This article describes a methodology which supports evaluation of bit preservation strategies for different digital materials. This includes evaluation of alternative bit preservation solutions. The methodology presented uses the preservation planning tool Plato for evaluations, and a BR-ReMS prototype to calculate measures for how well bit preservation requirements are met. Planning storage of different types of data as part of preservation planning involves classification of the data with regard to requirements on confidentiality, bit safety, availability and costs. Selection of storage parameters is quite complex since e.g. more copies of data means better bit safety, but higher cost and higher risk of compromising confidentiality. Based...
This poster provides the latest updates on the Digital Preservation Storage Criteria. These Criteria...
The aim of this paper is to illustrate how vulnerable bit preservation is, regardless of how well pr...
The aim of this paper is to illustrate how vulnerable bit preservation is, regardless of how well pr...
This article describes a methodology which supports evaluation of bit preservation strategies for di...
Purpose:The purpose of this paper is to point out the importance of taking a holistic approach to bi...
In this paper we present the results from The Danish National Bit Repository project. The project ai...
The Digital Preservation Storage Criteria (hereafter, the Criteria) grew out of a community discussi...
The Digital Preservation Storage Criteria (hereafter, the Criteria) grew out of a community discussi...
The Digital Preservation Storage Criteria (hereafter, the Criteria) grew out of a community discussi...
The Digital Preservation Storage Criteria (or “Criteria”) resulted from a community discussion at iP...
The Royal Danish Library has used the open source Bitrepository.org framework as basis for bit prese...
The Royal Danish Library has used the open source Bitrepository.org framework as basis for bit prese...
For years, discussions of digital preservation have routinely featured comments such as “bit preserv...
For years, discussions of digital preservation have routinely featuredcommentssuchas“bitpreservation...
For years, discussions of digital preservation have routinely featured comments such as “bit preserv...
This poster provides the latest updates on the Digital Preservation Storage Criteria. These Criteria...
The aim of this paper is to illustrate how vulnerable bit preservation is, regardless of how well pr...
The aim of this paper is to illustrate how vulnerable bit preservation is, regardless of how well pr...
This article describes a methodology which supports evaluation of bit preservation strategies for di...
Purpose:The purpose of this paper is to point out the importance of taking a holistic approach to bi...
In this paper we present the results from The Danish National Bit Repository project. The project ai...
The Digital Preservation Storage Criteria (hereafter, the Criteria) grew out of a community discussi...
The Digital Preservation Storage Criteria (hereafter, the Criteria) grew out of a community discussi...
The Digital Preservation Storage Criteria (hereafter, the Criteria) grew out of a community discussi...
The Digital Preservation Storage Criteria (or “Criteria”) resulted from a community discussion at iP...
The Royal Danish Library has used the open source Bitrepository.org framework as basis for bit prese...
The Royal Danish Library has used the open source Bitrepository.org framework as basis for bit prese...
For years, discussions of digital preservation have routinely featured comments such as “bit preserv...
For years, discussions of digital preservation have routinely featuredcommentssuchas“bitpreservation...
For years, discussions of digital preservation have routinely featured comments such as “bit preserv...
This poster provides the latest updates on the Digital Preservation Storage Criteria. These Criteria...
The aim of this paper is to illustrate how vulnerable bit preservation is, regardless of how well pr...
The aim of this paper is to illustrate how vulnerable bit preservation is, regardless of how well pr...