SlideShare a Scribd company logo
Risk management and
auditing
Dorothea Salo
Threat model
•“Preservation” means nothing unmodified.
• This is why it becomes such a bogeyman!
•Two things you need to know first:
• why you’re preserving what you’re preserving, and
• what you’re preserving it against.
•Libraries: your collection-development policy
should inform the first question.
• Your coll-dev policy doesn’t include local born-digital or
digitized materials? This is a problem. Fix it.
•The second question is your “threat model.”
What is your threat
model for print?
Homelessness
Water
Flora and fauna
Physical damage
Loss or destruction
Why did I just make you
do that?
•I’m weird.
•I’m trying to destroy the myth that any given
medium “preserves itself.”
•Media do not preserve themselves. People
preserve media—or media get bizarrely lucky.
•We need not panic over digital preservation
any more than we panic about print.
•Approach digital preservation the same way
you approach print preservation.
Now...
List important threats
to digital data.
Physical medium failure
“Bitrot”
File format obsolescence
Forgetting what you have
Forgetting what the
stuff you have means
Rights and DRM
Lack (or disappearance)
of organizational commitment
One word: Geocities.
?
Ignorance
•“It’s in Google, so it’s preserved.” (Not even
“Google Books!”)
•“I make backups, so I’m fine.”
•“I have a graduate student who takes care of
these things.”
•“Metadata? What’s that? I have to have it?”
•“Digital preservation is an unsolvable problem,
so why even try?” (I’ve heard this one from
librarians. I bet you have too.)
Apathy
Mitigating the risks:
planning and auditing
tools
Audit frameworks
• Trusted Repository Audit Checklist
• (If you see “NARA/RLG” somewhere? This is the framework that
evolved into TRAC. Long story.)
• You can get an actual formal TRAC audit from CRL! Who has? Portico,
Hathi, “Chronicle of Life,” two-three others. This audit is HARSH. (So
don’t write off a repo because it hasn’t had a TRAC audit.)
• If you hear the phrase “trusted digital repository,” it should mean
that the repo has had (or is pursuing) a TRAC audit.
• DRAMBORA
• More flexible, less finger-shaking than TRAC.
• Less of this “designated community” nonsense.
• Less dependent on OAIS model (which I consider a strength).
• Encourages archives to consider and document their individual
situations and think hard about risk mitigation.
Newer: SPOT model
•Even less clunky than DRAMBORA.
•I quite like this one.
•Identifying Threats to Successful Digital
Preservation: the SPOT Model for Risk
Assessment
• http://www.dlib.org/dlib/september12/vermaaten/
09vermaaten.html
So what do they audit?
•Mission (and adherence to it)
•Plans and policies
• including contingency plans
•Staff infrastructure
•Operations documentation
• including tech infrastructure, service infrastructure
•Sustainable funding
•“Doing the right things with the stuff.”
• identifiers, ingest file format management, migration, etc.
•NOTICE WHAT’S FIRST ON THE LIST.
• remember, the tech part is the easy part!
TRAC, DRAMBORA, and DH
•TRAC, DRAMBORA, and SPOT are designed to
audit repositories, not individual datasets, data
files, or research projects.
• They assume a lot of infrastructure and (in TRAC’s case) a
long-term time horizon that you probably aren’t.
•So if you’re trying to think through a project,
where do you go?
• TRAC and DRAMBORA are probably overkill!
• (Though parts of DRAMBORA won’t hurt you.)
Data Curation Profiles
•Research project out of Purdue’s Digital Data
Curation Center (“D2C2”)
•“Toolkit:” interview instrument, user guide for
interview instrument, worksheet.
•Small library of completed profiles
•Ignore the user guide. Grab the worksheet, and
use the interview instrument for reference.
•http://datacurationprofiles.org
• You have to make a login to download the toolkit pieces.
