Enviar pesquisa
Carregar
The Quest for Digital Preservation - MathFest 2015 - Bibliography
•
0 gostou
•
192 visualizações
N
newmanld
Seguir
Bibliography to accompany presentation
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 4
Baixar agora
Baixar para ler offline
Recomendados
Anytime Cash Karo- NO INTERNET NO BANK NO SMARTPHONE
Anytime Cash Karo- NO INTERNET NO BANK NO SMARTPHONE
Sunil Nair
Detail of three textures #2
Detail of three textures #2
stefmia
Blackberry
Blackberry
Gaurav Chawla
Catherine Wagner's Portfolio
Catherine Wagner's Portfolio
Catherine Wagner
RecommendationCrowther
RecommendationCrowther
Danielle Thayer
Третій Zakupki Forum - Як вихідці з бізнесу впроваджували ProZorro у забюрокр...
Третій Zakupki Forum - Як вихідці з бізнесу впроваджували ProZorro у забюрокр...
Zakupki.Prom.ua
Livro Declaracoes Fiscais - COAD
Livro Declaracoes Fiscais - COAD
COAD
HowJudgesDontThink
HowJudgesDontThink
Scott Dewey
Recomendados
Anytime Cash Karo- NO INTERNET NO BANK NO SMARTPHONE
Anytime Cash Karo- NO INTERNET NO BANK NO SMARTPHONE
Sunil Nair
Detail of three textures #2
Detail of three textures #2
stefmia
Blackberry
Blackberry
Gaurav Chawla
Catherine Wagner's Portfolio
Catherine Wagner's Portfolio
Catherine Wagner
RecommendationCrowther
RecommendationCrowther
Danielle Thayer
Третій Zakupki Forum - Як вихідці з бізнесу впроваджували ProZorro у забюрокр...
Третій Zakupki Forum - Як вихідці з бізнесу впроваджували ProZorro у забюрокр...
Zakupki.Prom.ua
Livro Declaracoes Fiscais - COAD
Livro Declaracoes Fiscais - COAD
COAD
HowJudgesDontThink
HowJudgesDontThink
Scott Dewey
8 клас характеристика хімічних елементів і періодична система
8 клас характеристика хімічних елементів і періодична система
Евгений Козырев
ΩΡΕΣ ΕΝΗΜΕΡΩΣΗΣ ΓΟΝΕΩΝ
ΩΡΕΣ ΕΝΗΜΕΡΩΣΗΣ ΓΟΝΕΩΝ
Elena Mitta
Ts boys
Ts boys
panat5lthes
биогенная классификация химических элементов
биогенная классификация химических элементов
Kirrrr123
предельные одноатомные спирты
предельные одноатомные спирты
Kirrrr123
Валентність хімічних елементів
Валентність хімічних елементів
Евгений Козырев
Acuan bulk density
Acuan bulk density
Asep Rahmat Fatahillah
ΔιαδίκτυοGt
ΔιαδίκτυοGt
panat5lthes
Kexa
Kexa
panat5lthes
Pel_osip
Pel_osip
panat5lthes
Ερωτόκριτος
Ερωτόκριτος
panat5lthes
Accounting as a career .....power point
Accounting as a career .....power point
Raj Roy
Insertar documentos en blogger
Insertar documentos en blogger
Paz Gonzalo
web 2.0, 3.0, X.0, and internet of things
web 2.0, 3.0, X.0, and internet of things
nikospro526
σχεδιασμός μαθήματος για τη διδασκαλία της ελληνικής ως δεύτερης/ξένης γλώσσας
σχεδιασμός μαθήματος για τη διδασκαλία της ελληνικής ως δεύτερης/ξένης γλώσσας
gvlachos
Blue Ocean Strategy
Blue Ocean Strategy
Yodhia Antariksa
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Mais conteúdo relacionado
Destaque
8 клас характеристика хімічних елементів і періодична система
8 клас характеристика хімічних елементів і періодична система
Евгений Козырев
ΩΡΕΣ ΕΝΗΜΕΡΩΣΗΣ ΓΟΝΕΩΝ
ΩΡΕΣ ΕΝΗΜΕΡΩΣΗΣ ΓΟΝΕΩΝ
Elena Mitta
Ts boys
Ts boys
panat5lthes
биогенная классификация химических элементов
биогенная классификация химических элементов
Kirrrr123
предельные одноатомные спирты
предельные одноатомные спирты
Kirrrr123
Валентність хімічних елементів
Валентність хімічних елементів
Евгений Козырев
Acuan bulk density
Acuan bulk density
Asep Rahmat Fatahillah
ΔιαδίκτυοGt
ΔιαδίκτυοGt
panat5lthes
Kexa
Kexa
panat5lthes
Pel_osip
Pel_osip
panat5lthes
Ερωτόκριτος
Ερωτόκριτος
panat5lthes
Accounting as a career .....power point
Accounting as a career .....power point
Raj Roy
Insertar documentos en blogger
Insertar documentos en blogger
Paz Gonzalo
web 2.0, 3.0, X.0, and internet of things
web 2.0, 3.0, X.0, and internet of things
nikospro526
σχεδιασμός μαθήματος για τη διδασκαλία της ελληνικής ως δεύτερης/ξένης γλώσσας
