Neutron Activation Analysis and Provenance Research in Archaeology

Total Page:16

File Type:pdf, Size:1020Kb

Neutron Activation Analysis and Provenance Research in Archaeology Measurement Science and Technology Related content - Physical studies of archaeological Neutron activation analysis and provenance materials Z Goffer research in archaeology - PIXE studies of turquoise artefacts from Salado Platform Mound sites inArizona Jangsuk Kim, Arleyn W Simon, Vincent To cite this article: Michael D Glascock and Hector Neff 2003 Meas. Sci. Technol. 14 1516 Ripoche et al. - Uses of neutrons in engineering and technology J. Walker View the article online for updates and enhancements. Recent citations - Destructive and nondestructive geochemical analysis of vesicular basalt from bedrock outcrops in the Salt-Gila Basin, Arizona: Evaluating the potential of nondestructive portable X-ray fluorescence spectroscopy for archaeological provenance analyses Craig Fertelmes and Michael D. Glascock - Late Pleistocene Lithic Procurement and Geochemical Characterization of the Cerro Kaskio Obsidian Source in South-western Bolivia J. M. Capriles et al - Iron oxide geochemistry in the Great Lakes Region (North America): Implications for ochre provenance studies Brandi Lee MacDonald et al This content was downloaded from IP address 128.194.172.218 on 10/07/2018 at 17:46 INSTITUTE OF PHYSICS PUBLISHING MEASUREMENT SCIENCE AND TECHNOLOGY Meas.Sci.Technol. 14 (2003) 1516–1526 PII: S0957-0233(03)56714-5 Neutron activation analysis and provenance research in archaeology Michael D Glascock1,3 and Hector Neff2 1 Research Reactor Center, University of Missouri, Columbia, MO 65211, USA 2 Department of Anthropology, California State University, Long Beach, CA 90840, USA E-mail: [email protected] and [email protected] Received 27 November 2002, accepted for publication 7 April 2003 Published 29 July 2003 Online at stacks.iop.org/MST/14/1516 Abstract Neutron activation analysis is a powerful quantitative analytical technique with application in a broad range of disciplines such as agriculture, archaeology, geochemistry, health and human nutrition, environmental monitoring and semiconductor technology. Due to its excellent sensitivity, great accuracy and precision, and versatility, the technique is a suitable method for analysing many different types of samples. Archaeologists, in particular, have made extensive use of neutron activation analysis for the purpose of characterizing archaeological materials and determining their provenance. This paper presents a brief history of the technique and its application to archaeology, describes the physics behind the analytical method, and explains how the method is generally employed to determine the sources of archaeological materials. Keywords: neutron activation analysis, nuclear reactions, cross-sections, thermal neutrons, gamma-ray spectra, provenance, ceramics, clays, obsidian, chert, multivariate statistics 1. Introduction mass spectrometry (ICP-MS) on liquid samples, NAA offers sensitivities that are superior to those possible by all other The application of chemical analytical methods to archaeo- analytical methods. Moreover, the accuracy and precision logical materials in support of provenance research has grown of the technique are such that NAA is still one of the rapidly over the past few decades. Provenance research en- primary methods employed by the National Institute of tails the use of compositional profiles of artefacts and source Standards and Technology to certify the concentrations of materials to trace individual artefacts from their find spot to elements in standard reference materials. Applications of their place of origin. The information obtained is used by NAA are by no means limited to archaeology, but include a archaeologists to investigate questions regarding the location broad range of disciplines such as agriculture, geochemistry, of prehistoric production areas, the identification of routes of health and human nutrition, environmental monitoring and trade and exchange of raw materials and artefacts, and the mo- semiconductors. bility patterns of prehistoric peoples. Although a number of The NAA technique involves the irradiation of a sample techniques have been employed to characterize archaeologi- by neutrons to make the sample radioactive. After irradiation, cal materials, the analytical method with one of the longest the gamma rays emitted from the radioactive sample are and most successful histories of application for provenance measured to determine the amounts of different elements research has been neutron activation analysis (NAA). present in the sample. As a result, NAA has a number Neutron activation analysis isasensitive technique useful of advantages over most other analytical methods when for qualitative and quantitative multi-element analysis of investigating archaeological specimens. First, it is nearly free major, minor, and trace elements present in many sample of any matrix interference effects because the vast majority matrices. With the exception of inductively coupled plasma- of archaeological samples are transparent to the probe, the neutron, and the emitted analytical signal, the gamma ray. 3 http://www.missouri.edu/∼glascock/archlab.htm Second, because NAA can be applied instrumentally (without 0957-0233/03/091516+11$30.00 © 2003 IOP Publishing Ltd Printed in the UK 1516 Neutron activation analysis and provenance research in archaeology sample digestion or dissolution), there is little opportunity for Perlman and Asaro (1969) provided a description of the reagent or laboratory contamination. Third, the preparation standard-comparator method of NAA as applied to provenance of samples from most matrices (especially geological sample determination at the Lawrence Berkeley Laboratory (LBL). types) for