SlideShare una empresa de Scribd logo
1 de 19
Preserving Software at Scale: The
Stephen Cabrinety Collection
Michael Olson, Stanford University Libraries
Douglas White, National Institute of Standards and Technology
Disclaimer
Trade names and company products are
mentioned in the text or identified. In no case
does such identification imply recommendation
or endorsement by the National Institute of
Standards and Technology, nor does it imply that
the products are necessarily the best available
for the purpose.
The Collection and NIST Grant









Collection consists of ~ 15,000 software titles from 1975 –
1995
Grant (Sept. 2013 – Aug. 2014) funded by National Institute
of Standards and Technology
Contains all media types from this period
Disk images to be added to National Software Reference
Library (NSRL) Reference Data Set
Disk images and photographs will be ingested into the
Stanford Digital Repository
Initial Stanford Tasks







Page software to campus
Register software titles in Digital Object Registry (DRUID,
Title, Source ID)
Enter descriptive metadata in NSRL database
Print tracking sheet
Ship to NIST
NIST NSRL Collection
Contains 14,500 pieces of computer software.
Focuses on Windows, Mac, Linux operating systems and
popular applications.
Modern formats : DVD & CD ROMs, 5¼ in. & 3 ½ in. disks.
Efforts 2005 to date:
19,500 media images
395 media errors (2%)
3,500 photograph sets
25,200 photos
SUL Cabrinety Collection
Focuses on games for Atari, Commodore, Amiga, Sega,
Nintendo, and Apple systems.
27 different operating systems represented.
Several formats : 8 in., 5¼ in., and 3 ½ in. computer disks,
cassettes, cartridges, CD-ROMs.
NIST Efforts to date:
900 media images
158 media errors (17%)
1,100 photograph sets
61,100 photos
NSRL Workstation

x
Workstation Equipment
Apple Mini, running Ubuntu 12.04 LTS
5000K lighting station
Canon T3i, tethered
Golden Thread Object Level Target
USB 3.5-inch floppy drive
Device Side Data FC5025 USB 5.25-inch floppy controller
ATA 5.25-inch floppy drive
USB barcode scanner
Firefox browser
Java photo organizer (custom, wraps gphoto2 etc.)
Perl media imager (custom, wraps dfcldd etc.)
Cartridge Media
Using Retrode adapter for SEGA Genesis and Super Nintendo
(SNES) games, plus plug-ins for Gameboy, Atari, Nintendo 64.
Could not generate a complete, consistent media image.
Every cartridge has metadata in a ROM “header” area; many
include a checksum, for anti-piracy use.
NSRL can calculate the SNES and SEGA Genesis checksums.
Game Boy and Nintendo are works in progress.
Detailed blog article recently published on Stanford website.
Results to date




Just received first batch of data from NIST
– 360 GB = 870 software titles, 116,000 unique files
Capture success rate:
– 83% with no modification or intervention
– Can increase by 5% with human intervention during imaging
– Can increase by 4% with intervention during image mount
– 8% of media have many (> 10%) sector read errors
Lessons and Improvements


Automation; less human interaction



Photography; use RAW and convert








Hardware for legacy media:
Apple physical formats
Large format floppy disks (8”)
Cassettes
Cartridge batteries
Lessons and Improvements






Data modeling beginning this month for repository
Copyright letter created to send to rights holders
Create persistent URL citation page (PURL) for software
Integration into Stanford Catalog called SearchWorks –
when rights allow




Just received first batch of data from NIST
360 GB = 870 software titles, 116,000 unique files
Copyright permissions letter created
Questions?
Michael Olson,
email: mgolson@stanford.edu
Douglas White
email: douglas.white@nist.gov

Más contenido relacionado

Destacado

Macsinka gábor
Macsinka gáborMacsinka gábor
Macsinka gábormacsyde
 
'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talkRupertColley
 
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial NetworksSuperframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial NetworksOka Danil
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality12ort
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityBitglass
 
Target Your Obliques with The Half Kneeling Windmill
Target Your Obliques with The Half Kneeling WindmillTarget Your Obliques with The Half Kneeling Windmill
Target Your Obliques with The Half Kneeling WindmillJuan Lugo
 

Destacado (11)

Macsinka gábor
Macsinka gáborMacsinka gábor
Macsinka gábor
 
Conventions analysis
Conventions analysisConventions analysis
Conventions analysis
 
'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk
 
Values
ValuesValues
Values
 
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial NetworksSuperframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
Target Your Obliques with The Half Kneeling Windmill
Target Your Obliques with The Half Kneeling WindmillTarget Your Obliques with The Half Kneeling Windmill
Target Your Obliques with The Half Kneeling Windmill
 
Html
HtmlHtml
Html
 
Bus stop
Bus stopBus stop
Bus stop
 

Similar a Preserving Software at Scale: The Stephen Cabrinety Collection

Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.guestcf6f5b
 
Digital Forensic tools - Application Specific
Digital Forensic tools - Application SpecificDigital Forensic tools - Application Specific
Digital Forensic tools - Application Specificideaflashed
 
Digitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and MuseumsDigitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and MuseumsAnna Naruta-Moya
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Sound Recording Glossary Improved Version
Sound Recording Glossary   Improved VersionSound Recording Glossary   Improved Version
Sound Recording Glossary Improved VersionJoshuaRidett
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
No specimen (software) left behind
No specimen (software) left behindNo specimen (software) left behind
No specimen (software) left behindVince Smith
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the ArchiveGarethKnight
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...Blancco
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Michaelwilliamsig2task1worksheet
Michaelwilliamsig2task1worksheetMichaelwilliamsig2task1worksheet
Michaelwilliamsig2task1worksheetHooaax
 
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...Intel® Software
 
Methods and Principles of Sound Design and Production
Methods and Principles of Sound Design and ProductionMethods and Principles of Sound Design and Production
Methods and Principles of Sound Design and ProductionHooaax
 
Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2Jeff Sipko
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheetthomasmcd6
 
Shaun Warburton IG2 task 1
Shaun Warburton IG2 task 1 Shaun Warburton IG2 task 1
Shaun Warburton IG2 task 1 warburton9191
 

Similar a Preserving Software at Scale: The Stephen Cabrinety Collection (20)

Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.
 
