<--- Back to Details
First PageDocument Content
Cryptography / Computing / Information science / Cryptographic hash functions / Digital preservation / Records management / Error detection and correction / Digital technology / File Fixity / Checksum / BagIt / Preservation Metadata: Implementation Strategies
Date: 2016-01-20 13:45:27
Cryptography
Computing
Information science
Cryptographic hash functions
Digital preservation
Records management
Error detection and correction
Digital technology
File Fixity
Checksum
BagIt
Preservation Metadata: Implementation Strategies

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: www.digitalpreservation.gov

Download Document from Source Website

File Size: 149,64 KB

Share Document on Facebook

Similar Documents

Digital preservation / Archival science / Records management / Digital libraries / Conservation and restoration / National Digital Information Infrastructure and Preservation Program / Preservation metadata / Preservation / Digitizing / File Fixity / BagIt / Digital asset

The NDSA Levels of Digital Preservation: An Explanation and Uses Megan Phillips, National Archives and Records Administration, Washington DC; Jefferson Bailey, Metropolitan New York Library Council (METRO), New York, NY;

DocID: 1pkLL - View Document

Cryptography / Computing / Information science / Cryptographic hash functions / Digital preservation / Records management / Error detection and correction / Digital technology / File Fixity / Checksum / BagIt / Preservation Metadata: Implementation Strategies

Staffing For Effective Digital Preservation

DocID: 1mgRU - View Document

Software / Computer file formats / File system / NTFS / Inode / Filesystem in Userspace / Filename / System software / Computing / Disk file systems

Fixity and Filesystems: Enhanced System Monitoring via inodes

DocID: Bruh - View Document

Digital libraries / Library science / Preservation / Museology / Hashing / Digital preservation / Checksum / BagIt / SHA-2 / Error detection and correction / Archival science / Cryptographic hash functions

Draft Fact Sheet NDSA Infrastructure &Standards Working Groups Checking Your Digital Content: How, What and When to Check Fixity? How do I know what I have and the file/object is not corrupted, changed or altered?

DocID: tjHN - View Document

Cryptography / Hashing / Checksum / Cksum / MD5 / Hash function / File verification / SHA-2 / Sum / Computing / Cryptographic hash functions / Software

Checksum Programs Evaluation Summary Being able to verify that a file has not changed overtime at the bit level can be done by creating and monitoring the fixity of a file. Fixity can be generated on the server side, and

DocID: jJ1Z - View Document