analysis by NAA is extremely easy—in most Archaeologists turned more frequently to NAA during the instances a portion of the sample need only be weighed and 1970s and 1980s to determine the sources of pottery, obsidian, place in an appropriate container. In contrast, the difficulty chertand other materials (Hughes et al 1991, Kuleff and of achieving complete digestion of geological samples for Djingova 1990, Neff and Glascock 1995). The NAA analysis by ICP-MS can be challenging and the labour costs are laboratories at BNL and LBL were joined by laboratories at much greater. Finally, although nuclear reactors are becoming the University of Michigan, University of Toronto, Hebrew less available while ICP-MS instruments are becoming University, National Institute of Standards and Technology, more widely available, many reactors offer competitive low- University of Missouri, and a number of smaller university cost analyses on projects involving collaborative academic research reactors. By the early 1990s, NAA was regarded as research. the technique of choice for provenance research (Bishop et al This paper presents a brief history of NAA and its 1990, Gilmore 1991). application to archaeology, describes the physics behind the Although the late 1980s and 1990s, saw reactor NAA technique, and explains how the method is generally decommissioning and retirements of key personnel which employed to determine the provenance of archaeological concluded a number of the major programmes (i.e. BNL, materials. The finalsection presents a few examples of NAA LBL, the University of Toronto and Hebrew University), the applied to recent archaeological studies. demand for NAA has not decreased. Fortunately, although there are fewer places to perform NAA today, the remaining 2. A brief history programmes have been able to increase their capacity such that access to NAA is still readily available. The notion that nuclear reactions might be used for quantitative analysis first occurred to Georg Hevesy and Hilde Levy in 3. Theory 1936 when they exposed rare-earth salts to a naturally emitting Ra(Be) neutron source (Ehmann and Vance 1991). They found 3.1. Nuclearreactions that many of the rare-earth elements became highly radioactive Nuclear reactions occupy a central role in all methods of upon bombardment with neutrons,and the radiation emitted activation analysis. In a nuclear reaction, an incident particle from the different elements decreased according to different (e.g. neutron, proton or alpha particle) interacts with a target timeconstants. From this discovery, they recognized the nucleus either by scattering or by absorption. The diagram potential for identifying elements present in mixtures of shown in figure 1 illustrates a typical nuclear reaction involving samples through measurement of different radiations and half- absorption of the incident particle followed by the emission lives of the radioactive elements. of both particles and prompt gamma rays and by production The 1950s and 1960s saw the construction of nuclear of a radioactive nucleus. If the incident particle is a thermal reactors with neutron fluxes sufficient to allow sensitivities for neutron, a prompt particle is rarely emitted. If the reaction NAA at levels of interest to solving real analytical problems. involves an incident fast neutron or a charged particle, a prompt In addition, there were improvements in the sophistication particle is always emitted. In either case, prompt gamma rays and sensitivity of instrumentation used to make nuclear will always occur. The reaction can also be described by the measurements, and hundreds of experiments were performed expression to measure the basic nuclear parameters (i.e. reaction cross- a + A → [X] → b + B + Q (1) sections, half-lives, gamma-ray abundances and branching ratios) associated with nuclear reactions. or in shorthand notation A(a, b)B.Wherethesymbol
Recommended publications
  • Digital Preservation Workflows for Museum Imaging Environments
    The 11th International Symposium on Virtual Reality, Archaeology and Cultural Heritage VAST (2010) A. Artusi, M. Joly, D. Pitzalis, G. Lucet, and A. Ribes (Editors) Digital preservation workflows for museum imaging environments Michael Ashley1 1 Cultural Heritage Imaging, San Francisco, California, USA From: Principles and Practices of Robust, Photography-based Digital Imaging Techniques for Museums. Contributors: Mark Mudge, Carla Schroer, Graeme Earl, Kirk Martinez, Hembo Pagi, Corey Toler-Franklin, Szymon Rusinkiewicz, Gianpaolo Palma, Melvin Wachowiak, Michael Ashley, Neffra Matthews, Tommy Noble, Matteo Dellepiane. Edited by Mark Mudge and Carla Schroer, Cultural Heritage Imaging. The 11th International Symposium on Virtual Reality, Archaeology and Cultural Heritage VAST (2010) A. Artusi, M. Joly, D. Pitzalis, G. Lucet, and A. Ribes (Editors) This is a pre-print copy of a paper that is currently under review. Please respect the intellectual property of the authors and the efforts of the publishers and reviewers until its publication. If you find any errors that need modification please contact the author at [email protected]. Meanwhile this pdf is distributed to interested readers under a Creative Commons 3.0 license. M. Ashley / Digital Preservation Workflows For Museum Imaging Environments Digital preservation workflows for museum imaging environments Michael Ashley1 1 Cultural Heritage Imaging, San Francisco, California, USA Abstract We discuss and demonstrate practical digital preservation frameworks that protect images throughout the entire production life-cycle. Using off the shelf and open source software coupled with a basic understanding of metadata, it is possible to produce and manage high value digital representations of physical objects that are born archive- ready and long-term sustainable.