Mitigating specific
risks
Physical medium failure
•Gold CDs are not the panacea we thought.
• They’re not bad; they’re just hard to audit, so they fail
(when they fail) silently. Silent failure is DEADLY.
•Current state of the art: get it on spinning disk.
•Back up often. Distribute your backups
geographically. Test them now and then.
• Consider a LOCKSS cooperative agreement. Others have.
•Bitrot-detection techniques may help here too.
•Any physical medium WILL FAIL. Have a plan
for when it does.
“Digital forensics”
•The art and science of investigating digital file
formats and media.
• Reading obsolete ones.
• Reverse-engineering and/or documenting existing ones so
they don’t go obsolete.
• Ensuring secure deletion, when necessary.
• Reconstructing what used to be on a physical storage
medium. (Surprising how often this is possible!)
• Audit trails for legal and records-management purposes.
• AMAZING report (highly highly recommended!): “Digital
Forensics and Born-Digital Content in Cultural Heritage
Institutions.” http://www.clir.org/pubs/abstract/
pub149abst.html. Both computer-nerdy and humanities-
nerdy in the best possible way.
Avoiding “bitrot”
•Sometimes used for “file format obsolescence.”
•I use it for “the bits flipped unexpectedly.”
•Checking a file bit-by-bit against a backup copy
is computationally impractical for every day.
• Though on ingest it’s a good idea to verify bit-by-bit!
•Checksums
• A file is, fundamentally, a great big number.
• Do math on the number file. Store the result as metadata.
• To check for bitrot, redo the math and check the answer
against the stored result. If they’re different, scream.
• Several checksum algorithms; for our purposes, which one
you use doesn’t matter much.
• “Hash collision:” it’s possible, but unlikely, for different files
to have the same checksum. Potential hack vector!
Migration vs. emulation:
dealing with obsolescence
•Migration
• change the file to be usable in new software/hardware
configurations
• risks: information loss (FONTS!), imperfect transfer,
choosing the wrong migration path
• smart systems don’t throw away the old files!
•Emulation
• keep the file, train new software/hardware to behave like
the old
• risks: imperfect emulation, impractical emulation
• makes more sense for software (games!), less for files
•Pragmatically: redigitization.
Finding tools
•Migration
• Current versions of the original software may be able to
open old files.
• Open-source software in the same genre may be able to
translate proprietary file formats (often imperfectly). Tend
to maintain translators longer than you’d think.
• Look on the web!
• MIGRATE FAST. Once it’s damaged or obsolete, it’s
probably too late.
•Emulation
• look for the gamers! it’s WILD what they’ll emulate!
• Look to the open-source community for operating-
system, hardware-driver emulators.
• Frankly, there’s a lot of hype and vaporware here.
When is a PDF not a PDF?
•When it’s a .doc with the wrong file extension
•When there’s no file extension on it at all
•When it’s so old it doesn’t follow the
standardized PDF conventions
•When it’s otherwise malformed, made by a
bad piece of software.
•How do you know whether you have a good
PDF? (Or .doc, or .jpg, or .xml, or anything else.)
File format registries and
testing tools
•JHOVE: JSTOR/Harvard Object Validation
Environment
• Java software intended to be pluggable into other
software environments
• Answers “What format is this thing?” and “Is this thing a
good example of the format?”
• Limited repertoire of formats
•PRONOM/DROID + GDFR = Unified Digital
Formats Registry
•Wrapper tool: FITS, File Information Tool Set
• JHOVE + DROID + various other testers. State of the art.
Thanks!
•Copyright 2011 by Dorothea Salo.
•This lecture and slide deck are licensed under a
Creative Commons Attribution 3.0 United
States License.

