ID 3.2.1 Threats to data integrity from use of large-scale data management environments

Contents: Scope Executive summary 1. Assessing the risks to data integrity when preserving and accessing AV files 2. Example Risk Analysis focussing on data integrity 3. Failure modes and data corruption from mass storage technology 4. Errors for video, audio and images and their detection 5. File Quality-control in current use Annex 1: OCTAVE Allegro Worksheets Annex 2: OCTAVE Allegro …

D2.3.1 Service-Oriented Models for Audiovisual Content Storage

Contents: Scope Executive Summary 1. Introduction 2. Preservation Models vs Storage Models 3. Lifecycles 4. State of the Art in Storage Services 5. Value Networks and Architectures 6. Data to be Stored 7. Data Transfer Protocols 8. Data Transfer Benchmarking 9. Security 10. Interfaces Conclusion Glossary Annexes. The focus of this deliverable is online storage services which host digital audiovisual …

Funding for Sustainability: How Funders’ Practices Influence the Future of Digital Resources

Contents: Executive Summary 1. Introduction, Background, and Methodology 2. Defining the Sustainability Challenge 3. Current Funder Strategies for Sustainability 4. Concluding thoughts Appendices Bibliography This report presents the results of a study undertaken by Ithaka S+R, for the JISC Strategic Content Alliance, to examine the ways that both public and private funding bodies, in the academic and cultural heritage sectors, …

Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment

Contents: This article proposes a new outcome-based model, the Simple Property-Oriented Threat (SPOT) Model for Risk Assessment which defines six essential properties of successful digital preservation and identifies a limited set of threats. After an introduction, section 2 reviews several existing threat models in the context of four desired attributes: conceptual clarity, appropriate detail and consistent granularity, comprehensiveness and simplicity. …