BlogJanuary 12, 2017
Over the past months we have held a series of all-team meetings to take stock and revisit the fundamentals of AVPreserve: who we are, what we do, and why we do it. An outcome of this is a series of statements that serve as a reference and reminder to ourselves as we move through busy ... read more
When an organization sets out to acquire new technology, they are putting more than resources like time and money on the line. The reality is that "even when the technology solution is purportedly at hand…technology is not the solution, only part of it.”
In August, I had the honor of joining SAA Council and beginning a three-year term serving the SAA membership. At our first meeting, I was excited to hear about Nancy McGovern’s plans for the Try5 SAA initiative over the course of this year. I volunteered immediately to participate any way I could to share skills ... read more
I’ve been thinking a lot lately about organizations who haven’t started with digital preservation yet, and it’s got me wondering…why?
Deciding which tools to use and approaches to take to perform assessment can be a difficult decision. There are complex standards, like ISO 16363, more lightweight technology and infrastructure guidance like NDSA’s Levels of Digital Preservation (LoDP), internally devised audits, and others. Each approach and tool is valued in our digital preservation arsenal, but deciding ... read more
The author suggests pairing this post with The Village Green Preservation Society by The Kinks. Sweet jams make the musings go down easier. Independence, Kansas, is a small town located roughly 115 miles southeast of Wichita, Kansas. It is home to just over 9,000 people, a population ... read more
In a sea of digital information, it is no longer about who owns the hardware. The physical location of the server is not what defines possession. Possession is restricted to those with the appropriate metadata (e.g., credentials, permissions), which grants them access; and, the ability to derive value is constrained to those who have metadata ... read more
If we know our collections at the elementary levels, we can be better equipped to care for these collections, to design preventive preservation techniques, to perform conservation treatments when necessary, and to ensure the long-term accessibility of our records in the face of continued technological obsolescence and change.
A significant portion of certain Archivist's job is processing collections -- the activity of arranging and describing materials that have been deposited with an archive. At times this is simple. For the most part it is difficult. Consider your own paper and digital files, and imagine someone who doesn't know you personally sifting through those ... read more
A file's checksum is a specially generated hash based on a computation of all of the individual bytes that make up the file. A variety of algorithms exist that can be used to perform this computation, e.g., MD5, SHA-1, or SHA-256. For example, an MD5 checksum is a 32-bit string that may look something like ... read more