Äcdocutils.nodes
document
q)Åq}q(U	nametypesq}q(X���preservation objectivesqNX���know your rightsqNX+���know what you have and share that knowledgeqNX���safeguard the federationq	NX6���2. protect the form, meaning, and behavior of the bitsq
NX���1. keep the bits safeqNX���identify data persistentlyqNX ���three dataone preservation tiersq
NX���dataone document libraryqàX���summaryqNX���dataone preservation strategyqNX���refresh and verify the copiesqNX)���watch the copies, yourself, and the worldqNX���3. safeguard the guardiansqNX���safeguard the member nodesqNX���make lots of copiesqNX���cope with obsolescenceqNuUsubstitution_defsq}qUparse_messagesq]qUcurrent_sourceqNU
decorationqNUautofootnote_startqKUnameidsq}q(hUpreservation-objectivesq hUknow-your-rightsq!hU+know-what-you-have-and-share-that-knowledgeq"h	Usafeguard-the-federationq#h
U1protect-the-form-meaning-and-behavior-of-the-bitsq$hUkeep-the-bits-safeq%hUidentify-data-persistentlyq&h
U three-dataone-preservation-tiersq'hUdataone-document-libraryq(hUsummaryq)hUdataone-preservation-strategyq*hUrefresh-and-verify-the-copiesq+hU'watch-the-copies-yourself-and-the-worldq,hUsafeguard-the-guardiansq-hUsafeguard-the-member-nodesq.hUmake-lots-of-copiesq/hUcope-with-obsolescenceq0uUchildrenq1]q2cdocutils.nodes
section
q3)Åq4}q5(U	rawsourceq6U�Uparentq7hUsourceq8Xp���/var/lib/jenkins/jobs/API_Documentation_trunk/workspace/api-documentation/source/design/PreservationStrategy.txtq9Utagnameq:Usectionq;U
attributesq<}q=(Udupnamesq>]Uclassesq?]Ubackrefsq@]UidsqA]qBh*aUnamesqC]qDhauUlineqEKUdocumentqFhh1]qG(cdocutils.nodes
title
qH)ÅqI}qJ(h6X���DataONE Preservation StrategyqKh7h4h8h9h:UtitleqLh<}qM(h>]h?]h@]hA]hC]uhEKhFhh1]qNcdocutils.nodes
Text
qOX���DataONE Preservation StrategyqPÖÅqQ}qR(h6hKh7hIubaubcsphinx.addnodes
index
qS)ÅqT}qU(h6U�h7h4h8h9h:UindexqVh<}qW(hA]h@]h>]h?]hC]UentriesqX]qY(UsingleqZX���preservationUindex-0q[U�Ntq\aUinlineq]âuhEKhFhh1]ubcdocutils.nodes
target
q^)Åq_}q`(h6U�h7h4h8h9h:Utargetqah<}qb(hA]h@]h>]h?]hC]Urefidqch[uhEKhFhh1]ubcdocutils.nodes
note
qd)Åqe}qf(h6X��This document is a literal conversion of the DataONE Preservation Strategy
document developed by the "Preservation and Metadata Working Group" as an
outcome of the December 2010 meeting held in Chicago. The original document
may be retrieved from the `DataONE document library`_.h7h4h8h9Uexpect_referenced_by_nameqg}h:Unoteqhh<}qi(h>]h?]h@]hA]qjh[ahC]uhENhFhUexpect_referenced_by_idqk}qlh[h_sh1]qmcdocutils.nodes
paragraph
qn)Åqo}qp(h6X��This document is a literal conversion of the DataONE Preservation Strategy
document developed by the "Preservation and Metadata Working Group" as an
outcome of the December 2010 meeting held in Chicago. The original document
may be retrieved from the `DataONE document library`_.h7heh8h9h:U	paragraphqqh<}qr(h>]h?]h@]hA]hC]uhEKh1]qs(hOX˚���This document is a literal conversion of the DataONE Preservation Strategy
document developed by the "Preservation and Metadata Working Group" as an
outcome of the December 2010 meeting held in Chicago. The original document
may be retrieved from the qtÖÅqu}qv(h6X˚���This document is a literal conversion of the DataONE Preservation Strategy
document developed by the "Preservation and Metadata Working Group" as an
outcome of the December 2010 meeting held in Chicago. The original document
may be retrieved from the h7houbcdocutils.nodes
reference
qw)Åqx}qy(h6X���`DataONE document library`_UresolvedqzKh7hoh:U	referenceq{h<}q|(UnameX���DataONE document libraryUrefuriq}Xü���https://docs.dataone.org/member-area/documents/management/nsf-reviews/nsf-review-february-2011/documents-for-nsf-review/DataONE_Preservation_Strategy_2011.docxq~hA]h@]h>]h?]hC]uh1]qhOX���DataONE document libraryqÄÖÅqÅ}qÇ(h6U�h7hxubaubhOX���.ÖÅqÉ}qÑ(h6X���.h7houbeubaubh^)ÅqÖ}qÜ(h6XΩ���.. _DataONE document library: https://docs.dataone.org/member-area/documents/management/nsf-reviews/nsf-review-february-2011/documents-for-nsf-review/DataONE_Preservation_Strategy_2011.docxU
referencedqáKh7h4h8h9h:hah<}qà(h}h~hA]qâh(ah@]h>]h?]hC]qähauhEKhFhh1]ubh3)Åqã}qå(h6U�h7h4h8h9h:h;h<}qç(h>]h?]h@]hA]qéh)ahC]qèhauhEKhFhh1]qê(hH)Åqë}qí(h6X���Summaryqìh7hãh8h9h:hLh<}qî(h>]h?]h@]hA]hC]uhEKhFhh1]qïhOX���SummaryqñÖÅqó}qò(h6hìh7hëubaubhn)Åqô}qö(h6X{���To meet the objective of ‚Äúeasy, secure, and persistent storage of data‚Äù,
DataONE adopts a simple three-tiered approach.qõh7hãh8h9h:hqh<}qú(h>]h?]h@]hA]hC]uhEKhFhh1]qùhOX{���To meet the objective of ‚Äúeasy, secure, and persistent storage of data‚Äù,
DataONE adopts a simple three-tiered approach.qûÖÅqü}q†(h6hõh7hôubaubcdocutils.nodes
enumerated_list
q°)Åq¢}q£(h6U�h7hãh8h9h:Uenumerated_listq§h<}q•(Usuffixq¶U.hA]h@]h>]UprefixqßU�h?]hC]Uenumtypeq®Uarabicq©uhEKhFhh1]q™(cdocutils.nodes
list_item
q´)Åq¨}q≠(h6X��Keep the bits safe. Retaining the actual bits that comprise the data is
paramount, as all other preservation and access questions are moot if the
bits are lost. Key sub-strategies for this tier are (a) persistent
identification, (b) replication of data and metadata, (c) periodic
verification that stored content remains uncorrupted, and (d) reliance on
member nodes to adhere to DataONE protocols and guidelines consistent with
widely adopted public and private sector standards for IT infrastructure
management.
h7h¢h8h9h:U	list_itemqÆh<}qØ(h>]h?]h@]hA]hC]uhENhFhh1]q∞hn)Åq±}q≤(h6X��Keep the bits safe. Retaining the actual bits that comprise the data is
paramount, as all other preservation and access questions are moot if the
bits are lost. Key sub-strategies for this tier are (a) persistent
identification, (b) replication of data and metadata, (c) periodic
verification that stored content remains uncorrupted, and (d) reliance on
member nodes to adhere to DataONE protocols and guidelines consistent with
widely adopted public and private sector standards for IT infrastructure
management.q≥h7h¨h8h9h:hqh<}q¥(h>]h?]h@]hA]hC]uhEKh1]qµhOX��Keep the bits safe. Retaining the actual bits that comprise the data is
paramount, as all other preservation and access questions are moot if the
bits are lost. Key sub-strategies for this tier are (a) persistent
identification, (b) replication of data and metadata, (c) periodic
verification that stored content remains uncorrupted, and (d) reliance on
member nodes to adhere to DataONE protocols and guidelines consistent with
widely adopted public and private sector standards for IT infrastructure
management.q∂ÖÅq∑}q∏(h6h≥h7h±ubaubaubh´)Åqπ}q∫(h6X˚��Protect the form, meaning, and behavior of the bits. Assuming the bits are
kept undamaged, users must also be able to make sense of them into the
future, so protecting their form, meaning, and behavior is critical. In
this tier we rely on collecting characterization metadata, encouraging use
of standardized formats, and securing legal rights appropriate to long-term
archival management, all of which supports future access and, as needed to
preserve meaning and behavior, format migration and emulation.