σχεδιασμός μαθήματος για τη διδασκαλία της ελληνικής ως δεύτερης/ξένης γλώσσας
gvlachos
Blue Ocean Strategy
Blue Ocean Strategy
Yodhia Antariksa
Destaque
(16)
8 клас характеристика хімічних елементів і періодична система
8 клас характеристика хімічних елементів і періодична система
ΩΡΕΣ ΕΝΗΜΕΡΩΣΗΣ ΓΟΝΕΩΝ
ΩΡΕΣ ΕΝΗΜΕΡΩΣΗΣ ΓΟΝΕΩΝ
Ts boys
Ts boys
биогенная классификация химических элементов
биогенная классификация химических элементов
предельные одноатомные спирты
предельные одноатомные спирты
Валентність хімічних елементів
Валентність хімічних елементів
Acuan bulk density
Acuan bulk density
ΔιαδίκτυοGt
ΔιαδίκτυοGt
Kexa
Kexa
Pel_osip
Pel_osip
Ερωτόκριτος
Ερωτόκριτος
Accounting as a career .....power point
Accounting as a career .....power point
Insertar documentos en blogger
Insertar documentos en blogger
web 2.0, 3.0, X.0, and internet of things
web 2.0, 3.0, X.0, and internet of things
σχεδιασμός μαθήματος για τη διδασκαλία της ελληνικής ως δεύτερης/ξένης γλώσσας
σχεδιασμός μαθήματος για τη διδασκαλία της ελληνικής ως δεύτερης/ξένης γλώσσας
Blue Ocean Strategy
Blue Ocean Strategy
Último
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Último
(20)
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
The Quest for Digital Preservation - MathFest 2015 - Bibliography
1.
The Quest for Digital Preservation — MathFest 2015 Bibliography Understanding checksums and hash functions “Checksum.” Wikipedia, the Free Encyclopedia, June 19, 2015. https://en.wikipedia.org/w/index.php?title=Checksum&oldid=667621054. “Comparison of SHA Functions.” Wikipedia, the Free Encyclopedia, July 20, 2015. https://en.wikipedia.org/w/index.php?title=SHA3&oldid=672206476#Comparison_of_SHA_func tions. Crowley, Paul. “LShift Why I Support the US Government Making a Cryptography Standard Weaker,” October 1, 2013. http://www.lshift.net/blog/2013/10/01/whyisupporttheusgovernmentmakingacryptographys tandardweaker/. “Cryptographic Hash Function.” Wikipedia, the Free Encyclopedia, July 28, 2015. https://en.wikipedia.org/w/index.php?title=Cryptographic_hash_function&oldid=673479707. “Cyclic Redundancy Check.” Wikipedia, the Free Encyclopedia, June 1, 2015. https://en.wikipedia.org/w/index.php?title=Cyclic_redundancy_check&oldid=66503428. LeFurgy, Bill. “Hashing Out Digital Trust | The Signal: Digital Preservation.” Webpage, November 15, 2011. http://blogs.loc.gov/digitalpreservation/2011/11/hashingoutdigitaltrust/. “List of Hash Functions.” Wikipedia, the Free Encyclopedia, July 7, 2015. https://en.wikipedia.org/w/index.php?title=List_of_hash_functions&oldid=670380038. “MD5.” Wikipedia, the Free Encyclopedia, July 28, 2015. https://en.wikipedia.org/w/index.php?title=MD5&oldid=673517851. “SHA1.” Wikipedia, the Free Encyclopedia, July 30, 2015. https://en.wikipedia.org/w/index.php?title=SHA1&oldid=673838295. “SHA2.” Wikipedia, the Free Encyclopedia, July 30, 2015. https://en.wikipedia.org/w/index.php?title=SHA2&oldid=673712593. “SHA3.” Wikipedia, the Free Encyclopedia, July 20, 2015. https://en.wikipedia.org/w/index.php?title=SHA3&oldid=672206476. “The Keccak Sponge Function Family.” Accessed August 2, 2015. http://keccak.noekeon.org/yes_this_is_keccak.html. Checksum collisions “Peter Selinger: MD5 Collision Demo.” Accessed August 2, 2015. http://www.mathstat.dal.ca/~selinger/md5collision/. Stevens, Marc. “Cryptanalysis of MD5 & SHA1.” Special Purpose Hardware for Attacking Cryptographic Systems (workshop), March 17, 2012. http://2012.sharcs.org/slides/stevens.pdf. Checksum and Hash Function performance “Crypto++ 5.6.0 Benchmarks.” Accessed August 2, 2015. http://www.cryptopp.com/benchmarksamd64.html. Duryee, Alex. “What Is the Real Impact of SHA256? A Comparison of Checksum Algorithms.” AVPreserve.com, October 2014. http://www.avpreserve.com/wpcontent/uploads/2014/10/ChecksumComparisons_102014.pdf.
