Long pages
Showing below up to 50 results starting with #1.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- (hist) CLOCKSS: Threats and Mitigations [35,990 bytes]
- (hist) CLOCKSS: Ingest Pipeline [28,307 bytes]
- (hist) CLOCKSS: Box Operations [25,176 bytes]
- (hist) Definition of AIP [24,328 bytes]
- (hist) LOCKSS: Software Development Process [20,160 bytes]
- (hist) CLOCKSS: Extracting Triggered Content [20,101 bytes]
- (hist) LOCKSS: Polling and Repair Protocol [19,561 bytes]
- (hist) LOCKSS: Extracting Bibliographic Metadata [18,193 bytes]
- (hist) Definition of SIP [16,581 bytes]
- (hist) LOCKSS: Format Migration [14,701 bytes]
- (hist) CLOCKSS: Logging and Records [13,619 bytes]
- (hist) 4) Digital Object Management [12,313 bytes]
- (hist) LOCKSS: Basic Concepts [10,245 bytes]
- (hist) CLOCKSS: Designated Community [9,165 bytes]
- (hist) LOCKSS: Property Server Operations [7,850 bytes]
- (hist) 5) Infrastructure and Security Risk Management [6,351 bytes]
- (hist) CLOCKSS: Preservation Strategy [6,261 bytes]
- (hist) Definition of DIP [6,110 bytes]
- (hist) LOCKSS: Metadata Database [5,923 bytes]
- (hist) 3) Organizational Infrastructure [5,608 bytes]
- (hist) CLOCKSS: Mandatory Responsibilities [5,163 bytes]
- (hist) Main Page [4,923 bytes]
- (hist) CLOCKSS: Governance and Organization [4,760 bytes]
- (hist) CLOCKSS: Business Plan Overview [4,130 bytes]
- (hist) 4.4.2.2 Demonstrate that any actions taken on AIPs were compliant with the specification of those actions [2,635 bytes]
- (hist) CLOCKSS: Hardware and Software Inventory [2,542 bytes]
- (hist) CLOCKSS: Budget and Planning Process [2,463 bytes]
- (hist) 4.2.4.1.5 System of identifiers is adequate now and in the future [2,093 bytes]
- (hist) 4.2.4 Convention that generates persistent, unique identifiers for AIPs [2,063 bytes]
- (hist) CLOCKSS: Business History [2,015 bytes]
- (hist) 4.2.1.1 Identify which definition applies to which AIP [1,954 bytes]
- (hist) 4.1.6 Obtain sufficient control over digital objects [1,749 bytes]
- (hist) 3.3.3 Documented history of changes [1,683 bytes]
- (hist) 4.5.1 Specify minimum information requirements to enable the Designated Community to discover and identify material [1,649 bytes]
- (hist) 4.2.1.2 Definition of each AIP [1,633 bytes]
- (hist) CLOCKSS: Access Policy [1,597 bytes]
- (hist) 4.2.5.1 Tools or methods to identify the file types of all objects [1,533 bytes]
- (hist) 4.3.3 Mechanisms to change preservation plans as a result of its monitoring activities [1,500 bytes]
- (hist) 4.3.4 Provide evidence of the effectiveness of its preservation activities [1,457 bytes]
- (hist) 5.1.1.1.1 Hardware technologies appropriate to the services it provides to its designated communities [1,412 bytes]
- (hist) 3.3.6 Self-assessment and external certification [1,380 bytes]
- (hist) 5.1.1.1.2 Procedures in place to monitor and receive notifications when hardware technology changes are needed [1,352 bytes]
- (hist) 3.2.1 Identified duties and appointed staff [1,342 bytes]
- (hist) 3.3.4 Commit to transparency [1,333 bytes]
- (hist) 5.1.1.1.5 Software technologies appropriate to the services it provides to its designated communities [1,314 bytes]
- (hist) 4.1.3 Recognition and parsing of SIPs [1,293 bytes]
- (hist) 5.2.3 Staff shall have delineated roles, responsibilities, and authorizations related to implementing changes [1,282 bytes]
- (hist) 5.1.1.1.8 Procedures, commitment and funding to replace software when evaluation indicates the need to do so [1,252 bytes]
- (hist) 5.1.1.2 Adequate hardware and software support for backup functionality sufficient for preserving the repository content and tracking repository functions [1,221 bytes]
- (hist) 5.1.1.6.2 Process for testing and evaluating the effect of changes to the repository's critical processes [1,169 bytes]