h7h¢h8h9h:hÆh<}qª(h>]h?]h@]hA]hC]uhENhFhh1]qºhn)ÅqΩ}qæ(h6X˙��Protect the form, meaning, and behavior of the bits. Assuming the bits are
kept undamaged, users must also be able to make sense of them into the
future, so protecting their form, meaning, and behavior is critical. In
this tier we rely on collecting characterization metadata, encouraging use
of standardized formats, and securing legal rights appropriate to long-term
archival management, all of which supports future access and, as needed to
preserve meaning and behavior, format migration and emulation.qøh7hπh8h9h:hqh<}q¿(h>]h?]h@]hA]hC]uhEKh1]q¡hOX˙��Protect the form, meaning, and behavior of the bits. Assuming the bits are
kept undamaged, users must also be able to make sense of them into the
future, so protecting their form, meaning, and behavior is critical. In
this tier we rely on collecting characterization metadata, encouraging use
of standardized formats, and securing legal rights appropriate to long-term
archival management, all of which supports future access and, as needed to
preserve meaning and behavior, format migration and emulation.q¬ÖÅq√}qƒ(h6høh7hΩubaubaubh´)Åq≈}q∆(h6X´��Safeguard the guardians. If the DataONE organization and its member nodes
were to disappear, that would be equivalent to 100 percent data loss. The
DataONE network itself provides resiliency against the occasional loss of
member nodes, and this will be shored up by succession planning, ongoing
investigations into preservation cost models, and open-source software
tools that can sustained by external developer communities.

h7h¢h8h9h:hÆh<}q«(h>]h?]h@]hA]hC]uhENhFhh1]q»hn)Åq…}q (h6X©��Safeguard the guardians. If the DataONE organization and its member nodes
were to disappear, that would be equivalent to 100 percent data loss. The
DataONE network itself provides resiliency against the occasional loss of
member nodes, and this will be shored up by succession planning, ongoing
investigations into preservation cost models, and open-source software
tools that can sustained by external developer communities.qÀh7h≈h8h9h:hqh<}qÃ(h>]h?]h@]hA]hC]uhEK'h1]qÕhOX©��Safeguard the guardians. If the DataONE organization and its member nodes
were to disappear, that would be equivalent to 100 percent data loss. The
DataONE network itself provides resiliency against the occasional loss of
member nodes, and this will be shored up by succession planning, ongoing
investigations into preservation cost models, and open-source software
tools that can sustained by external developer communities.qŒÖÅqœ}q–(h6hÀh7h…ubaubaubeubeubh3)Åq—}q“(h6U�h7h4h8h9h:h;h<}q”(h>]h?]h@]hA]q‘h ahC]q’hauhEK0hFhh1]q÷(hH)Åq◊}qÿ(h6X���Preservation ObjectivesqŸh7h—h8h9h:hLh<}q⁄(h>]h?]h@]hA]hC]uhEK0hFhh1]q€hOX���Preservation Objectivesq‹ÖÅq›}qfi(h6hŸh7h◊ubaubhn)Åqfl}q‡(h6X5��Fundamentally, DataONE‚Äôs preservation goal is to protect the content, meaning,
and behavior of data sets registered in its global network of heterogeneous
data repositories. This a complex undertaking that warrants a layered,
prioritized approach. To get started on a solid footing, our first objective
was to build a platform that immediately provides a significant degree of
preservation assurance and makes it easy to add more sophisticated
preservation function over time. Initially, DataONE will focus on preventing
loss due to non-malicious causes, such as,q·h7h—h8h9h:hqh<}q‚(h>]h?]h@]hA]hC]uhEK2hFhh1]q„hOX5��Fundamentally, DataONE‚Äôs preservation goal is to protect the content, meaning,
and behavior of data sets registered in its global network of heterogeneous
data repositories. This a complex undertaking that warrants a layered,
prioritized approach. To get started on a solid footing, our first objective
was to build a platform that immediately provides a significant degree of
preservation assurance and makes it easy to add more sophisticated
preservation function over time. Initially, DataONE will focus on preventing
loss due to non-malicious causes, such as,q‰ÖÅqÂ}qÊ(h6h·h7hflubaubcdocutils.nodes
bullet_list
qÁ)ÅqË}qÈ(h6U�h7h—h8h9h:Ubullet_listqÍh<}qÎ(UbulletqÏX���-hA]h@]h>]h?]hC]uhEK;hFhh1]qÌ(h´)ÅqÓ}qÔ(h6XW���Technological obsolescence (e.g., loss of support for rendering software and hardware),qh7hËh8h9h:hÆh<}qÒ(h>]h?]h@]hA]hC]uhENhFhh1]qÚhn)ÅqÛ}qÙ(h6hh7hÓh8h9h:hqh<}qı(h>]h?]h@]hA]hC]uhEK;h1]qˆhOXW���Technological obsolescence (e.g., loss of support for rendering software and hardware),q˜ÖÅq¯}q˘(h6hh7hÛubaubaubh´)Åq˙}q˚(h6X:���Accidental loss (human error, natural disaster, etc.), andq¸h7hËh8h9h:hÆh<}q˝(h>]h?]h@]hA]hC]uhENhFhh1]q˛hn)Åqˇ}r���(h6h¸h7h˙h8h9h:hqh<}r��(h>]h?]h@]hA]hC]uhEK<h1]r��hOX:���Accidental loss (human error, natural disaster, etc.), andr��ÖÅr��}r��(h6h¸h7hˇubaubaubh´)År��}r��(h6X)���Financial instability (loss of funding).
h7hËh8h9h:hÆh<}r��(h>]h?]h@]hA]hC]uhENhFhh1]r	��hn)År
��}r��(h6X(���Financial instability (loss of funding).r��h7j��h8h9h:hqh<}r
��(h>]h?]h@]hA]hC]uhEK=h1]r��hOX(���Financial instability (loss of funding).r��ÖÅr��}r��(h6j��h7j
��ubaubaubeubhn)År��}r��(h6Xo��While malicious threats do exist, many of them are addressed as a side-effect
of DataONE protocols and information technology (IT) management standards in
place at member nodes (MNs). By design, DataONE protocols limit the ability of
any MN or Coordinating Node (CN) to directly alter content on another node,
which in turn limits the havoc that an intruder could wreak. Moreover, MN
guidelines call for the same strong local IT management standards that are
widespread in financial services, manufacturing, and large technology
organizations, and these are typically already in force at well-established
data repositories.r��h7h—h8h9h:hqh<}r��(h>]h?]h@]hA]hC]uhEK?hFhh1]r��hOXo��While malicious threats do exist, many of them are addressed as a side-effect
of DataONE protocols and information technology (IT) management standards in
place at member nodes (MNs). By design, DataONE protocols limit the ability of
any MN or Coordinating Node (CN) to directly alter content on another node,
which in turn limits the havoc that an intruder could wreak. Moreover, MN
guidelines call for the same strong local IT management standards that are
widespread in financial services, manufacturing, and large technology
organizations, and these are typically already in force at well-established
data repositories.r��ÖÅr��}r��(h6j��h7j��ubaubhn)År��}r��(h6X‹���An ancillary objective is to help inform an overall NSF DataNet preservation
strategy, and to that end this strategy was prepared at a DataONE workshop
(Chicago, 2010) with direct input from the Data Conservancy project.r��h7h—h8h9h:hqh<}r��(h>]h?]h@]hA]hC]uhEKIhFhh1]r��hOX‹���An ancillary objective is to help inform an overall NSF DataNet preservation
strategy, and to that end this strategy was prepared at a DataONE workshop
(Chicago, 2010) with direct input from the Data Conservancy project.r��ÖÅr ��}r!��(h6j��h7j��ubaubeubh3)År"��}r#��(h6U�h7h4h8h9h:h;h<}r$��(h>]h?]h@]hA]r%��h'ahC]r&��h
auhEKNhFhh1]r'��(hH)År(��}r)��(h6X ���Three DataONE preservation tiersr*��h7j"��h8h9h:hLh<}r+��(h>]h?]h@]hA]hC]uhEKNhFhh1]r,��hOX ���Three DataONE preservation tiersr-��ÖÅr.��}r/��(h6j*��h7j(��ubaubhn)År0��}r1��(h6XZ���The initial DataONE approach to preservation is described in the following
three sections.r2��h7j"��h8h9h:hqh<}r3��(h>]h?]h@]hA]hC]uhEKPhFhh1]r4��hOXZ���The initial DataONE approach to preservation is described in the following
