SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Preserving Software at Scale: The
Stephen Cabrinety Collection
Michael Olson, Stanford University Libraries
Douglas White, National Institute of Standards and Technology
Disclaimer
Trade names and company products are
mentioned in the text or identified. In no case
does such identification imply recommendation
or endorsement by the National Institute of
Standards and Technology, nor does it imply that
the products are necessarily the best available
for the purpose.
The Collection and NIST Grant









Collection consists of ~ 15,000 software titles from 1975 –
1995
Grant (Sept. 2013 – Aug. 2014) funded by National Institute
of Standards and Technology
Contains all media types from this period
Disk images to be added to National Software Reference
Library (NSRL) Reference Data Set
Disk images and photographs will be ingested into the
Stanford Digital Repository
Initial Stanford Tasks







Page software to campus
Register software titles in Digital Object Registry (DRUID,
Title, Source ID)
Enter descriptive metadata in NSRL database
Print tracking sheet
Ship to NIST
Preserving Software at Scale: The Stephen Cabrinety Collection
Preserving Software at Scale: The Stephen Cabrinety Collection
NIST NSRL Collection
Contains 14,500 pieces of computer software.
Focuses on Windows, Mac, Linux operating systems and
popular applications.
Modern formats : DVD & CD ROMs, 5¼ in. & 3 ½ in. disks.
Efforts 2005 to date:
19,500 media images
395 media errors (2%)
3,500 photograph sets
25,200 photos
Preserving Software at Scale: The Stephen Cabrinety Collection
SUL Cabrinety Collection
Focuses on games for Atari, Commodore, Amiga, Sega,
Nintendo, and Apple systems.
27 different operating systems represented.
Several formats : 8 in., 5¼ in., and 3 ½ in. computer disks,
cassettes, cartridges, CD-ROMs.
NIST Efforts to date:
900 media images
158 media errors (17%)
1,100 photograph sets
61,100 photos
NSRL Workstation

x
Workstation Equipment
Apple Mini, running Ubuntu 12.04 LTS
5000K lighting station
Canon T3i, tethered
Golden Thread Object Level Target
USB 3.5-inch floppy drive
Device Side Data FC5025 USB 5.25-inch floppy controller
ATA 5.25-inch floppy drive
USB barcode scanner
Firefox browser
Java photo organizer (custom, wraps gphoto2 etc.)
Perl media imager (custom, wraps dfcldd etc.)
Preserving Software at Scale: The Stephen Cabrinety Collection
Cartridge Media
Using Retrode adapter for SEGA Genesis and Super Nintendo
(SNES) games, plus plug-ins for Gameboy, Atari, Nintendo 64.
Could not generate a complete, consistent media image.
Every cartridge has metadata in a ROM “header” area; many
include a checksum, for anti-piracy use.
NSRL can calculate the SNES and SEGA Genesis checksums.
Game Boy and Nintendo are works in progress.
Detailed blog article recently published on Stanford website.
Results to date




Just received first batch of data from NIST
– 360 GB = 870 software titles, 116,000 unique files
Capture success rate:
– 83% with no modification or intervention
– Can increase by 5% with human intervention during imaging
– Can increase by 4% with intervention during image mount
– 8% of media have many (> 10%) sector read errors
Lessons and Improvements


Automation; less human interaction



Photography; use RAW and convert








Hardware for legacy media:
Apple physical formats
Large format floppy disks (8”)
Cassettes
Cartridge batteries
Lessons and Improvements






Data modeling beginning this month for repository
Copyright letter created to send to rights holders
Create persistent URL citation page (PURL) for software
Integration into Stanford Catalog called SearchWorks –
when rights allow




Just received first batch of data from NIST
360 GB = 870 software titles, 116,000 unique files
Copyright permissions letter created
Preserving Software at Scale: The Stephen Cabrinety Collection
Questions?
Michael Olson,
email: mgolson@stanford.edu
Douglas White
email: douglas.white@nist.gov

Mais conteúdo relacionado

Destaque

Macsinka gábor
Macsinka gáborMacsinka gábor
Macsinka gábormacsyde
 
'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talkRupertColley
 
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial NetworksSuperframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial NetworksOka Danil
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality12ort
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityBitglass
 
Target Your Obliques with The Half Kneeling Windmill
Target Your Obliques with The Half Kneeling WindmillTarget Your Obliques with The Half Kneeling Windmill
Target Your Obliques with The Half Kneeling WindmillJuan Lugo
 

Destaque (11)

Macsinka gábor
Macsinka gáborMacsinka gábor
Macsinka gábor
 
Conventions analysis
Conventions analysisConventions analysis
Conventions analysis
 
'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk
 
Values
ValuesValues
Values
 
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial NetworksSuperframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
Target Your Obliques with The Half Kneeling Windmill
Target Your Obliques with The Half Kneeling WindmillTarget Your Obliques with The Half Kneeling Windmill
Target Your Obliques with The Half Kneeling Windmill
 
Html
HtmlHtml
Html
 
Bus stop
Bus stopBus stop
Bus stop
 

Semelhante a Preserving Software at Scale: The Stephen Cabrinety Collection

Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.guestcf6f5b
 
Digital Forensic tools - Application Specific
Digital Forensic tools - Application SpecificDigital Forensic tools - Application Specific
Digital Forensic tools - Application Specificideaflashed
 
Digitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and MuseumsDigitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and MuseumsAnna Naruta-Moya
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Sound Recording Glossary Improved Version
Sound Recording Glossary   Improved VersionSound Recording Glossary   Improved Version
Sound Recording Glossary Improved VersionJoshuaRidett
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
No specimen (software) left behind
No specimen (software) left behindNo specimen (software) left behind
No specimen (software) left behindVince Smith
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the ArchiveGarethKnight
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...Blancco
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Michaelwilliamsig2task1worksheet
Michaelwilliamsig2task1worksheetMichaelwilliamsig2task1worksheet
Michaelwilliamsig2task1worksheetHooaax
 
