – Business Perspectives  There are several reasons why organizations consider Data Warehousing.
Chapter 1: Introduction to Visual Basic.NET: Background and Perspective Visual Basic.NET Programming: From Problem Analysis to Program Design.
Lesson 6 Operating Systems and Software
1 Layers of Computer Science, ISA and uArch Alexander Titov 20 September 2014.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 COMP201 Computer Systems Dr Richard Nelson Room G.1.29.
An Introduction to Programming and Object-Oriented Design Using Java By Jaime Niño and Fred Hosch Slides by Darwin Baines and Robert Burton.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
 Knowledge Acquisition  Machine Learning. The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
DEPARTMENT OF COMPUTER SCIENCE & TECHNOLOGY FACULTY OF SCIENCE & TECHNOLOGY UNIVERSITY OF UWA WELLASSA 1 CST 221 OBJECT ORIENTED PROGRAMMING(OOP) ( 2 CREDITS.
Course ILT The OSI model Unit objectives Explain the significance of the OSI model, label the seven layers of the OSI model, and describe services provided.
Configuration Management (CM)
VirtualBox What you need to know to build a Virtual Machine.
The OSI Model.
Understanding the Common Core Kansas Development of Common Core Standards.
The Beauty and Joy of Computing Lecture #3 : Creativity & Abstraction UC Berkeley EECS Lecturer Gerald Friedland.
Java Programming, Second Edition Chapter One Creating Your First Java Program.
MODULE I NETWORKING CONCEPTS.
1 Digital Preservation Testbed Database Preservation Issues Remco Verdegem Bern, 9 April 2003.
Chapter 7 Low-Level Programming Languages. 2 Chapter Goals List the operations that a computer can perform Discuss the relationship between levels of.
CS551 - Lecture 11 1 CS551 Object Oriented Middleware (III) (Chap. 5 of EDO) Yugi Lee STB #555 (816)
Chapter 6 – Architectural Design Lecture 1 1Chapter 6 Architectural design.
Client/Server Computing
© The ATHENA Consortium. EM1 - Enterprise Modelling as a way to achieve Interoperability Module 3 - What interoperability problems does Enterprise.
 Programming - the process of creating computer programs.
Computer and Programming. Computer Basics: Outline Hardware and Memory Programs Programming Languages and Compilers.
DR. SIMING LIU SPRING 2016 COMPUTER SCIENCE AND ENGINEERING UNIVERSITY OF NEVADA, RENO CS 219 Computer Organization.
Lifecycle Metadata for Digital Objects November 15, 2004 Preservation Metadata.
A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and Applications software. Systems.
Chapter 1: Introduction to Visual Basic.NET: Background and Perspective Visual Basic.NET Programming: From Problem Analysis to Program Design.
Computer Organization IS F242. Course Objective It aims at understanding and appreciating the computing system’s functional components, their characteristics,
A Semi-Automated Digital Preservation System based on Semantic Web Services Jane Hunter Sharmin Choudhury DSTC PTY LTD, Brisbane, Australia Slides by Ananta.
INFORMATION SYSTEMS SERVICES UNIVERSITY OF LEEDS ERPANET: OAIS Seminar Copenhagen - København 28th November 2002 Introducing the OAIS Model _________________________________.
Virtualization Neependra Khare
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
Operating System & Application Software
Assembly Language for x86 Processors 6th Edition
Definition CASE tools are software systems that are intended to provide automated support for routine activities in the software process such as editing.
CSCI-235 Micro-Computer Applications
ICS103 Programming in C Lecture 1: Overview of Computers & Programming
Introduction to .NET Framework Ch2 – Deitel’s Book
Chapter 4 Computer Software.
An Overview of MPEG-21 Cory McKay.
Computer Science I CSC 135.
Programming Languages
Emulation: Good or Bad? Emulation as a Digital Preservation Strategy – Stewart Granger Reality and Chimeras in the Preservation of Electronic Records –
Windows Virtual PC / Hyper-V
Java Programming Introduction
Linux Professor Sabol.
Dr. Clincy Professor of CS
Presentation transcript:

Emulation, Migration and Long-Term Preservation of Electronic Records Cal Lee University of Michigan School of Information ECURE 2001: Preservation and Access for Electronic College and University Records October 13, 2001

Outline The Digital Preservation Problem Base-Line Assumptions Major Approaches: Migration and Emulation Migration Emulation For Further Reference

The Digital Preservation Problem

Technological Dependency Digital objects are useless if we can’t interact with them Those interactions depend on numerous technical components.