three sections.r5��ÖÅr6��}r7��(h6j2��h7j0��ubaubh3)År8��}r9��(h6U�h7j"��h8h9h:h;h<}r:��(h>]h?]h@]hA]r;��h%ahC]r<��hauhEKThFhh1]r=��(hH)År>��}r?��(h6X���1.  Keep the bits safer@��h7j8��h8h9h:hLh<}rA��(h>]h?]h@]hA]hC]uhEKThFhh1]rB��hOX���1.  Keep the bits saferC��ÖÅrD��}rE��(h6j@��h7j>��ubaubhn)ÅrF��}rG��(h6X%��Retaining the actual bits comprising the data and metadata is paramount, as
all other preservation and access questions are moot if the bits are damaged
or lost. The direct role played by MNs in bit-level preservation is addressed
in the third section describing organizational sustainability.rH��h7j8��h8h9h:hqh<}rI��(h>]h?]h@]hA]hC]uhEKVhFhh1]rJ��hOX%��Retaining the actual bits comprising the data and metadata is paramount, as
all other preservation and access questions are moot if the bits are damaged
or lost. The direct role played by MNs in bit-level preservation is addressed
in the third section describing organizational sustainability.rK��ÖÅrL��}rM��(h6jH��h7jF��ubaubh3)ÅrN��}rO��(h6U�h7j8��h8h9h:h;h<}rP��(h>]h?]h@]hA]rQ��h&ahC]rR��hauhEK\hFhh1]rS��(hH)ÅrT��}rU��(h6X���Identify data persistentlyrV��h7jN��h8h9h:hLh<}rW��(h>]h?]h@]hA]hC]uhEK\hFhh1]rX��hOX���Identify data persistentlyrY��ÖÅrZ��}r[��(h6jV��h7jT��ubaubhn)År\��}r]��(h6XÅ��Persistent identifiers (PIDs) are required for stable reference to all content
stored in DataONE. Without them, reliable data citation and long-term access
would not be possible. Because there are many legacy identifiers to be
accommodated, some of them dating from before the advent of the world-wide
web, DataONE uses PIDs from a variety of schemes and support systems, such as
purl.org and handle.net. Remaining agnostic about identifier syntax, DataONE
will also rely on scheme-agnostic support systems such as n2t.net/ezid, which
can deal with ARKs, DOIs, and traditionally non-actionable identifiers such as
PMIDs (PubMed Identifiers).r^��h7jN��h8h9h:hqh<}r_��(h>]h?]h@]hA]hC]uhEK^hFhh1]r`��hOX��Persistent identifiers (PIDs) are required for stable reference to all content
stored in DataONE. Without them, reliable data citation and long-term access
would not be possible. Because there are many legacy identifiers to be
accommodated, some of them dating from before the advent of the world-wide
web, DataONE uses PIDs from a variety of schemes and support systems, such as
purl.org and handle.net. Remaining agnostic about identifier syntax, DataONE
will also rely on scheme-agnostic support systems such as n2t.net/ezid, which
can deal with ARKs, DOIs, and traditionally non-actionable identifiers such as
PMIDs (PubMed Identifiers).ra��ÖÅrb��}rc��(h6j^��h7j\��ubaubeubh3)Ård��}re��(h6U�h7j8��h8h9h:h;h<}rf��(h>]h?]h@]hA]rg��h/ahC]rh��hauhEKihFhh1]ri��(hH)Årj��}rk��(h6X���Make lots of copiesrl��h7jd��h8h9h:hLh<}rm��(h>]h?]h@]hA]hC]uhEKihFhh1]rn��hOX���Make lots of copiesro��ÖÅrp��}rq��(h6jl��h7jj��ubaubhn)Årr��}rs��(h6XÔ��To protect against the possible loss of a MN, or a bit-level failure at a
single MN,DataONE replicates both data and metadata. Two replicas of the raw
bits representing each dataset are created upon registration of a dataset by a
MN; the two replicas and the original dataset held at the MN result in a total
of three instances. The instances are kept at three different MNs, which
creates safety through copies that are “de-correlated” by geographic,
administrative, and financial domain. In this way, the instances are not
vulnerable to the same power failure, same earthquake, same funding loss, etc.
As for metadata, three replicas of all metadata are created and held at the
CNs, resulting in a total of four de-correlated metadata instances.rt��h7jd��h8h9h:hqh<}ru��(h>]h?]h@]hA]hC]uhEKkhFhh1]rv��hOX��To protect against the possible loss of a MN, or a bit-level failure at a
single MN,DataONE replicates both data and metadata. Two replicas of the raw
bits representing each dataset are created upon registration of a dataset by a
MN; the two replicas and the original dataset held at the MN result in a total
of three instances. The instances are kept at three different MNs, which
creates safety through copies that are “de-correlated” by geographic,
administrative, and financial domain. In this way, the instances are not
vulnerable to the same power failure, same earthquake, same funding loss, etc.
As for metadata, three replicas of all metadata are created and held at the
CNs, resulting in a total of four de-correlated metadata instances.rw��ÖÅrx��}ry��(h6jt��h7jr��ubaubhn)Årz��}r{��(h6XT���Depending on its data replication policy, a MN may fall into one of several
classes:r|��h7jd��h8h9h:hqh<}r}��(h>]h?]h@]hA]hC]uhEKvhFhh1]r~��hOXT���Depending on its data replication policy, a MN may fall into one of several
classes:r��ÖÅrÄ��}rÅ��(h6j|��h7jz��ubaubh°)ÅrÇ��}rÉ��(h6U�h7jd��h8h9h:h§h<}rÑ��(h¶U.hA]h@]h>]hßU�h?]hC]h®h©uhEKyhFhh1]rÖ��(h´)ÅrÜ��}rá��(h6Xè���Read-Only: MNs that are unwilling or unable to hold replicas (whether such
MNs are admitted by DataONE is up to the Governance Working Group).
h7jÇ��h8h9h:hÆh<}rà��(h>]h?]h@]hA]hC]uhENhFhh1]râ��hn)Årä��}rã��(h6Xé���Read-Only: MNs that are unwilling or unable to hold replicas (whether such
MNs are admitted by DataONE is up to the Governance Working Group).r�h7j��h8h9h:hqh<}r�(h>]h?]h@]hA]hC]uhEKyh1]r�hOX��Read-Only: MNs that are unwilling or unable to hold replicas (whether such
MNs are admitted by DataONE is up to the Governance Working Group).rè��ÖÅrê��}rë��(h6jå��h7jä��ubaubaubh´)Årí��}rì��(h6XÅ��Replication-Open: MNs that are willing to accept whatever content a CN
tells them (up to capacity). These nodes will try to honor any access
control rules that are applied to the data objects they replicate. If a MN
is unable to honor a given access rule, the associated data object will be
“darkived”, namely, stored within a dark archive that is not accessible to
general users.
h7jÇ��h8h9h:hÆh<}rî��(h>]h?]h@]hA]hC]uhENhFhh1]rï��hn)Årñ��}ró��(h6XÄ��Replication-Open: MNs that are willing to accept whatever content a CN
tells them (up to capacity). These nodes will try to honor any access
control rules that are applied to the data objects they replicate. If a MN
is unable to honor a given access rule, the associated data object will be
“darkived”, namely, stored within a dark archive that is not accessible to
general users.rò��h7jí��h8h9h:hqh<}rô��(h>]h?]h@]hA]hC]uhEK|h1]rö��hOXÄ��Replication-Open: MNs that are willing to accept whatever content a CN
tells them (up to capacity). These nodes will try to honor any access
control rules that are applied to the data objects they replicate. If a MN
is unable to honor a given access rule, the associated data object will be
“darkived”, namely, stored within a dark archive that is not accessible to
general users.rõ��ÖÅrú��}rù��(h6jò��h7jñ��ubaubaubh´)Årû��}rü��(h6Xu��Replication-Only: MNs that are set up by DataONE specifically to provide
replication services and that do not provide original content of their own.
They are designed for capacity and capability, and are willing to accept
whatever content a CN tells them to replicate (up to capacity). They are
able to honor any access restriction rules defined within the DataONE
system.
h7jÇ��h8h9h:hÆh<}r†��(h>]h?]h@]hA]hC]uhENhFhh1]r°��hn)År¢��}r£��(h6Xt��Replication-Only: MNs that are set up by DataONE specifically to provide
replication services and that do not provide original content of their own.
They are designed for capacity and capability, and are willing to accept
whatever content a CN tells them to replicate (up to capacity). They are
able to honor any access restriction rules defined within the DataONE
system.r§��h7jû��h8h9h:hqh<}r•��(h>]h?]h@]hA]hC]uhEKÉh1]r¶��hOXt��Replication-Only: MNs that are set up by DataONE specifically to provide
replication services and that do not provide original content of their own.