2.
2 “Hash Benchmark.” Accessed August 2, 2015. http://www.febooti.com/products/filetweak/members/hashandcrc/hashbenchmark/. “Hash When Is CRC More Appropriate to Use than MD5/SHA1? Stack Overflow.” Accessed August 2, 2015. http://stackoverflow.com/questions/996843/wheniscrcmoreappropriatetousethanmd5sha1. (See comment from Martin with speed test results.) “Speed Comparison of Popular Crypto Algorithms.” Accessed August 2, 2015. http://www.cryptopp.com/benchmarks.html. “Speed Hashing.” Accessed August 2, 2015. http://blog.codinghorror.com/speedhashing/. Data Loss Steinhart, Gail. “A picture is worth 1000 words... back it up!” August 20, 2012. Accessed August 6, 2015. https://twitter.com/gailst/status/237525591547580416 Vines, T. H., Albert, A. Y. K., Andrew, R. L., Débarre, F., Bock, D. G., Franklin, M. T., … Rennison, D. J. (2013). The Availability of Research Data Declines Rapidly with Article Age. Current Biology, 24(1), 94–97. doi:10.1016/j.cub.2013.11.014 How Many Copies Keep Stuff Safe Greenan, Kevin M., James S. Plank, and Jay J. Wylie. “Mean Time to Meaningless: MTTDL, Markov Models, and Storage System Reliability.” In Proceedings of the 2nd USENIX Conference on Hot Topics in Storage and File Systems. Boston, Mass.: USENIX Association, 2010. https://www.usenix.org/legacy/events/hotstorage10/tech/full_papers/Greenan.pdf. Rosenthal, David S. H. “Bit Preservation: A Solved Problem?” International Journal of Digital Curation 5, no. 1 (June 22, 2010): 134–48. doi:10.2218/ijdc.v5i1.148. http://www.ijdc.net/index.php/ijdc/article/view/151. ———. “DSHR’s Blog: ‘Petabyte for a Century’ Goes MainStream.” DSHR’s Blog, October 6, 2010. http://blog.dshr.org/2010/09/petabyteforcenturygoesmainstream.html. ———. “DSHR’s Blog: The HalfEmpty Archive.” DSHR’s Blog, March 31, 2014. http://blog.dshr.org/2014/03/thehalfemptyarchive.html. ———. “Keeping Bits Safe ACM Queue.” ACM Queue 8, no. 10 (October 2010) (October 1, 2010). http://queue.acm.org/detail.cfm?id=1866298. Digital Preservation Networks “Academic Preservation Trust.” Accessed August 2, 2015. http://academicpreservationtrust.org/. “DuraCloud Introduction | DuraCloud.” 2015. Accessed August 6. http://www.duracloud.org/. German, Chip, Andrew Diamond, Nathan Tallman, Linda Newman, and Jamie Little. “The Academic Preservation Trust: Report on First Months of Production.” In CNI: Coalition for Networked Information. Seattle, Washington, 2015. http://www.cni.org/topics/digitalpreservation/theacademicpreservationtrustreportonfirstmon thsofproduction/. “Global & Private LOCKSS Networks | LOCKSS.” Accessed August 2, 2015. http://www.lockss.org/community/networks/. MetaArchive. “Methodology | MetaArchive.” Accessed August 2, 2015. http://www.metaarchive.org/methodology. Bibliography The Quest for Digital Preservation Steve DiDomenico and Linda Newman MathFest, Washington D.C. September 8, 2015
3.