    [Show full text]
  • Introducticn Tc Ccnservoticn
    introducticntc ccnservoticn UNITED NATTONSEDUCATIONA],, SCIEIilIIFTC AND CULTIJRALOROANIZATTOII AN INIRODUCTION TO CONSERYATIOI{ OF CULTURAT PROPMTY by Berr:ar"d M. Feilden Director of the Internatlonal Centre for the Preservatlon and Restoratlon of Cultural Property, Rome Aprll, L979 (cc-ig/ws/ttt+) - CONTENTS Page Preface 2 Acknowledgements Introduction 3 Chapter* I Introductory Concepts 6 Chapter II Cultural Property - Agents of Deterioration and Loss . 11 Chapter III The Principles of Conservation 21 Chapter IV The Conservation of Movable Property - Museums and Conservation . 29 Chapter V The Conservation of Historic Buildings and Urban Conservation 36 Conclusions ............... kk Appendix 1 Component Materials of Cultural Property . kj Appendix 2 Access of Water 53 Appendix 3 Intergovernmental and Non-Governmental International Agencies for Conservation 55 Appendix k The Conservator/Restorer: A Definition of the Profession .................. 6? Glossary 71 Selected Bibliography , 71*. AUTHOR'S PREFACE Some may say that the attempt to Introduce the whole subject of Conservation of Cultural Propety Is too ambitious, but actually someone has to undertake this task and it fell to my lot as Director of the International Centre for the Study of the Preservation and Restoration of Cxiltural Property (ICCROM). An introduction to conservation such as this has difficulties in striking the right balance between all the disciplines involved. The writer is an architect and, therefore, a generalist having contact with both the arts and sciences. In such a rapidly developing field as conservation no written statement can be regarded as definite. This booklet should only be taken as a basis for further discussions. ACKNOWLEDGEMENTS In writing anything with such a wide scope as this booklet, any author needs help and constructive comments.
    [Show full text]
  • Selection in Web Archives: the Value of Archival Best Practices
    WITTENBERG: SELECTION IN WEB ARCHIVES Selection in Web Archives: The Value of Archival Best Practices Jamie Wittenberg, University of Illinois at Urbana-Champaign, United States of America Abstract: The abundance of valuable material available online has mobilized the development of preservation initiatives at collecting institutions that aim to capture and contextualize web content. Web archiving selection criteria are driven by the limitations inherent in harvesting technologies. Observing core archival principles like provenance and original order when establishing collection development policies for web content will help to ensure that archives continue to assure the authenticity of the materials they steward. Keywords: Web Archives; Archival Theory; Digital Libraries; Internet Content; Selection and Appraisal Introduction The abundance of valuable material available online has mobilized the development of preservation initiatives at collecting institutions that aim to capture and contextualize web content. Methodologies for web collection practices are institution and collection-specific. Among institutions charged with preserving cultural heritage, web archiving has become commonplace. However, the disparity between institutional selection and appraisal criteria reveals the absence of standardization for web archive establishment. The Australian web archive, for example, accessions content that it evaluates as having long-term research value. The Library of Congress web archive, represented by its Minerva team, established a collection
    [Show full text]
  • 2016 Technical Guidelines for Digitizing Cultural Heritage Materials
    September 2016 Technical Guidelines for Digitizing Cultural Heritage Materials Creation of Raster Image Files i Document Information Title Editor Technical Guidelines for Digitizing Cultural Heritage Materials: Thomas Rieger Creation of Raster Image Files Document Type Technical Guidelines Publication Date September 2016 Source Documents Title Editors Technical Guidelines for Digitizing Cultural Heritage Materials: Don Williams and Michael Creation of Raster Image Master Files Stelmach http://www.digitizationguidelines.gov/guidelines/FADGI_Still_Image- Tech_Guidelines_2010-08-24.pdf Document Type Technical Guidelines Publication Date August 2010 Title Author s Technical Guidelines for Digitizing Archival Records for Electronic Steven Puglia, Jeffrey Reed, and Access: Creation of Production Master Files – Raster Images Erin Rhodes http://www.archives.gov/preservation/technical/guidelines.pdf U.S. National Archives and Records Administration Document Type Technical Guidelines Publication Date June 2004 This work is available for worldwide use and reuse under CC0 1.0 Universal. ii Table of Contents INTRODUCTION ........................................................................................................................................... 7 SCOPE .......................................................................................................................................................... 7 THE FADGI STAR SYSTEM .......................................................................................................................