They are designed for capacity and capability, and are willing to accept
whatever content a CN tells them to replicate (up to capacity). They are
able to honor any access restriction rules defined within the DataONE
system.rß��ÖÅr®��}r©��(h6j§��h7j¢��ubaubaubeubhn)År™��}r´��(h6XÏ���Replication will be triggered automatically by content registration. While it
is desirable to maintain three instances of each data object, over time there
may arise practical limits to replication due to a number of changeable
factors:r¨��h7jd��h8h9h:hqh<}r≠��(h>]h?]h@]hA]hC]uhEKähFhh1]rÆ��hOXÏ���Replication will be triggered automatically by content registration. While it
is desirable to maintain three instances of each data object, over time there
may arise practical limits to replication due to a number of changeable
factors:rØ��ÖÅr∞��}r±��(h6j¨��h7j™��ubaubhÁ)År≤��}r≥��(h6U�h7jd��h8h9h:hÍh<}r¥��(hÏX���-hA]h@]h>]h?]hC]uhEKèhFhh1]rµ��(h´)År∂��}r∑��(h6X$���MN capacities and/or MN capabilitiesr∏��h7j≤��h8h9h:hÆh<}rπ��(h>]h?]h@]hA]hC]uhENhFhh1]r∫��hn)Årª��}rº��(h6j∏��h7j∂��h8h9h:hqh<}rΩ��(h>]h?]h@]hA]hC]uhEKèh1]ræ��hOX$���MN capacities and/or MN capabilitiesrø��ÖÅr¿��}r¡��(h6j∏��h7jª��ubaubaubh´)År¬��}r√��(h6X@���willingness of MNs to be targets of replication (to hold copies)rƒ��h7j≤��h8h9h:hÆh<}r≈��(h>]h?]h@]hA]hC]uhENhFhh1]r∆��hn)År«��}r»��(h6jƒ��h7j¬��h8h9h:hqh<}r…��(h>]h?]h@]hA]hC]uhEKêh1]r ��hOX@���willingness of MNs to be targets of replication (to hold copies)rÀ��ÖÅrÃ��}rÕ��(h6jƒ��h7j«��ubaubaubh´)ÅrŒ��}rœ��(h6X,���willingness of MNs to permit outbound copiesr–��h7j≤��h8h9h:hÆh<}r—��(h>]h?]h@]hA]hC]uhENhFhh1]r“��hn)År”��}r‘��(h6j–��h7jŒ��h8h9h:hqh<}r’��(h>]h?]h@]hA]hC]uhEKëh1]r÷��hOX,���willingness of MNs to permit outbound copiesr◊��ÖÅrÿ��}rŸ��(h6j–��h7j”��ubaubaubh´)År⁄��}r€��(h6X,���perceived value of data relative to its sizer‹��h7j≤��h8h9h:hÆh<}r›��(h>]h?]h@]hA]hC]uhENhFhh1]rfi��hn)Årfl��}r‡��(h6j‹��h7j⁄��h8h9h:hqh<}r·��(h>]h?]h@]hA]hC]uhEKíh1]r‚��hOX,���perceived value of data relative to its sizer„��ÖÅr‰��}rÂ��(h6j‹��h7jfl��ubaubaubh´)ÅrÊ��}rÁ��(h6X'���changes in access control restrictions
h7j≤��h8h9h:hÆh<}rË��(h>]h?]h@]hA]hC]uhENhFhh1]rÈ��hn)ÅrÍ��}rÎ��(h6X&���changes in access control restrictionsrÏ��h7jÊ��h8h9h:hqh<}rÌ��(h>]h?]h@]hA]hC]uhEKìh1]rÓ��hOX&���changes in access control restrictionsrÔ��ÖÅr��}rÒ��(h6jÏ��h7jÍ��ubaubaubeubeubh3)ÅrÚ��}rÛ��(h6U�h7j8��h8h9h:h;h<}rÙ��(h>]h?]h@]hA]rı��h+ahC]rˆ��hauhEKñhFhh1]r˜��(hH)År¯��}r˘��(h6X���Refresh and verify the copiesr˙��h7jÚ��h8h9h:hLh<}r˚��(h>]h?]h@]hA]hC]uhEKñhFhh1]r¸��hOX���Refresh and verify the copiesr˝��ÖÅr˛��}rˇ��(h6j˙��h7j¯��ubaubhn)År���}r��(h6X��MN guidelines also call for the common-sense and usual practice of periodic
“media refresh”, which is the copying of data from old physical recording
devices to new physical recording devices to avoid errors due to media
degradation and vendor de-support.r��h7jÚ��h8h9h:hqh<}r��(h>]h?]h@]hA]hC]uhEKòhFhh1]r��hOX��MN guidelines also call for the common-sense and usual practice of periodic
“media refresh”, which is the copying of data from old physical recording
devices to new physical recording devices to avoid errors due to media
degradation and vendor de-support.r��ÖÅr��}r��(h6j��h7j���ubaubhn)År��}r	��(h6X≠��Damage or corruption in those copies is detected by periodically re-computing
checksums (e.g., SHA-256 digests) for randomly selected datasets and comparing
them with checksums securely stored at the CNs. Any bit-level changes detected
can be repaired by copying from an unchanged copy. This kind of “pop quiz”
cannot be cheated by simply reporting back a previously computed checksum; the
actual MN replica data is requested and the checksum recomputed. It is
appropriate that this entails sampling only a subset of the data as it is not
computationally feasible to keep the MNs and CNs constantly busy exhaustively
checking the amount of content that DataONE anticipates holding.r
��h7jÚ��h8h9h:hqh<}r��(h>]h?]h@]hA]hC]uhEKùhFhh1]r��hOX≠��Damage or corruption in those copies is detected by periodically re-computing
checksums (e.g., SHA-256 digests) for randomly selected datasets and comparing
them with checksums securely stored at the CNs. Any bit-level changes detected
can be repaired by copying from an unchanged copy. This kind of “pop quiz”
cannot be cheated by simply reporting back a previously computed checksum; the
actual MN replica data is requested and the checksum recomputed. It is
appropriate that this entails sampling only a subset of the data as it is not
computationally feasible to keep the MNs and CNs constantly busy exhaustively
checking the amount of content that DataONE anticipates holding.r
��ÖÅr��}r��(h6j
��h7j��ubaubeubeubh3)År��}r��(h6U�h7j"��h8h9h:h;h<}r��(h>]h?]h@]hA]r��h$ahC]r��h
auhEK®hFhh1]r��(hH)År��}r��(h6X7���2.  Protect the form, meaning, and behavior of the bitsr��h7j��h8h9h:hLh<}r��(h>]h?]h@]hA]hC]uhEK®hFhh1]r��hOX7���2.  Protect the form, meaning, and behavior of the bitsr��ÖÅr��}r��(h6j��h7j��ubaubhn)År��}r��(h6X=��Digital content has three related aspects that must be considered when
planning and performing preservation functions: content has a specific digital
form; that form encapsulates a given abstract meaning; and that meaning is
recovered for use through appropriate behaviors applied against the form.
Preservation of form ensures that the low-level structure of the content is
preserved; preservation of meaning ensures that the semantics of the content
are recoverable, at least in theory; and preservation of behavior ensures that
the semantics are recoverable in practice.r ��h7j��h8h9h:hqh<}r!��(h>]h?]h@]hA]hC]uhEK™hFhh1]r"��hOX=��Digital content has three related aspects that must be considered when
planning and performing preservation functions: content has a specific digital
form; that form encapsulates a given abstract meaning; and that meaning is
recovered for use through appropriate behaviors applied against the form.
