Preservation of Digital Data by Christian Wellner Based on: Howard Besser. Digital longevity. In: Maxine Sitts (ed.) Handbook for Digital Projects: A Management.

Slides:



Advertisements
Similar presentations
Data Transfer Chapter 10. File conversion When we upgrade a file after a big time of use, usually it is necessary to change the format of the file. For.
Advertisements

Animesh Bhattacharyya Librarian, Vivekananda Mahavidyalaya
| IFLA2010. Newspaper Section | Newspaper Resources in transition: Digital Preservation and Access - keynote - IFLA International Newspaper.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Digital Archeology: Recovering Digital Objects from Audio Waveforms Mark Guttenbrunner University of.
Data - Information - Knowledge
MCT260-Operating Systems I Operating Systems I Navigating the File System.
1 Strategies for Collecting and Preserving Open Access Materials on the Web William Y. Arms Cornell University Federal Library and Information Center Committee.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Strategic Thinking and Significant Characteristics Hamish James.
1 CS 502: Computing Methods for Digital Libraries Lecture 27 Preservation.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Data Preservation Best Practices for preserving your research data for future reuse The goal of data preservation is to ensure that your data is in a sustainable.
Chapter 3 – Computer Hardware Computer Components – Hardware (cont.) Lecture 3.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Different approaches to digital preservation Hilde van Wijngaarden Digital Preservation Officer Koninklijke Bibliotheek/ National Library of the Netherlands.
Management Information Systems
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
FP7-ICT PrestoPRIME 1 Richard Wright BBC R&D Preservation: Scenarios, Risks, Costs Screening the Future Hilversum March 2011 Richard.
Sem 1 v2 Chapter 14: Layer 6 - The Presentation layer.
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
DIGITAL GRAPHICS & ANIMATION Complete LESSON 2 Importing and Exporting Graphics.
Liang, Introduction to Java Programming, Ninth Edition, (c) 2013 Pearson Education, Inc. All rights reserved. 1 Chapter 1 Introduction to Computer Science.
Institute of Technology Sligo - Dept of Computing Sem 1 Chapter 14: Layer 6 - The Presentation layer.
“Storage is Cheap” and Other Lies Lance Stuchell, University of Michigan Library Curating and Managing Research Data for Re-Use ICPSR, July 31, 2013 “Hard.
MAC OS – Unit A Page: 10-11, Investigating Data Processing Understanding Memory.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Digital Preservation 101, or, How to Keep Bits for Centuries Julie C. Swierczek Digital Asset Manager and Digital Archivist Harvard Art Museums.
Analogue vs Digital. Analogue  Lots of different frequencies, lots of different amplitudes  Wave recorded as it is.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
©G. Millbery 2003Systems and User Interface SoftwareSlide 1 Self Documenting Systems  Systems where no external documentation is necessary  Includes:
Identity-Based Secure Distributed Data Storage Schemes.
Besser--TextOneZero 5/22/01 1 The New Information Environments: Helping content persist over time Howard Besser UCLA School of Education & Information.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Chapter Ten The Application and Presentation Layers.
Redundant Array of Independent Disks.  Many systems today need to store many terabytes of data.  Don’t want to use single, large disk  too expensive.
The Classic Amiga Preservation Society (CAPS) Software Preservation Society István Fábián.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
Storage of digital objects Adolf Knoll National Library of the Czech Republic
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
MSBCS-BCSI-1 Students will identify computer system components MSBCS-BCSIII-8 Students will examine basics of networking Computer Basics & Terminology.
Digital Preservation across the technologies, strategies, open standards & interoperability aspects including the legal issues Pratik Shrivastava Scientist.
General Purpose Packages DATA TYPES. Data Types Computer store information in the form of data. Information has meaning. Eg 23 May 2005 Data has no meaning.
Chapter # 10 Data Transfer Prepared by :Sir Mazhar Javed.
What is virtualization? virtualization is a broad term that refers to the abstraction of computer resources in order to work with the computer’s complexity.
1 BCS, Oxfordshire, 19 February, 2004 WEB ARCHIVING issues and challenges Deborah Woodyard Digital Preservation Coordinator.
Web Server.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Computing system Lesson Objective: Understand what is meant by a ‘computer system’ Learning Outcome: Define the key words and give a brief explanation.
Besser--Moving Image Longevity 3/16/01 1 Moving Image Longevity Howard Besser UCLA School of Education & Information
Verification & Validation
DATA SECURITY (i) Backing up dataBacking up data (ii) Archiving dataArchiving data 4 th JUNE 2005 Saturday Lower Sixth Form Computer Studies.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Chang, Wen-Hsi Division Director National Archives Administration, 2011/3/18/16:15-17: TELDAP International Conference.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
GCSE ICT Data Transfer. Data transfer Users often need to transfer data between software packages or computers. Until relatively recently this was difficult.
Chapter 6 Protecting Your Files
File-System Management
GCSE ICT Data Transfer.
Use It or Lose It! Preserving Your Digital Documents
Emulation: Good or Bad? Emulation as a Digital Preservation Strategy – Stewart Granger Reality and Chimeras in the Preservation of Electronic Records –
Operating Systems Tasks 17/02/2019.
WJEC GCSE Computer Science
Database management systems
Presentation transcript:

Preservation of Digital Data by Christian Wellner Based on: Howard Besser. Digital longevity. In: Maxine Sitts (ed.) Handbook for Digital Projects: A Management Tool for Preservation and Access, 2000 Mary Baker et al.: A Fresh Look at the Reliability of Long-term Digital Storage. In: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006.

Preservation of Digital Data Motivation Problems: Longevity, Visibility, Custody Proposed Strategies

Motivation Strong trend of digitalizing (historical) data  allows more efficient work  decreases storage space significantly  can be copied easily  Negative aspects are however often neglected

Problems of Digital Storage Longevity problems  Human „errors“ or catastrophes can still occur (burning a book vs. overwriting a file)  Durability of storage devices is physically limited („mutation“ of bits)

Problems of Digital Storage Visibility problems  Each storage device needs its special hardware (e.g. floppy drives)  Each file format needs its special software (e.g. word processors)  Manual decryption of binary code is (in most cases) almost impossible

Problems of Digital Storage Visibility problems  Files may be compressed (e.g. JPEG)  Companies aim to protect their own formats (e.g. with elaborate encoding)  data may only be readable in a certain context (e.g. on websites)

Problems of Digital Storage Custodial problems  Who is responsible to keep data accessible for future generations?  Regular analysis of the data is required to find latent errors, leading to monetary costs  restrictrions by copyright laws (especially if a third party owns the context)

Proposed Strategies Improving longevity  Using the safest hardware available  Constantly checking the data for latent errors  Protect the data against hacking or catastrophes

Proposed Strategies Key strategy: Redundant duplicates  „Refreshing“: a copy of the data that is to be preserved is made regularily  The data itself is only lost if all copies are lost  Important: storing copies in independant places

Proposed Strategies Two general options for visibility  Migration: files are translated into newer formats that can be directly accessed  Emulation: programs simulate the usage of the processor of the original format  Better standardization can also help a lot

Proposed Strategies Solving custodial problems  May require some changes in law  Allow website owners to preserve third party content if it is needed to display the site  Transfer responsibility to preserve it if data changes its owner

Proposed Strategies Meta Data  Can be incredibly useful to decipher a file  Directly shows how to handle the data  But does not give away protected information  Can be applied to any format

Thank you for listening