More Related Content

PDF
Preservation and institutional repositories for the digital arts and humanities
Dorothea Salo
 
PDF
Escaping Datageddon
Dorothea Salo
 
PDF
MARC and BIBFRAME; Linking libraries and archives
Dorothea Salo
 
PDF
What We Organize
Dorothea Salo
 
PDF
Data Storage & Preservation
UW Research Data Services
 
PPTX
Data Management 101 (2015)
Kristin Briney
 
PPTX
NCURA Webinar on Open Data
Kristin Briney
 
PPTX
Practical Data Management - ACRL DCIG Webinar
Kristin Briney
 
Preservation and institutional repositories for the digital arts and humanities
Dorothea Salo
 
Escaping Datageddon
Dorothea Salo
 
MARC and BIBFRAME; Linking libraries and archives
Dorothea Salo
 
What We Organize
Dorothea Salo
 
Data Storage & Preservation
UW Research Data Services
 
Data Management 101 (2015)
Kristin Briney
 
NCURA Webinar on Open Data
Kristin Briney
 
Practical Data Management - ACRL DCIG Webinar
Kristin Briney
 

What's hot (20)

PDF
Guy avoiding-dat apocalypse
ENUG
 
PPTX
Organizing Your Research Data
Kristin Briney
 
PPT
Exploring the Semantic Web
Roberto García
 
PDF
Practical Best Practices for Data Management
UW Research Data Services
 
PDF
Sarah Callaghan Research Data Overview
OpenAIRE
 
PDF
Data Management
Jackie Wirz, PhD
 
PDF
NGP Retreat Open Science 2015
Jackie Wirz, PhD
 
PPTX
Laurie Goodman at NDIC: Big Data Publishing, Handling & Reuse
GigaScience, BGI Hong Kong
 
PDF
Data Science Folk Knowledge
Krishna Sankar
 
PPTX
2014 aus-agta
c.titus.brown
 
PDF
DMTM 2015 - 02 Data Mining
Pier Luca Lanzi
 
PDF
Towards An Improvement Community Platform for Service Innovation
Jack Park
 
PPTX
Service and Support for Science IT -Peter Kunzst, University of Zurich
Mind the Byte
 
PPTX
Publishing and Using Linked Open Data - Day 1
Richard Urban
 
PPTX
Carl idigpres
Lynne Thomas
 
PPTX
CARLIdigpres
Lynne Thomas
 
PPTX
Information Extraction from Text, presented @ Deloitte
Deep Kayal
 
PPTX
"Curation-Ready" Workflows for Digitized Photograph Collections: A Temporary ...
Visual Resources Association
 
PPT
Informatics Transform : Re-engineering Libraries for the Data Decade
Liz Lyon
 
PDF
DMTM 2015 - 01 Course Introduction
Pier Luca Lanzi
 
Guy avoiding-dat apocalypse
ENUG
 
Organizing Your Research Data
Kristin Briney
 
Exploring the Semantic Web
Roberto García
 
Practical Best Practices for Data Management
UW Research Data Services
 
Sarah Callaghan Research Data Overview
OpenAIRE
 
Data Management
Jackie Wirz, PhD
 
NGP Retreat Open Science 2015
Jackie Wirz, PhD
 
Laurie Goodman at NDIC: Big Data Publishing, Handling & Reuse
GigaScience, BGI Hong Kong
 
Data Science Folk Knowledge
Krishna Sankar
 
2014 aus-agta
c.titus.brown
 
DMTM 2015 - 02 Data Mining
Pier Luca Lanzi
 
Towards An Improvement Community Platform for Service Innovation
Jack Park
 
Service and Support for Science IT -Peter Kunzst, University of Zurich
Mind the Byte
 
Publishing and Using Linked Open Data - Day 1
Richard Urban
 
Carl idigpres
Lynne Thomas
 
CARLIdigpres
Lynne Thomas
 
Information Extraction from Text, presented @ Deloitte
Deep Kayal
 
"Curation-Ready" Workflows for Digitized Photograph Collections: A Temporary ...
Visual Resources Association
 
Informatics Transform : Re-engineering Libraries for the Data Decade
Liz Lyon
 
DMTM 2015 - 01 Course Introduction
Pier Luca Lanzi
 
Ad

Similar to Risk management and auditing (20)

PDF
Preserve or preserve not
National Library of Australia
 
PDF
Archiving Best Practices -- Creative Operations Essentials
globaledit®
 
PDF
Lipstick on a Pig: Integrated Library Systems
Dorothea Salo
 
PDF
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
 
PDF
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith Jones, PhD
 
PPT
The economies of scaling software - Abdel Remani
jaxconf
 
PPT
Just digitise it - Daniel Wilksch of the Public Records Office Victoria
National Library of Australia
 
