11. • 1986 DOMESDAY PROJECT
• 1999 HARDLY ANY SYSTEMS LEFT
• 1999 CAMILEON BEGINS WORK
• 2001 ADRIAN PEARCE BEGINS
• 2002 CAMILEON EMULATION
• 2003 BBC DIGITAL MASTERS
• 2004 PEARCE PUBLISHES DATA
• 2008 PEARCE DIES, SO DOES SITE
• PRESENT: HTTP://WWW.BBC.CO.UK/HISTORY/DOMESDAY
17. A. ORGANIZATIONAL INFRASTRUCTURE
A.3 PROCEDURAL ACCOUNTABILITY
1. COMMUNITY IDENTIFIED
2. MECHANISMS FOR REVIEW OF PROCEDURE
3. WRITTEN LEGAL POLICY RE: PERMISSIONS
4. PERIODIC TECH UPDATE
5. USER FEEDBACK
6. GENERAL TRANSPARENCY &
ACCOUNTABILITY
18. A. ORGANIZATIONAL INFRASTRUCTURE
A.4 FINANCIAL SUSTAINABILITY
1. SHORT & LONG TERM BUSINESS PLAN
2. ANNUAL [AT LEAST] REVIEW OF PLAN
3. TRANSPARENT & COMPLIANT FINANCIALS
19. A. ORGANIZATIONAL INFRASTRUCTURE
A.5 CONTRACTS, LICENSES, LIABILITIES
1. DEPOSIT AGREEMENTS [INCLUDING
PRESERVATION RIGHTS]
2. TRACK AND MANAGE INTELLECTUAL
PROPERTY
20. B. DIGITAL OBJECT MANAGEMENT
B.1 ACQUISITION AND INGEST
1. IDENTIFY PROPERTIES TO PRESERVE
2. SPECIFY METADATA REQUIRED AT INGEST
3. ABLE TO AUTHENTICATE SOURCE
4. SUFFICIENT PHYSICAL CONTROL
5. APPROPRIATE FEEDBACK TO DEPOSITOR
7. RECORD OF ALL PRESERVATION ACTIONS
21. B. DIGITAL OBJECT MANAGEMENT
B.2 CREATING AN ARCHIVABLE PACKAGE
1. WRITTEN DEFINITION OF ALL AIP’S
2. DOCUMENTATION OF SIP => AIP PROCESS
3. NAMING CONVENTION FOR IDENTIFIERS
4. REPRESENTATION / FORMAT INFORMATION
5. DOCUMENTED PROCESS FOR ‘RENDER’
22. B. DIGITAL OBJECT MANAGEMENT
B.3 PRESERVATION PLANNING
1. DOCUMENTED PRESERVATION STRATEGIES
2. OBSOLESCENCE MONITORING MECHANISMS
3. MEANS TO CHANGE 1 BASED ON 2
4. EVIDENCE OF EFFECTIVENESS
23. B. DIGITAL OBJECT MANAGEMENT
B.4 ARCHIVAL STORAGE
1. PRESERVE CONTENT INFORMATION
2. ACTIVELY MONITOR FIXITY INFORMATION
24. B. DIGITAL OBJECT MANAGEMENT
B.5 INFORMATION MANAGEMENT
1. SPECIFY MINIMUM METADATA
REQUIREMENTS FOR DISCOVERABILITY
2. MEET THIS REQUIREMENT
3. DEMONSTRABLE REFERENTIAL INTEGRITY
25. B. DIGITAL OBJECT MANAGEMENT
B.6 ACCESS MANAGEMENT
1. COMMUNICATE ACCESS OPTIONS
2. POLICY FOR DOCUMENTATION OF ACCESS
3. RESPECTFUL OF ACCESS AGREEMENTS
4. DOCUMENTED ACCESS POLICIES
5. LOG INAPPROPRIATE ACCESS
6. DISSEMINATE COPIES OF ORIGINAL
OBJECTS TRACEABLE TO THE ORIGINAL
26. C. TECHNOLOGY, INFRASTRUCTURE, SECURITY
C.1 SYSTEM INFRASTRUCTURE
1. REPOSITORY RUNS ON WELL SUPPORTED
SYSTEMS (I.E. LINUX/UNIX)
2. ADEQUATE SUPPORT FOR BACKUP
3. REPOSITORY MANAGES BACKUPS
5. MECHANISMS TO DETECT, REPORT, AND ACT
UPON CASES OF CORRUPTION
6. HARD/SOFTWAREWARE UPGRADE
PROCEDURE
7. MEANS TO TEST SYSTEM CHANGES
27. C. TECHNOLOGY, INFRASTRUCTURE, SECURITY
C.2 APPROPRIATE TECHNOLOGIES
1. HARDWARE / SOFTWARE APPROPRIATE TO
DESIGNATED COMMUNITY & SERVICES
28. C. TECHNOLOGY, INFRASTRUCTURE, SECURITY
C.3 SECURITY
1. SYSTEMATIC ANALYSIS OF DATA, PERSONNEL,
PHYSICAL PLANT, AND SECURITY NEEDS.
