Feeds

HP and MIT form worldwide digital archiving group

Antarctica aside

Combat fraud and increase customer satisfaction

HP and MIT have formed an independent organization to support the work of digital archivists who use the DSpace open source archiving software.

Called the DSpace Foundation, the new group will provide a forum and a focus for users of the software - who include over 100 universities, museums and companies - said Nick Wainwright, the DSearch project research manager at HP Labs in Bristol.

The software goes way beyond issues of what formats to archive digital documents in, he added. It can capture, store, manage and archive digitized representations of all kinds of analogue artifacts, whether it's film or video, a scan of a photo or a 3D object or a research data-set.

"The problem of archiving has moved on from digital documents to other artifacts - the document problem has been well addressed with the development of longer-lived and transparent formats," he said. Instead, the big issue now is meta-data - the ability to look into the archived item, index it, search it, see what format it's in, and so on.

Wainwright said that the decision to establish the DSpace Foundation was down to the software's growing usage, and also the increasing number of people contributing code to it.

"When we created DSpace with the MIT Libraries in 2002, we started it as open source because we wanted to build a community, and also because in archiving, the transparency of open source is very important. Over the years, that community has grown - over 100 people have contributed code, and we're on every continent except Antarctica."

He said the foundation - to be run by Michele Kimpton, formerly of the Internet Archive - would now take on the role of supporting and organizing DSpace users, while developers such as his team at HP Labs work towards version 2 of the software.

"DSpace provides sophisticated indexing for content based not only on the formal meta-data - the tags that archivists add - but also on searching the content," he said.

"We are looking at extending the modularity in v2. For example, if you archive 3D scans, how do you search those? My task is to ensure you can plug in those extra technologies in the future."®

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.