Digital Forensic tools - Application Specific
Digital Forensic tools - Application SpecificDigital Forensic tools - Application Specific
Digital Forensic tools - Application Specific
 
Digitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and MuseumsDigitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and Museums
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Sound Recording Glossary Improved Version
Sound Recording Glossary   Improved VersionSound Recording Glossary   Improved Version
Sound Recording Glossary Improved Version
 
Deep Learning using OpenPOWER
Deep Learning using OpenPOWERDeep Learning using OpenPOWER
Deep Learning using OpenPOWER
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
No specimen (software) left behind
No specimen (software) left behindNo specimen (software) left behind
No specimen (software) left behind
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Michaelwilliamsig2task1worksheet
Michaelwilliamsig2task1worksheetMichaelwilliamsig2task1worksheet
Michaelwilliamsig2task1worksheet
 
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...
 
resume
resumeresume
resume
 
Methods and Principles of Sound Design and Production
Methods and Principles of Sound Design and ProductionMethods and Principles of Sound Design and Production
Methods and Principles of Sound Design and Production
 
Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2
 
MIS Lesson2 Hardware
MIS Lesson2 HardwareMIS Lesson2 Hardware
MIS Lesson2 Hardware
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheet
 
Shaun Warburton IG2 task 1
Shaun Warburton IG2 task 1 Shaun Warburton IG2 task 1
Shaun Warburton IG2 task 1
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Preserving Software at Scale: The Stephen Cabrinety Collection

  • 1. Preserving Software at Scale: The Stephen Cabrinety Collection Michael Olson, Stanford University Libraries Douglas White, National Institute of Standards and Technology
  • 2. Disclaimer Trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the products are necessarily the best available for the purpose.
  • 3. The Collection and NIST Grant      Collection consists of ~ 15,000 software titles from 1975 – 1995 Grant (Sept. 2013 – Aug. 2014) funded by National Institute of Standards and Technology Contains all media types from this period Disk images to be added to National Software Reference Library (NSRL) Reference Data Set Disk images and photographs will be ingested into the Stanford Digital Repository
  • 4. Initial Stanford Tasks      Page software to campus Register software titles in Digital Object Registry (DRUID, Title, Source ID) Enter descriptive metadata in NSRL database Print tracking sheet Ship to NIST
  • 5.
  • 6.
  • 7. NIST NSRL Collection Contains 14,500 pieces of computer software. Focuses on Windows, Mac, Linux operating systems and popular applications. Modern formats : DVD & CD ROMs, 5¼ in. & 3 ½ in. disks. Efforts 2005 to date: 19,500 media images 395 media errors (2%) 3,500 photograph sets 25,200 photos
  • 8.
  • 9. SUL Cabrinety Collection Focuses on games for Atari, Commodore, Amiga, Sega, Nintendo, and Apple systems. 27 different operating systems represented. Several formats : 8 in., 5¼ in., and 3 ½ in. computer disks, cassettes, cartridges, CD-ROMs. NIST Efforts to date: 900 media images 158 media errors (17%) 1,100 photograph sets 61,100 photos
  • 11. Workstation Equipment Apple Mini, running Ubuntu 12.04 LTS 5000K lighting station Canon T3i, tethered Golden Thread Object Level Target USB 3.5-inch floppy drive Device Side Data FC5025 USB 5.25-inch floppy controller ATA 5.25-inch floppy drive USB barcode scanner Firefox browser Java photo organizer (custom, wraps gphoto2 etc.) Perl media imager (custom, wraps dfcldd etc.)
  • 12.
  • 13. Cartridge Media Using Retrode adapter for SEGA Genesis and Super Nintendo (SNES) games, plus plug-ins for Gameboy, Atari, Nintendo 64. Could not generate a complete, consistent media image. Every cartridge has metadata in a ROM “header” area; many include a checksum, for anti-piracy use. NSRL can calculate the SNES and SEGA Genesis checksums. Game Boy and Nintendo are works in progress. Detailed blog article recently published on Stanford website.
  • 14. Results to date   Just received first batch of data from NIST – 360 GB = 870 software titles, 116,000 unique files Capture success rate: – 83% with no modification or intervention – Can increase by 5% with human intervention during imaging – Can increase by 4% with intervention during image mount – 8% of media have many (> 10%) sector read errors
  • 15. Lessons and Improvements  Automation; less human interaction  Photography; use RAW and convert      Hardware for legacy media: Apple physical formats Large format floppy disks (8”) Cassettes Cartridge batteries
  • 16. Lessons and Improvements     Data modeling beginning this month for repository Copyright letter created to send to rights holders Create persistent URL citation page (PURL) for software Integration into Stanford Catalog called SearchWorks – when rights allow
  • 17.    Just received first batch of data from NIST 360 GB = 870 software titles, 116,000 unique files Copyright permissions letter created
  • 18.