Key Concept - Abstraction "Computer science is largely a matter of abstraction: identifying a wide range of applications that include some overlapping functionality, and then working to abstract out that shared functionality into a distinct service layer (or module, or language, or whatever). That new service layer then becomes a platform on top of which many other functionalities can be built that had previously been impractical or even unimagined. How does this activity of abstraction work as a practical matter? It's technical work, of course, but it's also social work. It is unlikely that any one computer scientist will be an expert in every one of the important applications areas that may benefit from the abstract service. So collaboration will be required.” (emphasis added) - Phil Agre, Red Rock Eater, March 25, 2000

Oh so many layers Physical medium - only layer yielding real consensus Bit Byte Character encoding Instruction set architecture Physical organization of bytes Logical organization of chunks Reading hardware Input/output hardware Input/output software

But, wait, there’s more Operating system kernel Network operating system Networking protocols Desktop and windowing environment Data syntax Data structure Data semantics Data content Data values Contextual linking within and between objects

Obsolescence "Those who forget the past are condemned to reload it." - Nick Montfort, July 2000 All layers undergo change over time, at varying rates.

Some Base-Line Assumptions Several assumptions which I will take to be given. Making them explicit can help us to be more precise about available options and their costs/benefits.

Assumption #1: Digital objects are instructions for future interaction Only a small part of preservation work is about treating them like physical artifacts. Jeff Rothenberg takes this even farther, contending that all digital objects should be seen as programs.

Assumption #2: Bits will be Bits Bit rot and advantages of newer media both call for periodic refresh and reformatting. Ensuring the integrity of the bit stream in such transfers is extremely important. See Charles Dollar’s 1999 book for an excellent explanation of these processes.

Assumption #3: Change Happens Any long-term strategy must recognize that any underlying technical platform will eventually be abandoned by the industry and thereafter increasingly difficult to support. Ongoing preservation effort is assumed, regardless of the strategy adopted. Goal is to minimize (rather than eliminate) work and maximize the benefits.

Assumption #4: Must identify what’s desirable and what’s possible Best, most informed guess about how objects will be used. Characteristics that support such use. Currently available technical approaches. Whether using any given approach can cost- effectively preserve those characteristics. All of these decisions should be well documented and revisited periodically.

Major Approaches: Migration and Emulation

Migration Periodic transformation of the bits/bytes to run directly on newer platforms. Used widely as an approach to actively managing legacy systems. Work can be expensive and introduce errors of translation. Since the resulting objects can run directly on newer platforms, layers of technology can be minimized.

Emulation - Oxford English Dictionary, Second Edition “To reproduce the action of or behave like (a different type of computer) with the aid of hardware or software designed to effect this; to run (a program, etc., written for another type of computer) by this means.”

Popular Examples from the History of Emulation Hardware and software - IBM System/360 (1963) Operating systems –IBM MVS (1972) –Amiga (1985) –Microsoft Z80 Softcard (1989) –DOS emulation in Windows (1987) –SoftWindows (for Macintosh) –Virtual PC (1997) –Wine (Windows Emulator, 1993)

More Emulation Examples Processors - Intel 8080 (1974) Virtual Machines - Java (1995) Terminal emulators - Telnet (1969), WinFrame (1995) Lots and lots of games

Broad Issues to Address What level to emulate When to create the emulator - now vs. later, once vs. periodically How to develop emulators - what language, what platform Intellectual property rights

Arguments for preservation using emulation Rothenberg - specification, interpreter, virtual machine IBM - distinction between preserving data files and programs, create emulators to run on Universal Virtual Computer (UVC) CEDARS - maintain byte stream, focus on preserving the significant properties of its underlying abstract form (UAF) CAMiLEON - create emulator in a (simplified) high-level language, migrate emulator across platforms when necessary

Critiques of Emulation David Bearman most vocal critic Metadata and functional requirements are what counts for preserving electronic records Emulation attempts to capture too much (full functionality of technical environment) and not enough (essential characteristics of records)

A Balanced Perspective on Preservation Strategies No single solution Identify requirements THEN evaluate the technical options. What attributes should be preserved (which differences matter)? Make (and document) educated guesses of costs and benefits.

For Further Reference Growing literature on these issues Several prominent projects now and in recent years Please see the bibliography associated with this presentation

Thank you!