Contents: This report looks at preservation services, whether out-sourced or in-house and the considerations that are important when defining the service level agreement (SLA) with the service provider. The majority concerns a proposal of 21 capabilities, 12 features of interest, 15 metrics, 12 quality of service terms, 4 constraints, 6 pricing terms and 7 penalty terms to be included in …
ID 3.2.1 Threats to data integrity from use of large-scale data management environments
Contents: Scope Executive summary 1. Assessing the risks to data integrity when preserving and accessing AV files 2. Example Risk Analysis focussing on data integrity 3. Failure modes and data corruption from mass storage technology 4. Errors for video, audio and images and their detection 5. File Quality-control in current use Annex 1: OCTAVE Allegro Worksheets Annex 2: OCTAVE Allegro …
Funding for Sustainability: How Funders’ Practices Influence the Future of Digital Resources
Contents: Executive Summary 1. Introduction, Background, and Methodology 2. Defining the Sustainability Challenge 3. Current Funder Strategies for Sustainability 4. Concluding thoughts Appendices Bibliography This report presents the results of a study undertaken by Ithaka S+R, for the JISC Strategic Content Alliance, to examine the ways that both public and private funding bodies, in the academic and cultural heritage sectors, …
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment
Contents: This article proposes a new outcome-based model, the Simple Property-Oriented Threat (SPOT) Model for Risk Assessment which defines six essential properties of successful digital preservation and identifies a limited set of threats. After an introduction, section 2 reviews several existing threat models in the context of four desired attributes: conceptual clarity, appropriate detail and consistent granularity, comprehensiveness and simplicity. …