Feeds

HP and MIT form worldwide digital archiving group

Antarctica aside

Beginner's guide to SSL certificates

HP and MIT have formed an independent organization to support the work of digital archivists who use the DSpace open source archiving software.

Called the DSpace Foundation, the new group will provide a forum and a focus for users of the software - who include over 100 universities, museums and companies - said Nick Wainwright, the DSearch project research manager at HP Labs in Bristol.

The software goes way beyond issues of what formats to archive digital documents in, he added. It can capture, store, manage and archive digitized representations of all kinds of analogue artifacts, whether it's film or video, a scan of a photo or a 3D object or a research data-set.

"The problem of archiving has moved on from digital documents to other artifacts - the document problem has been well addressed with the development of longer-lived and transparent formats," he said. Instead, the big issue now is meta-data - the ability to look into the archived item, index it, search it, see what format it's in, and so on.

Wainwright said that the decision to establish the DSpace Foundation was down to the software's growing usage, and also the increasing number of people contributing code to it.

"When we created DSpace with the MIT Libraries in 2002, we started it as open source because we wanted to build a community, and also because in archiving, the transparency of open source is very important. Over the years, that community has grown - over 100 people have contributed code, and we're on every continent except Antarctica."

He said the foundation - to be run by Michele Kimpton, formerly of the Internet Archive - would now take on the role of supporting and organizing DSpace users, while developers such as his team at HP Labs work towards version 2 of the software.

"DSpace provides sophisticated indexing for content based not only on the formal meta-data - the tags that archivists add - but also on searching the content," he said.

"We are looking at extending the modularity in v2. For example, if you archive 3D scans, how do you search those? My task is to ensure you can plug in those extra technologies in the future."®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
'People have forgotten just how late the first iPhone arrived ...'
Plus: 'Google's IDEALISM is an injudicious justification for inappropriate biz practices'
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.