2. STAFF HAVE AUTHORIZATION RELEVANT TO
ROLE WITHIN SYSTEM
3. WRITTEN DISASTER PREPAREDNESS AND
RECOVERY PLAN.
4. OFFSITE BACKUPS. OFFSITE RECOVERY
PLAN.
42. Evaluation of
Characterisation Tools
Part 1: Identification
Authors
Johan van der Knijff, National Library of the Netherlands
Carl Wilson, British Library
September 2011
43. COOL PROJECTS
- OR -
OK SO YOU’VE PRESERVED THIRTY
YEARS OF DISK IMAGES. NOW WHAT.
61. Digital Forensics
and Born-Digital Content
in Cultural Heritage
Collections
by Matthew G. Kirschenbaum
Richard Ovenden
Gabriela Redwine
with research assistance from Rachel Donahue
December 2010
Council on Library and Information Resources
Washington, D.C.
62. Statistical Tools for Digital Forensics
Alin C. Popescu and Hany Farid ?
Department of Computer Science at Dartmouth College
Abstract. A digitally altered photograph, often leaving no visual clues of having been tampered with, can
be indistinguishable from an authentic photograph. As a result, photographs no longer hold the unique
stature as a definitive recording of events. We describe several statistical techniques for detecting traces of
digital tampering in the absence of any digital watermark or signature. In particular, we quantify statistical
correlations that result from specific forms of digital tampering, and devise detection schemes to reveal these
correlations.
1 Introduction
The advent of low-cost and high-resolution digital cameras, and sophisticated photo-editing software, has
made it remarkably easy to manipulate and alter digital images. In addition, digital forgeries, often leaving no
63. SOAA_SP10 23/5/06 3:33 PM Page 159
T H E A M E R I C A N A R C H I V I S T
“The Old Version Flickers More”:
Digital Preservation from the
User’s Perspective
Margaret L. Hedstrom, Christopher A. Lee, Judith S. Olson,
Clifford A. Lampe
Abstract
Most criteria for evaluating digital preservation strategies are based on needs and require-
ments from the archivist’s perspective. In the CAMiLEON Project, we wanted to learn what
significant properties users consider worth preserving. In this article, we present the results
of two experiments that used human subjects to learn about user preferences for different
formats of preserved digital objects. We tested subjects’ reactions to digital materials that were
64. A FEW PEOPLE TO FOLLOW
[INCOMPLETE LIST, BUT OH WELL]
@TEXTFILES @MKIRSCHENBAUM
@KARIKRAUS
@ITPARCHIVE
@AVPRESERVE
@UMD_MITH
@JUSPAR
@JENGUILIANO
@JONVOSS
@EMORYDISC
@DOUGRESIDE @READYRESOURCES
@EUANC
AND MANY MORE……