Download presentation
Presentation is loading. Please wait.
Published byΘέκλα Αλεξόπουλος Modified over 6 years ago
1
Digital Project Lifecycle Curating Across the Curriculum
Lee Dotson Digital Initiatives Librarian John C. Hitt Library
2
From http://www.dcc.ac.uk/resources/curation-lifecycle-model:
Our Curation Lifecycle Model provides a graphical, high-level overview of the stages required for successful curation and preservation of data from initial conceptualisation or receipt through the iterative curation cycle. You can use our model to plan activities within your organisation or consortium to ensure that all of the necessary steps in the curation lifecycle are covered. It is important to note that the model is an ideal. In reality, users of the model may enter at any stage of the lifecycle depending on their current area of need. For instance, a digital repository manager may engage with the model for this first time when considering curation from the point of ingest. The repository manger may then work backwards to refine the support they offer during the conceptualisation and creation processes to improve data management and longer-term curation.
4
Questions to ask 1. What is your purpose? 2. Who is your audience?
3. What are the physical characteristics of the collection? 4. Who owns it? 5. What is your timeframe? 6. How is the project being funded? 7. How will you perform the actual digitization? What metadata scheme are you planning to use? How are you going to provide access to the collection? How are you planning to maintain the collection into the future?
5
It all started with… Equipment Upload processes Digital preservation
Purpose Audience Physical characteristics Ownership Timeframe Funding Digitization Metadata Digital access Maintain: Preservation Migration Equipment Outsource to Timeshare to Ownership Upload processes Paper to FTP to Web Ingest Digital preservation None to Florida Digital Archive Content management systems Homegrown to Commercial to Open Source Does anything stay the same? Researchers - Easy access to materials Copyright – Be aware Image courtesy of Florida Historical Quarterly on PALMM
6
Creating files Text message with my son. Lee Dotson. 2016.
ISO Standard stipulates certain restrictions on file names: • Limit total path length to 207 characters • Characters used in file names are restricted to lowercase a-z, 0-9, underscore ( _ ), and period (.) • File names shall not include spaces; should not begin or end with a period (.); and should contain no more than one period (.). • Limit directory hierarchy to eight levels. Directory names should not use periods. Names for directories, folders, and files will be no longer than 21 characters (not including 3 letter extensions) and will be unique within the context of the project. Text message with my son. Lee Dotson
7
Know your formats PRONOM is a resource for anyone requiring impartial and definitive information about the file formats, software products and other technical components required to support long-term access to electronic records and other digital objects of cultural, historical or business value. DROID (Digital Record Object Identification) is a software tool developed by The National Archives to perform automated batch identification of file formats. It is the first in a planned series of tools developed by The National Archives under the umbrella of its PRONOM technical registry service. DROID is a platform-independent Java tool, which is freely available to download under an open source license. You can download the latest version of DROID for free.
8
Storing files CD & DVDs' media life are not reliable in the long-term, copy or migrate data to new media between years after creation Appropriate environmental conditions will increase the life-span of media Make backups of your data Data Management guide: Storage and Security Clear and detailed file documentation is vital for ensuring that your data be understood and interpreted for long-lasting usability. Effectively sharing your files is more difficult without documentation. What do you want to share? How should you share it? Copyright and Intellectual Property Rights Confidentiality (Ethical Concerns) Data Security is the protection of data from unauthorized access, use, change, disclosure and destruction. Make sure your data is safe in regards to: Network security Physical Security Computer Systems & Files Unencrypted is ideal for storing your data because it will make it most easily read by you and others in the future. Uncompressed is also ideal for storage, but if you need to do so to conserve space, limit compression to your 3rd backup copy Data Management guide: Storage and Security Image courtesy of UCF Libraries
9
Maintaining files Keeping track of versions of documents and datasets is critical. Strategies include: Directory Structure Naming Conventions File Naming conventions Always record every change to a file no matter how small. Discard obsolete versions after making backups. Track changes “Computer Center II Building - IBM PCs arrive” image courtesy of UCF Libraries University Archives University Photograph Collection
10
Preserving files Keeping reliable backups is an integral part of file management. Three backup copies (original, external but local to your institution, and external at a remote location). Check the integrity of your backed-up files using checksum validation. Create a backup schedule, use reliable backup medium AND test out your backup system by testing file restores. The UK Data Archive provides additional guidelines on data storage, back-up, and security. “Computer with UCF Pegasus logo” image courtesy of UCF Libraries University Archives University Photograph Collection
11
Digital Archiving tools
Personal Archiving Preserving Your Digital Memories (LOC) Digital Photographs Digital Audio Digital Video Digital Records Websites
12
DMP tool Learn more:
18
Map from http://stars. library. ucf. edu/ahistoryofcentralflorida/
Map from Retrieved March 1, 2017.
19
Dashboard Shortcut
22
Questions? Thank you!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.