PDF
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Alex Pinto
 
PPTX
Just Digitise It! - Daniel Wilksch
National Library of Australia
 
PPTX
POWRR Tools: Lessons learned from an IMLS National Leadership Grant
Lynne Thomas
 
PDF
Digital preservation and institutional repositories
Dorothea Salo
 
PDF
2010 AIRI Petabyte Challenge - View From The Trenches
George Ang
 
PPT
The Economies of Scaling Software
Abdelmonaim Remani
 
PPTX
Fun with Application Security
Bruce Abernethy
 
PPT
“Mobile Choices” and Library Anywhere (CILIP)
Tim Spalding
 
PDF
"Startups, comment gérer une équipe de développeurs" par Laurent Cerveau
TheFamily
 
PDF
Setting a Course for Success: Getting Started with Digital Preservation in Yo...
WiLS
 
PPTX
Defending Enterprise IT - beating assymetricality
Claus Cramon Houmann
 
PPTX
Presentation infra and_datacentrre_dialogue_v2
Claus Cramon Houmann
 
PDF
Binary crosswords
Laurent Cerveau
 
Preserve or preserve not
National Library of Australia
 
Archiving Best Practices -- Creative Operations Essentials
globaledit®
 
Lipstick on a Pig: Integrated Library Systems
Dorothea Salo
 
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
 
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith Jones, PhD
 
The economies of scaling software - Abdel Remani
jaxconf
 
Just digitise it - Daniel Wilksch of the Public Records Office Victoria
National Library of Australia
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Alex Pinto
 
Just Digitise It! - Daniel Wilksch
National Library of Australia
 
POWRR Tools: Lessons learned from an IMLS National Leadership Grant
Lynne Thomas
 
Digital preservation and institutional repositories
Dorothea Salo
 
2010 AIRI Petabyte Challenge - View From The Trenches
George Ang
 
The Economies of Scaling Software
Abdelmonaim Remani
 
Fun with Application Security
Bruce Abernethy
 
“Mobile Choices” and Library Anywhere (CILIP)
Tim Spalding
 
"Startups, comment gérer une équipe de développeurs" par Laurent Cerveau
TheFamily
 
Setting a Course for Success: Getting Started with Digital Preservation in Yo...
WiLS
 
Defending Enterprise IT - beating assymetricality
Claus Cramon Houmann
 
Presentation infra and_datacentrre_dialogue_v2
Claus Cramon Houmann
 
Binary crosswords
Laurent Cerveau
 
Ad

More from Dorothea Salo (20)

PDF
Soylent Semantic Web Is People! (with notes)
Dorothea Salo
 
PDF
Soylent SemanticWeb Is People!
Dorothea Salo
 
PDF
Encryption
Dorothea Salo
 
PDF
Privacy and libraries
Dorothea Salo
 
PDF
Paying for it
Dorothea Salo
 
PDF
The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)
Dorothea Salo
 
PDF
Is this BIG DATA which I see before me?
Dorothea Salo
 
PDF
Library Linked Data
Dorothea Salo
 
PDF
FRBR and RDA
Dorothea Salo
 
PDF
Research Data and Scholarly Communication
Dorothea Salo
 
PDF
Research Data and Scholarly Communication (with notes)
Dorothea Salo
 
PDF
Manufacturing Serendipity
Dorothea Salo
 
PDF
Occupy Copyright!
Dorothea Salo
 
PDF
RDF, RDA, and other TLAs
Dorothea Salo
 
PDF
I own copyright, so I pwn you!
Dorothea Salo
 
PDF
Librarians love data!
Dorothea Salo
 
PDF
Taming the Monster: Digital Preservation Planning and Implementation Tools
Dorothea Salo
 
