Blogs: Preservation Strategies
Blog posts filtered by the Preservation Strategies subject tag.
Browse blogs by subject
Overview This webinar will explore the OPF reference toolset and show a generic view of how the OPF tools can map to a digital preservation process workflow. We will also present the new roadmap plans for the tools under our stewardship and explain how you can follow their progress and contribute to improving the tools. […]
By Becky McGuinness, posted in Becky McGuinness's Blog
Two weeks ago our archive interest group (AIG) held their first face to face meeting. We were kindly hosted by the Danish National Archives in Copenhagen. Currently the AIG comprises participants from our three national archive members in Denmark (Rigsarkivet) the Netherlands (Nationaal Archief), and Estonia (Rahvusarhiiv) (new members are welcome). The group has been […]
By Becky McGuinness, posted in Becky McGuinness's Blog
Overview This webinar looked at the techniques the National Archives New Zealand is developing to aid in the analysis of collections and also support the dissemination of the skill set that will help non-digital-preservation specialists continue to support the organisation in its ability to process born-digital collections. In 2013, the Archives New Zealand’s worked on analysing the content […]
By Becky McGuinness, posted in Becky McGuinness's Blog
Over the last three and a half years, the SCAPE project worked in several directions in order to propose new solutions for digital preservation, as well as improving existing ones. One of the results of this work is the SCAPE preservation environment (SPE). It is a loosely coupled system, which enables extending existing digital repository […]
By jmaferreira, posted in jmaferreira's Blog
During my time at The National Archives UK, colleague, Adam Retter, developed a methodology for the reversible pre-conditioning of complex binary objects. The technique was required to avoid the doubling of storage for malformed JPEG2000 objects numbering in the hundreds of thousands. The difference between a malformed JPEG2000 file and a corrected, well-formed JPEG2000 file, in […]
By ross-spencer, posted in ross-spencer's Blog
Anyone willing to preserve digital content must be aware of events that might constitute a relevant risk. In SCAPE we are developing tools that will allow you to detect risks before they cause any irreversible damage. Help us understand the preservation events, threats and opportunities, you find more relevant and the ways you would like […]
By lfaria, posted in lfaria's Blog
Now that the subproject lead in PW is being transferred from me to Kresimir, it seems a good time to reflect a little on what we have achieved in PW since February 2011 and what is left to do! What did we set out to do? To accomplish effective digital preservation, environments with a preservation […]
By cbecker, posted in cbecker's Blog
Digital Preservation is making certain progress in terms of tool development, progressive establishment of standards and increasing activity in user communities, but there is a wide gap of approaches to systematically assess, compare and improve how organizations go about achieving their preservation goals. Some standards exist suggesting certain functional building blocks and others prescribing criteria […]
By cbecker, posted in cbecker's Blog
A couple of preservation workflows (such as full system preservation through imaging) or processing in digital forensics depend on reliable hardware-software stacks for identity system disk migrations. As especially the x86 platform is moving forward very fast, the hardware and software changes rapidly. Even if the standard suggests compatibility, there are a number of pitfalls […]
By Dirk von Suchodoletz, posted in Dirk von Suchodoletz's Blog
Remote access to emulation, remote emulation and the emergence of a wide range of different cloud services, and end users interacting with them remotely through standardized (web-)client applications on their various devices offers the chance to combine both into an integrated access system to various obsolete computer environments. In order to provide a wide range […]
By Dirk von Suchodoletz, posted in Dirk von Suchodoletz's Blog