Preservation of form ensures that the low-level structure of the content is
preserved; preservation of meaning ensures that the semantics of the content
are recoverable, at least in theory; and preservation of behavior ensures that
the semantics are recoverable in practice.r#��ÖÅr$��}r%��(h6j ��h7j��ubaubhn)År&��}r'��(h6Xj��For example, consider a dataset of environmental samples. At the structural
level these numeric data are organized in a tabular fashion. But their full
meaning is only recoverable by knowing the variables and units of measure
associated with each column in the table. If the data are represented in
binary, rather than textual form, then use of the data also depends on an
appropriate software application that can expose the information in a directly
human-useable form. DataONE metadata standards should incorporate schemas to
document and describe data in terms enabling preservation of form, meaning,
and behavior.r(��h7j��h8h9h:hqh<}r)��(h>]h?]h@]hA]hC]uhEK≥hFhh1]r*��hOXj��For example, consider a dataset of environmental samples. At the structural
level these numeric data are organized in a tabular fashion. But their full
meaning is only recoverable by knowing the variables and units of measure
associated with each column in the table. If the data are represented in
binary, rather than textual form, then use of the data also depends on an
appropriate software application that can expose the information in a directly
human-useable form. DataONE metadata standards should incorporate schemas to
document and describe data in terms enabling preservation of form, meaning,
and behavior.r+��ÖÅr,��}r-��(h6j(��h7j&��ubaubhn)År.��}r/��(h6XJ���Preservation activities in this tier fall into four conceptual categories:r0��h7j��h8h9h:hqh<}r1��(h>]h?]h@]hA]hC]uhEKΩhFhh1]r2��hOXJ���Preservation activities in this tier fall into four conceptual categories:r3��ÖÅr4��}r5��(h6j0��h7j.��ubaubhÁ)År6��}r7��(h6U�h7j��h8h9h:hÍh<}r8��(hÏX���-hA]h@]h>]h?]hC]uhEKøhFhh1]r9��(h´)År:��}r;��(h6X���Know your rightsr<��h7j6��h8h9h:hÆh<}r=��(h>]h?]h@]hA]hC]uhENhFhh1]r>��hn)År?��}r@��(h6j<��h7j:��h8h9h:hqh<}rA��(h>]h?]h@]hA]hC]uhEKøh1]rB��hOX���Know your rightsrC��ÖÅrD��}rE��(h6j<��h7j?��ubaubaubh´)ÅrF��}rG��(h6X+���Know what you have and share that knowledgerH��h7j6��h8h9h:hÆh<}rI��(h>]h?]h@]hA]hC]uhENhFhh1]rJ��hn)ÅrK��}rL��(h6jH��h7jF��h8h9h:hqh<}rM��(h>]h?]h@]hA]hC]uhEK¿h1]rN��hOX+���Know what you have and share that knowledgerO��ÖÅrP��}rQ��(h6jH��h7jK��ubaubaubh´)ÅrR��}rS��(h6X���Cope with obsolescencerT��h7j6��h8h9h:hÆh<}rU��(h>]h?]h@]hA]hC]uhENhFhh1]rV��hn)ÅrW��}rX��(h6jT��h7jR��h8h9h:hqh<}rY��(h>]h?]h@]hA]hC]uhEK¡h1]rZ��hOX���Cope with obsolescencer[��ÖÅr\��}r]��(h6jT��h7jW��ubaubaubh´)År^��}r_��(h6X*���Watch the copies, yourself, and the world
h7j6��h8h9h:hÆh<}r`��(h>]h?]h@]hA]hC]uhENhFhh1]ra��hn)Årb��}rc��(h6X)���Watch the copies, yourself, and the worldrd��h7j^��h8h9h:hqh<}re��(h>]h?]h@]hA]hC]uhEK¬h1]rf��hOX)���Watch the copies, yourself, and the worldrg��ÖÅrh��}ri��(h6jd��h7jb��ubaubaubeubh3)Årj��}rk��(h6U�h7j��h8h9h:h;h<}rl��(h>]h?]h@]hA]rm��h!ahC]rn��hauhEK≈hFhh1]ro��(hH)Årp��}rq��(h6X���Know your rightsrr��h7jj��h8h9h:hLh<}rs��(h>]h?]h@]hA]hC]uhEK≈hFhh1]rt��hOX���Know your rightsru��ÖÅrv��}rw��(h6jr��h7jp��ubaubhn)Årx��}ry��(h6Xú��Ultimately, having the bits and their meaning is useless if one doesn‚Äôt also
have the legal right (a) to hold the data, (b) to make copies and derivatives
in performance of preservation management (such as replication and migration),
and (c) to transfer those same rights to a successor archive. Just as
important is to know specifically who owns the original data and *whether* those
rights have been granted.h7jj��h8h9h:hqh<}rz��(h>]h?]h@]hA]hC]uhEK«hFhh1]r{��(hOXs��Ultimately, having the bits and their meaning is useless if one doesn‚Äôt also
have the legal right (a) to hold the data, (b) to make copies and derivatives
in performance of preservation management (such as replication and migration),
and (c) to transfer those same rights to a successor archive. Just as
important is to know specifically who owns the original data and r|��ÖÅr}��}r~��(h6Xs��Ultimately, having the bits and their meaning is useless if one doesn‚Äôt also
have the legal right (a) to hold the data, (b) to make copies and derivatives
in performance of preservation management (such as replication and migration),
and (c) to transfer those same rights to a successor archive. Just as
important is to know specifically who owns the original data and h7jx��ubcdocutils.nodes
emphasis
r��)ÅrÄ��}rÅ��(h6X	���*whether*h<}rÇ��(h>]h?]h@]hA]hC]uh7jx��h1]rÉ��hOX���whetherrÑ��ÖÅrÖ��}rÜ��(h6U�h7jÄ��ubah:Uemphasisrá��ubhOX ��� those
rights have been granted.rà��ÖÅrâ��}rä��(h6X ��� those
rights have been granted.h7jx��ubeubhn)Årã��}rå��(h6X˝���As a start we strongly encourage providers to assign ‚ÄúCreative Commons Zero‚Äù
(CC0) licenses to all contributed data, which facilitates preservation and
does not prevent data providers from requiring an attribution statement as a
condition of re-use.rç��h7jj��h8h9h:hqh<}ré��(h>]h?]h@]hA]hC]uhEKŒhFhh1]rè��hOX˝���As a start we strongly encourage providers to assign ‚ÄúCreative Commons Zero‚Äù
(CC0) licenses to all contributed data, which facilitates preservation and
does not prevent data providers from requiring an attribution statement as a
condition of re-use.rê��ÖÅrë��}rí��(h6jç��h7jã��ubaubeubh3)Årì��}rî��(h6U�h7j��h8h9h:h;h<}rï��(h>]h?]h@]hA]rñ��h"ahC]ró��hauhEK‘hFhh1]rò��(hH)Årô��}rö��(h6X+���Know what you have and share that knowledgerõ��h7jì��h8h9h:hLh<}rú��(h>]h?]h@]hA]hC]uhEK‘hFhh1]rù��hOX+���Know what you have and share that knowledgerû��ÖÅrü��}r†��(h6jõ��h7jô��ubaubhn)År°��}r¢��(h6X2��Understanding the content being preserved in the DataONE network is a function
of metadata that describes various aspects of the content. This metadata comes
from a variety of sources, including automated characterization of content at
the point of acquisition or submission to the DataONE network, and direct
contribution from content creators, curators, and consumers. Characterization
is important in order to determine the significant properties of digital
resources that must be preserved over time, and for purposes of
classification, since many preservation actions will take place in an
automated fashion on groups of similar resources. DataONE will encourage use
of data formats that are open, transparent, widely used, and non-encrypted --
formats that are more inherently amenable to long-term preservation.r£��h7jì��h8h9h:hqh<}r§��(h>]h?]h@]hA]hC]uhEK÷hFhh1]r•��hOX2��Understanding the content being preserved in the DataONE network is a function
of metadata that describes various aspects of the content. This metadata comes
from a variety of sources, including automated characterization of content at
the point of acquisition or submission to the DataONE network, and direct
contribution from content creators, curators, and consumers. Characterization
is important in order to determine the significant properties of digital
resources that must be preserved over time, and for purposes of
classification, since many preservation actions will take place in an
automated fashion on groups of similar resources. DataONE will encourage use
of data formats that are open, transparent, widely used, and non-encrypted --
formats that are more inherently amenable to long-term preservation.r¶��ÖÅrß��}r®��(h6j£��h7j°��ubaubhn)År©��}r™��(h6Xî��Use of automated characterization tools, such as DROID
(http://droid.sourceforge.net/) and JHOVE2
(https://bitbucket.org/jhove2/main/wiki/Home) will be strongly recommended of
data providers. While most existing characterization tools focus on general
formats for cultural heritage content, the DataONE community can contribute to
development that will result in increased coverage of scientific formats.h7jì��h8h9h:hqh<}r´��(h>]h?]h@]hA]hC]uhEK‚hFhh1]r¨��(hOX8���Use of automated characterization tools, such as DROID
(r≠��ÖÅrÆ��}rØ��(h6X8���Use of automated characterization tools, such as DROID