3 “Portico A Digital Preservation and Electronic Archiving Service.” 2015. Accessed August 6. http://www.portico.org/digitalpreservation/. Reich, Victoria, and D. Rosenthal. “Distributed Digital Preservation: Lots of Copies Keep Stuff Safe.” In Proceedings IndoUS Workshop on International Trends in Digital Preservation March, 24–25, 2009. http://humgroup.lockss.org/locksswiki/files/ReichIndiaFinal.pdf. “The Digital Preservation Network.” The Digital Preservation Network. Accessed August 2, 2015. http://www.dpn.org/. Digital Repository Open Source Software “DSpace | DSpace is a turnkey institutional repository application.” Accessed August 6, 2015. http://www.dspace.org/ . “Fedora Repository | Fedora is a generalpurpose, opensource digital object repository system.” Accessed August 6, 2015. http://fedoracommons.org/ . “Hydra Project.” Accessed August 6, 2015. http://projecthydra.org/ . “Islandora Website.” Accessed August 6, 2015. http://islandora.ca/ . Format Obsolescence Arms, Caroline R., Carl Fleischhauer, and Kate Murray. “Sustainability of Digital Formats: Planning for Library of Congress Collections.” Webpage, 2013. http://www.digitalpreservation.gov/formats/. Holden, Matt. “Preserving the Web Archive for Future Generations : Practical Experiments with Emulation and Migration Technologies.” In Conference Proceedings, 783–95. Vancouver, Canada: United Nations Educational, Scientific and Cultural Organization, 2012. http://ciscra.org/docs/UNESCO_MOW2012_Proceedings_FINAL_ENG_Compressed.pdf. Jackson, Andrew N. “Formats over Time: Exploring UK Web History.” In arXiv:1210.1714 [cs]. Toronto, Canada, 2012. http://arxiv.org/abs/1210.1714. “Recommended Format Specifications Resources (Preservation, Library of Congress).” Web page, 2015. http://www.loc.gov/preservation/resources/rfs/TOC.html. Rosenthal, David S. H. “DSHR’s Blog: Formats through Time.” DSHR’s Blog, October 9, 2012. http://blog.dshr.org/2012/10/formatsthroughtime.html. Format Analysis Tools Apache Software Foundation. “Apache Tika Apache Tika.” Accessed August 2, 2015. https://tika.apache.org/. “Archivematica: OpenSource Digital Preservation System.” 2015. Accessed August 6. https://www.archivematica.org/en/. “JHOVE2: The NextGeneration Architecture for FormatAware Characterization.” Accessed August 2, 2015. https://bitbucket.org/jhove2/main/wiki/Home. The National Archives. “Download DROID: File Format Identification Tool.” The National Archives. Accessed August 2, 2015. http://www.nationalarchives.gov.uk/informationmanagement/manageinformation/preservingdig italrecords/droid/. Bibliography The Quest for Digital Preservation Steve DiDomenico and Linda Newman MathFest, Washington D.C. September 8, 2015
4.
4 Trusted Digital Repositories and Certification Center for Research Libraries. “ISO 16363 / TDR | CRL.” Accessed August 2, 2015. https://www.crl.edu/archivingpreservation/digitalarchives/metricsassessingandcertifying/iso16 363. Consultative Committee for Space Data Systems. “AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES.” Consultative Committee for Space Data Systems, 2011. http://www.ccsds.org/publications/archive/652x0m1.pdf. Dale, Robin L., and Bruce Ambacher. “Trustworthy Repositories Audit and Certification: Criteria and Checklist. Report of the RLGNARA Task Force on Digital Repository Certification, February 2007.” Online Computer Library Center and the Center for Research Libraries, February 2007. https://www.crl.edu/sites/default/files/d6/attachments/pages/trac_0.pdf. International Organization for Standardization, (first). “ISO 16363:2012(en) Audit and Certification of Trustworthy Digital Repositories,” September 2011. https://www.iso.org/obp/ui/#iso:std:iso:16363:ed1:v1:en. Bibliography The Quest for Digital Preservation Steve DiDomenico and Linda Newman MathFest, Washington D.C. September 8, 2015
Baixar agora