Javascript must be enabled to continue!
Surely, We’ll Need Backups
View through CrossRef
AbstractFor 20 years the U. S. Newspaper and Brittle Books Programs focused national resources on a singular approach to preserving acidic paper in research libraries—converting printed “information” to microfilm. In many cases, the original historical material was discarded in the process. This method failed to address the root problem that could have been solved more effectively and more economically through preventive conservation. Such conservation was ignored because an ulterior motive to the brittle books “crisis” was to establish a national digital library. A serious consequence arising from this subterfuge is that today mid-sized research libraries are not committed to—and perhaps fail to comprehend the importance of—preserving their general collections. Collectively these diverse, paper-based collections represent a huge swath of the nation’s historical record. Falsely believing digital media will make paper obsolete, and motivated by a need to create space in libraries, today’s vigorous weeding for non-rare, paper-based general collections threatens to destroy evidence that will be required for research and future digitization projects. These materials will be needed as backups to accurately regenerate screen copies; as master copies to augment, enhance, or correct faulty screen copies; and, as authentication to verify original production techniques and determine provenance. Without careful coordination and item-level verification, today’s isolated weeding practices could eviscerate American general collections with devastating results for future scholarship, repeating the mistakes of the U. S. Newspaper and Brittle Books Programs.
Title: Surely, We’ll Need Backups
Description:
AbstractFor 20 years the U.
S.
Newspaper and Brittle Books Programs focused national resources on a singular approach to preserving acidic paper in research libraries—converting printed “information” to microfilm.
In many cases, the original historical material was discarded in the process.
This method failed to address the root problem that could have been solved more effectively and more economically through preventive conservation.
Such conservation was ignored because an ulterior motive to the brittle books “crisis” was to establish a national digital library.
A serious consequence arising from this subterfuge is that today mid-sized research libraries are not committed to—and perhaps fail to comprehend the importance of—preserving their general collections.
Collectively these diverse, paper-based collections represent a huge swath of the nation’s historical record.
Falsely believing digital media will make paper obsolete, and motivated by a need to create space in libraries, today’s vigorous weeding for non-rare, paper-based general collections threatens to destroy evidence that will be required for research and future digitization projects.
These materials will be needed as backups to accurately regenerate screen copies; as master copies to augment, enhance, or correct faulty screen copies; and, as authentication to verify original production techniques and determine provenance.
Without careful coordination and item-level verification, today’s isolated weeding practices could eviscerate American general collections with devastating results for future scholarship, repeating the mistakes of the U.
S.
Newspaper and Brittle Books Programs.
Related Results
Transaction log based application error recovery and point in-time query
Transaction log based application error recovery and point in-time query
Database backups have traditionally been used as the primary mechanism to recover from hardware and user errors. High availability solutions maintain redundant copies of data that ...
Econnoitering Data Protection and Recovery Strategies in the Cyber Environment: A Thematic Analysis
Econnoitering Data Protection and Recovery Strategies in the Cyber Environment: A Thematic Analysis
This paper discusses the performance and reliability of different strategies for database backup and recovery within a controlled environment, focusing on the comparison between fu...
Determinants of unmet need for contraceptive method among young married women in Ethiopia: Multilevel analysis of Ethiopia Demographic and Health Survey 2016
Determinants of unmet need for contraceptive method among young married women in Ethiopia: Multilevel analysis of Ethiopia Demographic and Health Survey 2016
Background
The notion of unmet need for family planning indicates the gap between women’s contraceptive practice and their reproductive intention. Although universal access to sexu...
Simulating Cloud Environment for HIS Backup using Secret Sharing
Simulating Cloud Environment for HIS Backup using Secret Sharing
In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop busi...
Meta Analytic Review on Recent Advancements of Class AB Power Amplifiers
Meta Analytic Review on Recent Advancements of Class AB Power Amplifiers
The ever-increasing complexity and prohibitive fabrication costs associated with VLSI circuits necessitate the development of techniques that prioritize low power consumption and h...
Upgrading Readiness: Successes and Improvements of the Mobile Parts Hopital
Upgrading Readiness: Successes and Improvements of the Mobile Parts Hopital
<div class="htmlview paragraph">The Mobile Parts Hospital (MPH) helps the Army with logistical backups in maintaining sustainment and readiness at the battlefield front. Now ...
Crisis management: a survey of property development firms
Crisis management: a survey of property development firms
A study of property developers in Singapore showed that their crisis management capabilities are influenced by their size and opinion. Developers generally concentrate on preparing...
Non-equidistant checkpointing and quantitative resilience modeling
Non-equidistant checkpointing and quantitative resilience modeling
Software intensive systems rely on checkpointing to prevent loss of computation, by per-forming periodic backups. Non-equidistant checkpointing strategies have been proposed for sp...