(h7j©��ubhw)År∞��}r±��(h6X���http://droid.sourceforge.net/r≤��h<}r≥��(Urefurij≤��hA]h@]h>]h?]hC]uh7j©��h1]r¥��hOX���http://droid.sourceforge.net/rµ��ÖÅr∂��}r∑��(h6U�h7j∞��ubah:h{ubhOX���) and JHOVE2
(r∏��ÖÅrπ��}r∫��(h6X���) and JHOVE2
(h7j©��ubhw)Årª��}rº��(h6X+���https://bitbucket.org/jhove2/main/wiki/HomerΩ��h<}ræ��(UrefurijΩ��hA]h@]h>]h?]hC]uh7j©��h1]rø��hOX+���https://bitbucket.org/jhove2/main/wiki/Homer¿��ÖÅr¡��}r¬��(h6U�h7jª��ubah:h{ubhOX��) will be strongly recommended of
data providers. While most existing characterization tools focus on general
formats for cultural heritage content, the DataONE community can contribute to
development that will result in increased coverage of scientific formats.r√��ÖÅrƒ��}r≈��(h6X��) will be strongly recommended of
data providers. While most existing characterization tools focus on general
formats for cultural heritage content, the DataONE community can contribute to
development that will result in increased coverage of scientific formats.h7j©��ubeubhn)År∆��}r«��(h6X¡��Rich preservation metadata will be managed at varying levels of granularity,
including individual files, aggregations of files that collectively form a
single coherent resource, and meaningful subsets of files. In addition to
describing primary data sets, metadata is also necessary for associated
toolkit workflows, which are themselves first-class data objects needing
DataONE preservation. In some cases, characterization metadata will consist of
references to information managed in external technical registries such as
UDFR (http://udfr.org/) and PRONOM
(http://www.nationalarchives.gov.uk/PRONOM/Default.aspx). DataONE is fortunate
to have partnered with the primary maintainers of JHOVE2 and UDFR.h7jì��h8h9h:hqh<}r»��(h>]h?]h@]hA]hC]uhEKÈhFhh1]r…��(hOX��Rich preservation metadata will be managed at varying levels of granularity,
including individual files, aggregations of files that collectively form a
single coherent resource, and meaningful subsets of files. In addition to
describing primary data sets, metadata is also necessary for associated
toolkit workflows, which are themselves first-class data objects needing
DataONE preservation. In some cases, characterization metadata will consist of
references to information managed in external technical registries such as
UDFR (r ��ÖÅrÀ��}rÃ��(h6X��Rich preservation metadata will be managed at varying levels of granularity,
including individual files, aggregations of files that collectively form a
single coherent resource, and meaningful subsets of files. In addition to
describing primary data sets, metadata is also necessary for associated
toolkit workflows, which are themselves first-class data objects needing
DataONE preservation. In some cases, characterization metadata will consist of
references to information managed in external technical registries such as
UDFR (h7j∆��ubhw)ÅrÕ��}rŒ��(h6X���http://udfr.org/rœ��h<}r–��(Urefurijœ��hA]h@]h>]h?]hC]uh7j∆��h1]r—��hOX���http://udfr.org/r“��ÖÅr”��}r‘��(h6U�h7jÕ��ubah:h{ubhOX���) and PRONOM
(r’��ÖÅr÷��}r◊��(h6X���) and PRONOM
(h7j∆��ubhw)Årÿ��}rŸ��(h6X6���http://www.nationalarchives.gov.uk/PRONOM/Default.aspxr⁄��h<}r€��(Urefurij⁄��hA]h@]h>]h?]hC]uh7j∆��h1]r‹��hOX6���http://www.nationalarchives.gov.uk/PRONOM/Default.aspxr›��ÖÅrfi��}rfl��(h6U�h7jÿ��ubah:h{ubhOXZ���). DataONE is fortunate
to have partnered with the primary maintainers of JHOVE2 and UDFR.r‡��ÖÅr·��}r‚��(h6XZ���). DataONE is fortunate
to have partnered with the primary maintainers of JHOVE2 and UDFR.h7j∆��ubeubhn)År„��}r‰��(h6Xb��Preservation metadata will be expressed and managed within the DataONE network
using a variety of schemas in the science metadata. In addition to providing a
means for accurate description and citation of resources managed by DataONE,
this information also will be exposed for search and retrieval by external
indexing, search, and notification services.rÂ��h7jì��h8h9h:hqh<}rÊ��(h>]h?]h@]hA]hC]uhEKÙhFhh1]rÁ��hOXb��Preservation metadata will be expressed and managed within the DataONE network
using a variety of schemas in the science metadata. In addition to providing a
means for accurate description and citation of resources managed by DataONE,
this information also will be exposed for search and retrieval by external
indexing, search, and notification services.rË��ÖÅrÈ��}rÍ��(h6jÂ��h7j„��ubaubeubh3)ÅrÎ��}rÏ��(h6U�h7j��h8h9h:h;h<}rÌ��(h>]h?]h@]hA]rÓ��h0ahC]rÔ��hauhEK˚hFhh1]r��(hH)ÅrÒ��}rÚ��(h6X���Cope with obsolescencerÛ��h7jÎ��h8h9h:hLh<}rÙ��(h>]h?]h@]hA]hC]uhEK˚hFhh1]rı��hOX���Cope with obsolescencerˆ��ÖÅr˜��}r¯��(h6jÛ��h7jÒ��ubaubhn)År˘��}r˙��(h6X��*Migration* and *emulation* are sub-strategies that DataONE will use in the
event that formats become obsolete. At some time in the future, one may expect
that available contemporary hardware and software will be unable to render or
otherwise use bits saved in some formats.h7jÎ��h8h9h:hqh<}r˚��(h>]h?]h@]hA]hC]uhEK˝hFhh1]r¸��(j��)År˝��}r˛��(h6X���*Migration*h<}rˇ��(h>]h?]h@]hA]hC]uh7j˘��h1]r���hOX	���Migrationr��ÖÅr��}r��(h6U�h7j˝��ubah:já��ubhOX��� and r��ÖÅr��}r��(h6X��� and h7j˘��ubj��)År��}r��(h6X���*emulation*h<}r	��(h>]h?]h@]hA]hC]uh7j˘��h1]r
��hOX	���emulationr��ÖÅr��}r
��(h6U�h7j��ubah:já��ubhOX˜��� are sub-strategies that DataONE will use in the
event that formats become obsolete. At some time in the future, one may expect
that available contemporary hardware and software will be unable to render or
otherwise use bits saved in some formats.r��ÖÅr��}r��(h6X˜��� are sub-strategies that DataONE will use in the
event that formats become obsolete. At some time in the future, one may expect
that available contemporary hardware and software will be unable to render or
otherwise use bits saved in some formats.h7j˘��ubeubhn)År��}r��(h6X◊��*Migration* is used to convert from older to newer formats; all converted
content is subject to “before” and “after” characterization to ensure semantic
invariance. *Emulation* effectively preserves older computing environments in
order to retain the experience of rendering older formats; once considered a
specialized intervention, emulation has become a more viable technique with
recent developments in consumer and enterprise server virtualization
solutions.h7jÎ��h8h9h:hqh<}r��(h>]h?]h@]hA]hC]uhEMhFhh1]r��(j��)År��}r��(h6X���*Migration*h<}r��(h>]h?]h@]hA]hC]uh7j��h1]r��hOX	���Migrationr��ÖÅr��}r��(h6U�h7j��ubah:já��ubhOX¢��� is used to convert from older to newer formats; all converted
content is subject to “before” and “after” characterization to ensure semantic
invariance. r��ÖÅr��}r��(h6X¢��� is used to convert from older to newer formats; all converted
content is subject to “before” and “after” characterization to ensure semantic
invariance. h7j��ubj��)År��}r ��(h6X���*Emulation*h<}r!��(h>]h?]h@]hA]hC]uh7j��h1]r"��hOX	���Emulationr#��ÖÅr$��}r%��(h6U�h7j��ubah:já��ubhOX�� effectively preserves older computing environments in
order to retain the experience of rendering older formats; once considered a
specialized intervention, emulation has become a more viable technique with
recent developments in consumer and enterprise server virtualization
solutions.r&��ÖÅr'��}r(��(h6X�� effectively preserves older computing environments in
order to retain the experience of rendering older formats; once considered a
specialized intervention, emulation has become a more viable technique with
recent developments in consumer and enterprise server virtualization
solutions.h7j��ubeubhn)År)��}r*��(h6X¯��Migration workflows need only be available on a subset of DataONE member
nodes, which can function as service utilities to the greater network. A
successful migration strategy requires versioning of the content, where all
versions are retained. The versioning of managed content that results from
migration will be reflected in that content’s system metadata. All migrated
content will be subject to “before” and “after” characterization to ensure the
semantic invariance of the transformation.r+��h7j��h8h9h:hqh<}r,��(h>]h?]h@]hA]hC]uhEM
hFhh1]r-��hOX¯��Migration workflows need only be available on a subset of DataONE member
