SlideShare uma empresa Scribd logo
1 de 18
Protecting Your Digital Legacy Rotary of Burien/White Center 7/7/11 Nick Webb, Red Wire Services
Who Am I?
Scary Statistics 70% of small businesses in the U.S. experienced a data loss in 2009 due to technical or human disasters. - AMI 2009 U.S. SMB Annual Overview Study For companies with a recovery plan in place, nearly half executed at least some of the plan over a one year period. — 2008 Continuity Insights and KPMG Advisory Services Business Continuity Management Benchmarking Report
Protecting Your Digital Legacy How was data archived in the last? Why these general methods fail for the next century What we can do to protect digital assets for the next generation and beyond
Last CenturyThe Hudson River circa 1908. "RMS Lusitania passing Hoboken piers."
Last Century(to present)(microfiche microfilm)
Benign Neglect(Catherine C. Marshall -- Microsoft Research)
This CenturyLifespans
“Forced” Migration
Coping Invest time upfront (when created) Assign value to each image (High to Low) Record pertinent information at time of capture (e.g. who is in the photo, who took it, when and where it was taken) Delete photos as soon as it’s clear no value remains Use “standard” software
Coping:  Limit What’s Important Store working and archive images separately Revisit archive regularly and prune what is no longer valuable Better solutions likely on the way… hold tight
Protect What’s Left Stop-Gap:  Consider high quality, professional prints for archiving Store backup copy “in the cloud”, verify frequently Maybe do both
Conclusion Stuff happens more often than you may think While rare, natural disasters do happen (August 2000 Dallas Tornado) Files are lost and accidentally deleted
Conclusion Your best chance is to act soon Only you can determine and manage what is important You are ultimately responsible
If Nothing Else… Classify the most important ~100 photos Manage those wisely
Questions?
Contact Nick Webb Red Wire Services nickw@redwireservices.com 206.829.8621 http://www.RedWireServices.com Twitter:  @RedWireServices
References Rethinking Personal Digital Archiving, Part 1 Four Challenges from the Field Catherine C. Marshall Microsoft Research, Silicon Valley http://www.dlib.org/dlib/march08/marshall/03marshall-pt1.html Rethinking Personal Digital Archiving, Part 2 Implications for Services, Applications, and Institutions Catherine C. Marshall Microsoft Research, Silicon Valley http://www.dlib.org/dlib/march08/marshall/03marshall-pt2.html

Mais conteúdo relacionado

Semelhante a Protecting Your Digital Legacy

Machine Learning, Data Mining, and
Machine Learning, Data Mining, and Machine Learning, Data Mining, and
Machine Learning, Data Mining, and
butest
 
Big Data in NATO and Your Role
Big Data in NATO and Your RoleBig Data in NATO and Your Role
Big Data in NATO and Your Role
Jay Gendron
 
Data Mining and Knowledge Discovery in Business Databases
Data Mining and Knowledge Discovery in Business DatabasesData Mining and Knowledge Discovery in Business Databases
Data Mining and Knowledge Discovery in Business Databases
butest
 
ForgetIT Project TYPO3Camp Milano 2014
ForgetIT Project TYPO3Camp Milano 2014ForgetIT Project TYPO3Camp Milano 2014
ForgetIT Project TYPO3Camp Milano 2014
Olivier Dobberkau
 
Simulation Strategy Show
Simulation Strategy ShowSimulation Strategy Show
Simulation Strategy Show
jsturman
 

Semelhante a Protecting Your Digital Legacy (20)

Machine Learning, Data Mining, and
Machine Learning, Data Mining, and Machine Learning, Data Mining, and
Machine Learning, Data Mining, and
 
Big Data in NATO and Your Role
Big Data in NATO and Your RoleBig Data in NATO and Your Role
Big Data in NATO and Your Role
 
Data Mining and Knowledge Discovery in Business Databases
Data Mining and Knowledge Discovery in Business DatabasesData Mining and Knowledge Discovery in Business Databases
Data Mining and Knowledge Discovery in Business Databases
 
US Office of Personnel Management: Notes on "Big Data"
US Office of Personnel Management: Notes on  "Big Data" US Office of Personnel Management: Notes on  "Big Data"
US Office of Personnel Management: Notes on "Big Data"
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
So what if it's a bubble?
So what if it's a bubble?So what if it's a bubble?
So what if it's a bubble?
 