PDF
Avoiding the Heron's Way
Dorothea Salo
 
PDF
Manufacturing Serendipity
Dorothea Salo
 
PDF
Open Content
Dorothea Salo
 
Soylent Semantic Web Is People! (with notes)
Dorothea Salo
 
Soylent SemanticWeb Is People!
Dorothea Salo
 
Encryption
Dorothea Salo
 
Privacy and libraries
Dorothea Salo
 
Paying for it
Dorothea Salo
 
The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)
Dorothea Salo
 
Is this BIG DATA which I see before me?
Dorothea Salo
 
Library Linked Data
Dorothea Salo
 
FRBR and RDA
Dorothea Salo
 
Research Data and Scholarly Communication
Dorothea Salo
 
Research Data and Scholarly Communication (with notes)
Dorothea Salo
 
Manufacturing Serendipity
Dorothea Salo
 
Occupy Copyright!
Dorothea Salo
 
RDF, RDA, and other TLAs
Dorothea Salo
 
I own copyright, so I pwn you!
Dorothea Salo
 
Librarians love data!
Dorothea Salo
 
Taming the Monster: Digital Preservation Planning and Implementation Tools
Dorothea Salo
 
Avoiding the Heron's Way
Dorothea Salo
 
Manufacturing Serendipity
Dorothea Salo
 
Open Content
Dorothea Salo
 

Recently uploaded (20)

PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
How to Apply for a Job From Odoo 18 Website
Celine George
 