nodes, which can function as service utilities to the greater network. A
successful migration strategy requires versioning of the content, where all
versions are retained. The versioning of managed content that results from
migration will be reflected in that content’s system metadata. All migrated
content will be subject to “before” and “after” characterization to ensure the
semantic invariance of the transformation.r.��ÖÅr/��}r0��(h6j+��h7j)��ubaubhn)År1��}r2��(h6X0��While emulation has become a more viable technique, it is important to
understand the technological dependencies of the component parts of the
workflow underlying the use of a particular resource. Emulation may become
difficult if various workflow components require multiple levels of emulation
support.r3��h7j��h8h9h:hqh<}r4��(h>]h?]h@]hA]hC]uhEMhFhh1]r5��hOX0��While emulation has become a more viable technique, it is important to
understand the technological dependencies of the component parts of the
workflow underlying the use of a particular resource. Emulation may become
difficult if various workflow components require multiple levels of emulation
support.r6��ÖÅr7��}r8��(h6j3��h7j1��ubaubeubh3)År9��}r:��(h6U�h7j��h8h9h:h;h<}r;��(h>]h?]h@]hA]r<��h,ahC]r=��hauhEMhFhh1]r>��(hH)År?��}r@��(h6X)���Watch the copies, yourself, and the worldrA��h7j9��h8h9h:hLh<}rB��(h>]h?]h@]hA]hC]uhEMhFhh1]rC��hOX)���Watch the copies, yourself, and the worldrD��ÖÅrE��}rF��(h6jA��h7j?��ubaubhn)ÅrG��}rH��(h6Xë��Preservation action plans for mitigating preservation risks will be developed
ahead of the need for their application. Protection against obsolescence
requires an understanding of the technological dependencies underlying that
use. While some resources are easily manipulated using relatively standard and
long-lived desktop tools, others require highly specialized applications and
complex workflows.rI��h7j9��h8h9h:hqh<}rJ��(h>]h?]h@]hA]hC]uhEMhFhh1]rK��hOX�Preservation action plans for mitigating preservation risks will be developed
ahead of the need for their application. Protection against obsolescence
requires an understanding of the technological dependencies underlying that
use. While some resources are easily manipulated using relatively standard and
long-lived desktop tools, others require highly specialized applications and
complex workflows.rL��ÖÅrM��}rN��(h6jI��h7jG��ubaubhn)ÅrO��}rP��(h6XÔ��DataONE will rely on existing notification services, such as AONS II (Pearson
2007), CRiB (Ferreira 2006), and PLATO
(http://www.ifs.tuwien.ac.at/dp/plato/intro.html). These services themselves
depend on other external technical registries such as PRONOM. Existing
coverage by these services may be limited to formats and tools geared towards
general applicability in the cultural heritage realm. DataONE will encourage
community effort to expand the scope of these services to understand technical
components specific to scientific disciplines. It is preferable to enhance
these existing frameworks and services so that obsolescence detection can take
place centrally or in a consistent federated manner, rather than in an ad hoc
and parallel manner.h7j9��h8h9h:hqh<}rQ��(h>]h?]h@]hA]hC]uhEM"hFhh1]rR��(hOXv���DataONE will rely on existing notification services, such as AONS II (Pearson
2007), CRiB (Ferreira 2006), and PLATO
(rS��ÖÅrT��}rU��(h6Xv���DataONE will rely on existing notification services, such as AONS II (Pearson
2007), CRiB (Ferreira 2006), and PLATO
(h7jO��ubhw)ÅrV��}rW��(h6X/���http://www.ifs.tuwien.ac.at/dp/plato/intro.htmlrX��h<}rY��(UrefurijX��hA]h@]h>]h?]hC]uh7jO��h1]rZ��hOX/���http://www.ifs.tuwien.ac.at/dp/plato/intro.htmlr[��ÖÅr\��}r]��(h6U�h7jV��ubah:h{ubhOXJ��). These services themselves
depend on other external technical registries such as PRONOM. Existing
coverage by these services may be limited to formats and tools geared towards
general applicability in the cultural heritage realm. DataONE will encourage
community effort to expand the scope of these services to understand technical
components specific to scientific disciplines. It is preferable to enhance
these existing frameworks and services so that obsolescence detection can take
place centrally or in a consistent federated manner, rather than in an ad hoc
and parallel manner.r^��ÖÅr_��}r`��(h6XJ��). These services themselves
depend on other external technical registries such as PRONOM. Existing
coverage by these services may be limited to formats and tools geared towards
general applicability in the cultural heritage realm. DataONE will encourage
community effort to expand the scope of these services to understand technical
components specific to scientific disciplines. It is preferable to enhance
these existing frameworks and services so that obsolescence detection can take
place centrally or in a consistent federated manner, rather than in an ad hoc
and parallel manner.h7jO��ubeubhn)Åra��}rb��(h6X��Responses to obsolescence should be planned in advance of need and captured in
action plans (cf. the Planets template at
http://www.ifs.tuwien.ac.at/dp/plato/docs/plan-template.pdf and the FCLA
template at http://www.fcla.edu/digitalArchive/formatInfo.htm).h7j9��h8h9h:hqh<}rc��(h>]h?]h@]hA]hC]uhEM.hFhh1]rd��(hOXy���Responses to obsolescence should be planned in advance of need and captured in
action plans (cf. the Planets template at
re��ÖÅrf��}rg��(h6Xy���Responses to obsolescence should be planned in advance of need and captured in
action plans (cf. the Planets template at
h7ja��ubhw)Årh��}ri��(h6X;���http://www.ifs.tuwien.ac.at/dp/plato/docs/plan-template.pdfrj��h<}rk��(Urefurijj��hA]h@]h>]h?]hC]uh7ja��h1]rl��hOX;���http://www.ifs.tuwien.ac.at/dp/plato/docs/plan-template.pdfrm��ÖÅrn��}ro��(h6U�h7jh��ubah:h{ubhOX��� and the FCLA
template at rp��ÖÅrq��}rr��(h6X��� and the FCLA
template at h7ja��ubhw)Års��}rt��(h6X1���http://www.fcla.edu/digitalArchive/formatInfo.htmru��h<}rv��(Urefuriju��hA]h@]h>]h?]hC]uh7ja��h1]rw��hOX1���http://www.fcla.edu/digitalArchive/formatInfo.htmrx��ÖÅry��}rz��(h6U�h7js��ubah:h{ubhOX���).r{��ÖÅr|��}r}��(h6X���).h7ja��ubeubeubeubh3)År~��}r��(h6U�h7j"��h8h9h:h;h<}rÄ��(h>]h?]h@]hA]rÅ��h-ahC]rÇ��hauhEM4hFhh1]rÉ��(hH)ÅrÑ��}rÖ��(h6X���3.  Safeguard the guardiansrÜ��h7j~��h8h9h:hLh<}rá��(h>]h?]h@]hA]hC]uhEM4hFhh1]rà��hOX���3.  Safeguard the guardiansrâ��ÖÅrä��}rã��(h6jÜ��h7jÑ��ubaubhn)Årå��}rç��(h6Xn���If the DataONE federated network and its member nodes were to disappear, that
would amount to total data loss.r�h7j~��h8h9h:hqh<}r�(h>]h?]h@]hA]hC]uhEM6hFhh1]r�hOXn���If the DataONE federated network and its member nodes were to disappear, that
would amount to total data loss.rë��ÖÅrí��}rì��(h6jé��h7jå��ubaubh3)Årî��}rï��(h6U�h7j~��h8h9h:h;h<}rñ��(h>]h?]h@]hA]ró��h#ahC]rò��h	auhEM:hFhh1]rô��(hH)Årö��}rõ��(h6X���Safeguard the federationrú��h7jî��h8h9h:hLh<}rù��(h>]h?]h@]hA]hC]uhEM:hFhh1]rû��hOX���Safeguard the federationrü��ÖÅr†��}r°��(h6jú��h7jö��ubaubhn)År¢��}r£��(h6X⁄��By design, the DataONE network provides resiliency against the occasional loss
of nodes. While departure of a MN (or even a CN) from DataONE should not be
frequent, it is also not an unexpected occurrence. It is a feature of networks
that they can sustain such events by redistributing the assets and workload
among the remaining nodes. The arrival of a new node will be less disruptive.
The software infrastructure of the DataONE network, including the Investigator
Toolkit the cyberinfrastructure protocol stacks, are open-source in order to
help it have a life beyond the end of DataONE funding; open-source community
ownership improves not only buy-in and adoption, but also long-term external
support for the DataONE network.r§��h7jî��h8h9h:hqh<}r•��(h>]h?]h@]hA]hC]uhEM<hFhh1]r¶��hOX⁄��By design, the DataONE network provides resiliency against the occasional loss
of nodes. While departure of a MN (or even a CN) from DataONE should not be
frequent, it is also not an unexpected occurrence. It is a feature of networks
that they can sustain such events by redistributing the assets and workload
among the remaining nodes. The arrival of a new node will be less disruptive.
