Adapting Existing Technologies for Digitally Archiving Personal Lives Digital Forensics, Ancestral Computing, and Evolutionary Perspectives and Tools

The adoption of existing technologies for digital curation, most especially digital capture, is outlined in the context of personal digital archives and the Digital Manuscripts Project at the British Library. Technologies derived from computer forensics, data conversion and classic computing, and evolutionary computing are considered. The practical imperative of moving information to modern and fresh media as soon as possible is highlighted, as is the need to retain the potential for researchers of the future to experience the original look and feel of personal digital objects. The importance of not relying on any single technology is also emphasised.

[1]  Dave Kleiman,et al.  CD and DVD Forensics , 2006 .

[2]  M. Spencer,et al.  Phylogenetics of artificial manuscripts. , 2004, Journal of theoretical biology.

[3]  Hans-Michael Müller,et al.  Textpresso: An Ontology-Based Information Retrieval and Extraction System for Biological Literature , 2004, PLoS biology.

[4]  A. J. Sammes,et al.  Forensic Computing (Practitioner Series) , 2007 .

[5]  William H. Allen Computer Forensics , 2005, IEEE Secur. Priv..

[6]  Enrique V. Carrera,et al.  Digital genome mapping: ad-vanced binary malware analysis , 2004 .

[7]  Michael Krauthammer,et al.  GENIES: a natural-language processing system for the extraction of molecular pathways from journal articles , 2001, ISMB.

[8]  Pak Chung Wong,et al.  Organic data memory using the DNA approach , 2003, CACM.

[9]  Timothy P. Kosiba Handbook of Computer Crime Investigation: Forensic Tools and Technology , 2003 .

[10]  Brian D. Carrier,et al.  File System Forensic Analysis , 2005 .

[11]  Eoghan Casey,et al.  Handbook of Computer Crime Investigation: Forensic Tools and Technology , 2001 .

[12]  Konstantin Tretyakov Computational Text Analysis for Functional Genomics and Bioinformatics Notes , 2006 .

[13]  Günter Born File formats handbook , 1995 .

[14]  Tony Sammes,et al.  Forensic computing: a practitioner's guide , 2000 .

[15]  Todd Holden,et al.  A flexible computational framework for detecting, characterizing, and interpreting statistical patterns of epistasis in genetic studies of human disease susceptibility. , 2006, Journal of theoretical biology.

[16]  A. Summers,et al.  The W.D. Hamilton Archive at the British Library , 2001 .

[17]  Christopher J. Howe,et al.  The phylogeny of The Canterbury Tales , 1998, Nature.

[18]  Jeff Walden File formats for popular PC software: A programmer's reference , 1986 .

[19]  Bram Lohman,et al.  Emulation for digital preservation in practice: the results , 2007, iPRES.

[20]  Cynthia A. Phillips,et al.  Constructing Computer Virus Phylogenies , 1996, CPM.

[21]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .

[22]  Michael Krauthammer,et al.  Of truth and pathways: chasing bits of information through myriads of articles , 2002, ISMB.

[23]  C Bancroft,et al.  Long-Term Storage of Information in DNA , 2001, Science.

[24]  Tom Swan Inside Windows file formats , 1993 .