Risk management and auditing

  • 2. Threat model •“Preservation” means nothing unmodified. • This is why it becomes such a bogeyman! •Two things you need to know first: • why you’re preserving what you’re preserving, and • what you’re preserving it against. •Libraries: your collection-development policy should inform the first question. • Your coll-dev policy doesn’t include local born-digital or digitized materials? This is a problem. Fix it. •The second question is your “threat model.”
  • 3. What is your threat model for print?
  • 9. Why did I just make you do that? •I’m weird. •I’m trying to destroy the myth that any given medium “preserves itself.” •Media do not preserve themselves. People preserve media—or media get bizarrely lucky. •We need not panic over digital preservation any more than we panic about print. •Approach digital preservation the same way you approach print preservation.
  • 15. Forgetting what the stuff you have means
  • 17. Lack (or disappearance) of organizational commitment
  • 19. ? Ignorance •“It’s in Google, so it’s preserved.” (Not even “Google Books!”) •“I make backups, so I’m fine.” •“I have a graduate student who takes care of these things.” •“Metadata? What’s that? I have to have it?” •“Digital preservation is an unsolvable problem, so why even try?” (I’ve heard this one from librarians. I bet you have too.)
  • 21. Mitigating the risks: planning and auditing tools
  • 22. Audit frameworks • Trusted Repository Audit Checklist • (If you see “NARA/RLG” somewhere? This is the framework that evolved into TRAC. Long story.) • You can get an actual formal TRAC audit from CRL! Who has? Portico, Hathi, “Chronicle of Life,” two-three others. This audit is HARSH. (So don’t write off a repo because it hasn’t had a TRAC audit.) • If you hear the phrase “trusted digital repository,” it should mean that the repo has had (or is pursuing) a TRAC audit. • DRAMBORA • More flexible, less finger-shaking than TRAC. • Less of this “designated community” nonsense. • Less dependent on OAIS model (which I consider a strength). • Encourages archives to consider and document their individual situations and think hard about risk mitigation.
  • 23. Newer: SPOT model •Even less clunky than DRAMBORA. •I quite like this one. •Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment • http://www.dlib.org/dlib/september12/vermaaten/ 09vermaaten.html
  • 24. So what do they audit? •Mission (and adherence to it) •Plans and policies • including contingency plans •Staff infrastructure •Operations documentation • including tech infrastructure, service infrastructure •Sustainable funding •“Doing the right things with the stuff.” • identifiers, ingest file format management, migration, etc. •NOTICE WHAT’S FIRST ON THE LIST. • remember, the tech part is the easy part!
  • 25. TRAC, DRAMBORA, and DH •TRAC, DRAMBORA, and SPOT are designed to audit repositories, not individual datasets, data files, or research projects. • They assume a lot of infrastructure and (in TRAC’s case) a long-term time horizon that you probably aren’t. •So if you’re trying to think through a project, where do you go? • TRAC and DRAMBORA are probably overkill! • (Though parts of DRAMBORA won’t hurt you.)
  • 26. Data Curation Profiles •Research project out of Purdue’s Digital Data Curation Center (“D2C2”) •“Toolkit:” interview instrument, user guide for interview instrument, worksheet. •Small library of completed profiles •Ignore the user guide. Grab the worksheet, and use the interview instrument for reference. •http://datacurationprofiles.org • You have to make a login to download the toolkit pieces.
  • 28. Physical medium failure •Gold CDs are not the panacea we thought. • They’re not bad; they’re just hard to audit, so they fail (when they fail) silently. Silent failure is DEADLY. •Current state of the art: get it on spinning disk. •Back up often. Distribute your backups geographically. Test them now and then. • Consider a LOCKSS cooperative agreement. Others have. •Bitrot-detection techniques may help here too. •Any physical medium WILL FAIL. Have a plan for when it does.
  • 29. “Digital forensics” •The art and science of investigating digital file formats and media. • Reading obsolete ones. • Reverse-engineering and/or documenting existing ones so they don’t go obsolete. • Ensuring secure deletion, when necessary. • Reconstructing what used to be on a physical storage medium. (Surprising how often this is possible!) • Audit trails for legal and records-management purposes. • AMAZING report (highly highly recommended!): “Digital Forensics and Born-Digital Content in Cultural Heritage Institutions.” http://www.clir.org/pubs/abstract/ pub149abst.html. Both computer-nerdy and humanities- nerdy in the best possible way.
  • 30. Avoiding “bitrot” •Sometimes used for “file format obsolescence.” •I use it for “the bits flipped unexpectedly.” •Checking a file bit-by-bit against a backup copy is computationally impractical for every day. • Though on ingest it’s a good idea to verify bit-by-bit! •Checksums • A file is, fundamentally, a great big number. • Do math on the number file. Store the result as metadata. • To check for bitrot, redo the math and check the answer against the stored result. If they’re different, scream. • Several checksum algorithms; for our purposes, which one you use doesn’t matter much. • “Hash collision:” it’s possible, but unlikely, for different files to have the same checksum. Potential hack vector!
  • 31. Migration vs. emulation: dealing with obsolescence •Migration • change the file to be usable in new software/hardware configurations • risks: information loss (FONTS!), imperfect transfer, choosing the wrong migration path • smart systems don’t throw away the old files! •Emulation • keep the file, train new software/hardware to behave like the old • risks: imperfect emulation, impractical emulation • makes more sense for software (games!), less for files •Pragmatically: redigitization.
  • 32. Finding tools •Migration • Current versions of the original software may be able to open old files. • Open-source software in the same genre may be able to translate proprietary file formats (often imperfectly). Tend to maintain translators longer than you’d think. • Look on the web! • MIGRATE FAST. Once it’s damaged or obsolete, it’s probably too late. •Emulation • look for the gamers! it’s WILD what they’ll emulate! • Look to the open-source community for operating- system, hardware-driver emulators. • Frankly, there’s a lot of hype and vaporware here.
  • 33. When is a PDF not a PDF? •When it’s a .doc with the wrong file extension •When there’s no file extension on it at all •When it’s so old it doesn’t follow the standardized PDF conventions •When it’s otherwise malformed, made by a bad piece of software. •How do you know whether you have a good PDF? (Or .doc, or .jpg, or .xml, or anything else.)
  • 34. File format registries and testing tools •JHOVE: JSTOR/Harvard Object Validation Environment • Java software intended to be pluggable into other software environments • Answers “What format is this thing?” and “Is this thing a good example of the format?” • Limited repertoire of formats •PRONOM/DROID + GDFR = Unified Digital Formats Registry •Wrapper tool: FITS, File Information Tool Set • JHOVE + DROID + various other testers. State of the art.
  • 35. Thanks! •Copyright 2011 by Dorothea Salo. •This lecture and slide deck are licensed under a Creative Commons Attribution 3.0 United States License.