The software infrastructure of the DataONE network, including the Investigator
Toolkit the cyberinfrastructure protocol stacks, are open-source in order to
help it have a life beyond the end of DataONE funding; open-source community
ownership improves not only buy-in and adoption, but also long-term external
support for the DataONE network.rß��ÖÅr®��}r©��(h6j§��h7j¢��ubaubhn)År™��}r´��(h6XD��The Sustainability and Governance Working Group is investigating a range of
issues in protecting the DataONE organization. These include CN and MN
succession planning, an analysis of the costs of preservation, the possibility
of services that offer accreditation for repositories, realtime monitoring,
and external auditing.r¨��h7jî��h8h9h:hqh<}r≠��(h>]h?]h@]hA]hC]uhEMGhFhh1]rÆ��hOXD��The Sustainability and Governance Working Group is investigating a range of
issues in protecting the DataONE organization. These include CN and MN
succession planning, an analysis of the costs of preservation, the possibility
of services that offer accreditation for repositories, realtime monitoring,
and external auditing.rØ��ÖÅr∞��}r±��(h6j¨��h7j™��ubaubeubh3)År≤��}r≥��(h6U�h7j~��h8h9h:h;h<}r¥��(h>]h?]h@]hA]rµ��h.ahC]r∂��hauhEMNhFhh1]r∑��(hH)År∏��}rπ��(h6X���Safeguard the member nodesr∫��h7j≤��h8h9h:hLh<}rª��(h>]h?]h@]hA]hC]uhEMNhFhh1]rº��hOX���Safeguard the member nodesrΩ��ÖÅræ��}rø��(h6j∫��h7j∏��ubaubhn)År¿��}r¡��(h6X˝��Risks to the DataONE federated network are different from risks to individual
nodes. Some risks are reduced by the redundancy and geographic distribution
that the network provides. As for malicious threats that might increase due to
federation, these are addressed by the authentication and authorization
strategies that DataONE is developing with participation of Teragrid security
experts. It is a core requirement of MNs that they conform to DataONE
authentication and authorization policies and protocols.r¬��h7j≤��h8h9h:hqh<}r√��(h>]h?]h@]hA]hC]uhEMPhFhh1]rƒ��hOX˝��Risks to the DataONE federated network are different from risks to individual
nodes. Some risks are reduced by the redundancy and geographic distribution
that the network provides. As for malicious threats that might increase due to
federation, these are addressed by the authentication and authorization
strategies that DataONE is developing with participation of Teragrid security
experts. It is a core requirement of MNs that they conform to DataONE
authentication and authorization policies and protocols.r≈��ÖÅr∆��}r«��(h6j¬��h7j¿��ubaubhn)År»��}r…��(h6XA��Not any data repository can qualify as a DataONE MN. Guidelines call for
organizations to be on a sound technical and financial footing and to adhere
to important standards. The DataONE network is in some respects only as secure
as its weakest link, so local Information Technology (IT) standards at the MNs
are critical.r ��h7j≤��h8h9h:hqh<}rÀ��(h>]h?]h@]hA]hC]uhEMXhFhh1]rÃ��hOXA��Not any data repository can qualify as a DataONE MN. Guidelines call for
organizations to be on a sound technical and financial footing and to adhere
to important standards. The DataONE network is in some respects only as secure
as its weakest link, so local Information Technology (IT) standards at the MNs
are critical.rÕ��ÖÅrŒ��}rœ��(h6j ��h7j»��ubaubhn)År–��}r—��(h6X˛��MNs conform to IT management practices typically found in federal agencies and
higher education, which in turn are based on Payment Card Industry data
security standards (PCI DSS) and the widely adopted ITIL (IT Infrastructure
Library) best practices for such things as physical protection, electronic
perimeter control (firewalls), account management, and event logging for
forensic analysis. Adopters include financial service organizations, and large
technology, pharmaceutical, and manufacturing companies.r“��h7j≤��h8h9h:hqh<}r”��(h>]h?]h@]hA]hC]uhEM^hFhh1]r‘��hOX˛��MNs conform to IT management practices typically found in federal agencies and
higher education, which in turn are based on Payment Card Industry data
security standards (PCI DSS) and the widely adopted ITIL (IT Infrastructure
Library) best practices for such things as physical protection, electronic
perimeter control (firewalls), account management, and event logging for
forensic analysis. Adopters include financial service organizations, and large
technology, pharmaceutical, and manufacturing companies.r’��ÖÅr÷��}r◊��(h6j“��h7j–��ubaubhn)Årÿ��}rŸ��(h6XÒ���These standards call for common-sense practices such as periodic ‚Äúmedia
refresh”, which is the copying of data from older to newer physical devices
and media with the aim of avoiding errors due to media degradation and vendor
de-support.r⁄��h7j≤��h8h9h:hqh<}r€��(h>]h?]h@]hA]hC]uhEMfhFhh1]r‹��hOXÒ���These standards call for common-sense practices such as periodic ‚Äúmedia
refresh”, which is the copying of data from older to newer physical devices
and media with the aim of avoiding errors due to media degradation and vendor
de-support.r›��ÖÅrfi��}rfl��(h6j⁄��h7jÿ��ubaubeubeubeubeubah6U�Utransformerr‡��NU
footnote_refsr·��}r‚��Urefnamesr„��}r‰��X���dataone document library]rÂ��hxasUsymbol_footnotesrÊ��]rÁ��Uautofootnote_refsrË��]rÈ��Usymbol_footnote_refsrÍ��]rÎ��U	citationsrÏ��]rÌ��hFhUcurrent_linerÓ��NUtransform_messagesrÔ��]r��cdocutils.nodes
system_message
rÒ��)ÅrÚ��}rÛ��(h6U�h<}rÙ��(h>]UlevelKhA]h@]Usourceh9h?]hC]UlineKUtypeUINFOrı��uh1]rˆ��hn)År˜��}r¯��(h6U�h<}r˘��(h>]h?]h@]hA]hC]uh7jÚ��h1]r˙��hOX-���Hyperlink target "index-0" is not referenced.r˚��ÖÅr¸��}r˝��(h6U�h7j˜��ubah:hqubah:Usystem_messager˛��ubaUreporterrˇ��NUid_startr���KU
autofootnotesr��]r��U
citation_refsr��}r��Uindirect_targetsr��]r��Usettingsr��(cdocutils.frontend
Values
r��or	��}r
��(Ufootnote_backlinksr��KUrecord_dependenciesr��NUrfc_base_urlr
��Uhttps://tools.ietf.org/html/r��U	tracebackr��àUpep_referencesr��NUstrip_commentsr��NU
toc_backlinksr��Uentryr��U
language_coder��Uenr��U	datestampr��NUreport_levelr��KU_destinationr��NU
halt_levelr��KU
strip_classesr��NhLNUerror_encoding_error_handlerr��Ubackslashreplacer��Udebugr��NUembed_stylesheetr��âUoutput_encoding_error_handlerr��Ustrictr ��U
sectnum_xformr!��KUdump_transformsr"��NU
docinfo_xformr#��KUwarning_streamr$��NUpep_file_url_templater%��Upep-%04dr&��Uexit_status_levelr'��KUconfigr(��NUstrict_visitorr)��NUcloak_email_addressesr*��àUtrim_footnote_reference_spacer+��âUenvr,��NUdump_pseudo_xmlr-��NUexpose_internalsr.��NUsectsubtitle_xformr/��âUsource_linkr0��NUrfc_referencesr1��NUoutput_encodingr2��Uutf-8r3��U
source_urlr4��NUinput_encodingr5��U	utf-8-sigr6��U_disable_configr7��NU	id_prefixr8��U�U	tab_widthr9��KUerror_encodingr:��UUTF-8r;��U_sourcer<��h9Ugettext_compactr=��àU	generatorr>��NUdump_internalsr?��NUsmart_quotesr@��âUpep_base_urlrA��U https://www.python.org/dev/peps/rB��Usyntax_highlightrC��UlongrD��Uinput_encoding_error_handlerrE��j ��Uauto_id_prefixrF��UidrG��Udoctitle_xformrH��âUstrip_elements_with_classesrI��NU
_config_filesrJ��]rK��Ufile_insertion_enabledrL��àUraw_enabledrM��KU
dump_settingsrN��NubUsymbol_footnote_startrO��K�UidsrP��}rQ��(h h—h/jd��h*h4h"jì��h,j9��h0jÎ��h!jj��h#jî��h'j"��h)hãh-j~��h+jÚ��h.j≤��h[heh%j8��h$j��h&jN��h(hÖuUsubstitution_namesrR��}rS��h:hFh<}rT��(h>]hA]h@]Usourceh9h?]hC]uU	footnotesrU��]rV��UrefidsrW��}rX��h[]rY��h_asub.