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...Intel® Software
 
Methods and Principles of Sound Design and Production
Methods and Principles of Sound Design and ProductionMethods and Principles of Sound Design and Production
Methods and Principles of Sound Design and ProductionHooaax
 
Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2Jeff Sipko
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheetthomasmcd6
 
Shaun Warburton IG2 task 1
Shaun Warburton IG2 task 1 Shaun Warburton IG2 task 1
Shaun Warburton IG2 task 1 warburton9191
 

Semelhante a Preserving Software at Scale: The Stephen Cabrinety Collection (20)

Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.
 
Digital Forensic tools - Application Specific
Digital Forensic tools - Application SpecificDigital Forensic tools - Application Specific
Digital Forensic tools - Application Specific
 
Digitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and MuseumsDigitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and Museums
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Sound Recording Glossary Improved Version
Sound Recording Glossary   Improved VersionSound Recording Glossary   Improved Version
Sound Recording Glossary Improved Version
 
Deep Learning using OpenPOWER
Deep Learning using OpenPOWERDeep Learning using OpenPOWER
Deep Learning using OpenPOWER
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
No specimen (software) left behind
No specimen (software) left behindNo specimen (software) left behind
No specimen (software) left behind
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Michaelwilliamsig2task1worksheet
Michaelwilliamsig2task1worksheetMichaelwilliamsig2task1worksheet
Michaelwilliamsig2task1worksheet
 
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
 
resume
resumeresume
resume
 
Methods and Principles of Sound Design and Production
Methods and Principles of Sound Design and ProductionMethods and Principles of Sound Design and Production
Methods and Principles of Sound Design and Production
 
Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2
 
MIS Lesson2 Hardware
MIS Lesson2 HardwareMIS Lesson2 Hardware
MIS Lesson2 Hardware
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheet
 
Shaun Warburton IG2 task 1
Shaun Warburton IG2 task 1 Shaun Warburton IG2 task 1
Shaun Warburton IG2 task 1
 

Último

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 

Último (20)

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 

Preserving Software at Scale: The Stephen Cabrinety Collection

  • 1. Preserving Software at Scale: The Stephen Cabrinety Collection Michael Olson, Stanford University Libraries Douglas White, National Institute of Standards and Technology
  • 2. Disclaimer Trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the products are necessarily the best available for the purpose.
  • 3. The Collection and NIST Grant      Collection consists of ~ 15,000 software titles from 1975 – 1995 Grant (Sept. 2013 – Aug. 2014) funded by National Institute of Standards and Technology Contains all media types from this period Disk images to be added to National Software Reference Library (NSRL) Reference Data Set Disk images and photographs will be ingested into the Stanford Digital Repository
  • 4. Initial Stanford Tasks      Page software to campus Register software titles in Digital Object Registry (DRUID, Title, Source ID) Enter descriptive metadata in NSRL database Print tracking sheet Ship to NIST
  • 7. NIST NSRL Collection Contains 14,500 pieces of computer software. Focuses on Windows, Mac, Linux operating systems and popular applications. Modern formats : DVD & CD ROMs, 5¼ in. & 3 ½ in. disks. Efforts 2005 to date: 19,500 media images 395 media errors (2%) 3,500 photograph sets 25,200 photos
  • 9. SUL Cabrinety Collection Focuses on games for Atari, Commodore, Amiga, Sega, Nintendo, and Apple systems. 27 different operating systems represented. Several formats : 8 in., 5¼ in., and 3 ½ in. computer disks, cassettes, cartridges, CD-ROMs. NIST Efforts to date: 900 media images 158 media errors (17%) 1,100 photograph sets 61,100 photos
  • 11. Workstation Equipment Apple Mini, running Ubuntu 12.04 LTS 5000K lighting station Canon T3i, tethered Golden Thread Object Level Target USB 3.5-inch floppy drive Device Side Data FC5025 USB 5.25-inch floppy controller ATA 5.25-inch floppy drive USB barcode scanner Firefox browser Java photo organizer (custom, wraps gphoto2 etc.) Perl media imager (custom, wraps dfcldd etc.)
  • 13. Cartridge Media Using Retrode adapter for SEGA Genesis and Super Nintendo (SNES) games, plus plug-ins for Gameboy, Atari, Nintendo 64. Could not generate a complete, consistent media image. Every cartridge has metadata in a ROM “header” area; many include a checksum, for anti-piracy use. NSRL can calculate the SNES and SEGA Genesis checksums. Game Boy and Nintendo are works in progress. Detailed blog article recently published on Stanford website.
  • 14. Results to date   Just received first batch of data from NIST – 360 GB = 870 software titles, 116,000 unique files Capture success rate: – 83% with no modification or intervention – Can increase by 5% with human intervention during imaging – Can increase by 4% with intervention during image mount – 8% of media have many (> 10%) sector read errors
  • 15. Lessons and Improvements  Automation; less human interaction  Photography; use RAW and convert      Hardware for legacy media: Apple physical formats Large format floppy disks (8”) Cassettes Cartridge batteries
  • 16. Lessons and Improvements     Data modeling beginning this month for repository Copyright letter created to send to rights holders Create persistent URL citation page (PURL) for software Integration into Stanford Catalog called SearchWorks – when rights allow
  • 17.    Just received first batch of data from NIST 360 GB = 870 software titles, 116,000 unique files Copyright permissions letter created