Big Data, Big Deal: For Future Big Data Scientists
Big Data, Big Deal: For Future Big Data ScientistsBig Data, Big Deal: For Future Big Data Scientists
Big Data, Big Deal: For Future Big Data Scientists
 
College Presentation
College PresentationCollege Presentation
College Presentation
 
lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
 
Katherine Skinner - Economics of Digital Preservation
Katherine Skinner - Economics of Digital PreservationKatherine Skinner - Economics of Digital Preservation
Katherine Skinner - Economics of Digital Preservation
 
Managing large and complex data sets
Managing large and complex data setsManaging large and complex data sets
Managing large and complex data sets
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital Age
 
Big data introduction
Big data introductionBig data introduction
Big data introduction
 
Big data: understanding the present
Big data: understanding the presentBig data: understanding the present
Big data: understanding the present
 
ForgetIT Project TYPO3Camp Milano 2014
ForgetIT Project TYPO3Camp Milano 2014ForgetIT Project TYPO3Camp Milano 2014
ForgetIT Project TYPO3Camp Milano 2014
 
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
 
Simulation Strategy Show
Simulation Strategy ShowSimulation Strategy Show
Simulation Strategy Show
 
Mass declassification sept 23 2010v2.1
Mass declassification sept 23 2010v2.1Mass declassification sept 23 2010v2.1
Mass declassification sept 23 2010v2.1
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Lecture1
Lecture1Lecture1
Lecture1
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Protecting Your Digital Legacy

  • 1. Protecting Your Digital Legacy Rotary of Burien/White Center 7/7/11 Nick Webb, Red Wire Services
  • 3. Scary Statistics 70% of small businesses in the U.S. experienced a data loss in 2009 due to technical or human disasters. - AMI 2009 U.S. SMB Annual Overview Study For companies with a recovery plan in place, nearly half executed at least some of the plan over a one year period. — 2008 Continuity Insights and KPMG Advisory Services Business Continuity Management Benchmarking Report
  • 4. Protecting Your Digital Legacy How was data archived in the last? Why these general methods fail for the next century What we can do to protect digital assets for the next generation and beyond
  • 5. Last CenturyThe Hudson River circa 1908. "RMS Lusitania passing Hoboken piers."
  • 7. Benign Neglect(Catherine C. Marshall -- Microsoft Research)
  • 10. Coping Invest time upfront (when created) Assign value to each image (High to Low) Record pertinent information at time of capture (e.g. who is in the photo, who took it, when and where it was taken) Delete photos as soon as it’s clear no value remains Use “standard” software
  • 11. Coping: Limit What’s Important Store working and archive images separately Revisit archive regularly and prune what is no longer valuable Better solutions likely on the way… hold tight
  • 12. Protect What’s Left Stop-Gap: Consider high quality, professional prints for archiving Store backup copy “in the cloud”, verify frequently Maybe do both
  • 13. Conclusion Stuff happens more often than you may think While rare, natural disasters do happen (August 2000 Dallas Tornado) Files are lost and accidentally deleted
  • 14. Conclusion Your best chance is to act soon Only you can determine and manage what is important You are ultimately responsible
  • 15. If Nothing Else… Classify the most important ~100 photos Manage those wisely
  • 17. Contact Nick Webb Red Wire Services nickw@redwireservices.com 206.829.8621 http://www.RedWireServices.com Twitter: @RedWireServices
  • 18. References Rethinking Personal Digital Archiving, Part 1 Four Challenges from the Field Catherine C. Marshall Microsoft Research, Silicon Valley http://www.dlib.org/dlib/march08/marshall/03marshall-pt1.html Rethinking Personal Digital Archiving, Part 2 Implications for Services, Applications, and Institutions Catherine C. Marshall Microsoft Research, Silicon Valley http://www.dlib.org/dlib/march08/marshall/03marshall-pt2.html

Notas do Editor

  1. Documents stored on paper1000+ YearsPhotos on developed paper 150+ years of life expectedMicrofilmIn use since early 1900s500+ years predicted shelf life
  2. Shove in Shoebox / Safe Deposit BoxMaybe review every decade or soWorks OK for non-digital artifactsDestined for failure in the digital worldEasy to create overwhelming amount of photosMost folks give up
  3. Digital photosTo be determined; only in wide use since late 1990s, need for long term storage may not have sunk in yet.Media“Burned” CD/DVDsAbout 5 years, highly debatedData TapesAbout 30 years, maybeHard DrivesAbout 5 years