    [Show full text]
  • Art Deaccessioning Policy
    Deaccessioning Policy Document No. CUR 4.0 – Deaccessioning Policy Page 1 Approved: December 2020 Approved by: National Gallery of Australia Council next review due: December 2022 Summary Name of Policy Description of Policy Deaccessioning Policy Policy applies to ☒ NGA wide ☐ Specific (eg. Department) Policy Status ☐ New policy ☒ Revision of Existing Policy (previously Art Acquisition Policy) Approval Authority Director Responsible Officer Assistant Director, Artistic Programs Contact area Artistic Programs Date of Policy Review* October 2022 Related Policies, Procedures, National Gallery Act 1975 Guidelines and Local Protocols Public Governance, Performance and Accountability Act 2013 Council Instructions including Financial Delegations Aboriginal and Torres Strait Islander Cultural Rights and Engagement Policy Due Diligence and Provenance Policy Acquisitions Policy Research Library Collection Development Policy Research Archive Acquisition Policy The Copyright Act 1968 The Privacy Act 1988 Privacy Policy Australian Best Practice Guide to Collecting Cultural Material 2015 Collections Law: Legal issues for Australian Archives, Galleries, Libraries and Museums *Unless otherwise indicated, this policy will still apply beyond the review date. Approvals Position Name Endorsed Date Assistant Director Natasha Bullock Yes Director Nick Mitzevich Yes Council Ryan Stokes Yes Document No. CUR 4.0 – Deaccessioning Policy Page 2 Approved: December 2020 Approved by: National Gallery of Australia Council next review due: December 2022 Table of contents
    [Show full text]
  • Provenance in Digital Collections, Margo Seltzer
    Provenance in Digital Collections Margo Seltzer Harvard School of Engineering and Applied Sciences September 20, 2012 Provenance: Special Metadata • From the French word for “source” or “origin” • The complete history or lineage of a object • In the art world, provenance documents the chain of ownership of an artifact. • In the digital world, provenance records: – The process that created an artifact – The transformations applied to an artifact – The human and computational agents that operated upon an artifact – Open question: sufficient information to reproduce the artifact? Designing Storage Architectures: 9/20/12 2 Example: Art Designing Storage Architectures: 9/20/12 3 Example: Art with Provenance Provenance < 1662 Simon de Vos, Antwerp (possibly) by 1662 Guilliam I Forchoudt, Antwerp (possibly) to 1747 Jacques de Roore, The Hague 1747 - 1771 Anthonis de Groot and Stephanus de Groot, The Hague 1771 - ? Abelsz to 1779 Jacques Clemens to 1798 Supertini and Platina, Brussels to 1814 Pauwels, Brussels to 1822 Robert Saint-Victor, Paris 1822 - ? Roux to 1924 Marquise d'Aoust,&nbspFrance 1924 Galerie Georges Petit, Paris to 1940 Federico Gentili di Giuseppe,&nbspdied 1940, Paris 1940 - 1950 Mrs. A. Salem, Boston (Mr. Gentili di Giuseppe's daughter ) 1950 - 1954 Frederick Mont and Newhouse Galleries, New York 1954 - 1961 Samuel H. Kress Foundation, New York 12/09/1961 Seattle Art Museum Designing Storage Architectures: 9/20/12 4 Example: Data with Provenance Meleana e From the Library of Congress National Jukebox From the page: Musical Group: Irene West Royal Hawaiians Label Name/Number: Victo 17864 Matrix Number/Take Number: B‐15530/2 Recording Date: 12/19/1914 Location: Camden, NJ Size: 10” From http://www.loc.gov/jukebox/about/making‐the‐jukebox: “A slip that provides the elements of the filename of the digital copy is inserted in the sleeve of each selected disc: institution/collection code, label name, label number, disc copy, matrix number, and take number are all noted on the slip.
    [Show full text]
  • Provenance: What Is It and Why Do We Care?
    Provenance: What is it and why do we care? What is it? PROVENANCE: “The pedigree of a book’s previous ownership. This may be clearly marked by the owner’s name, arms, bookplate, or evidence in the book itself; or it may have to be pieced together from such outside sources as auction records or booksellers’ catalogues.” --John Carter, ABC for Book Collectors (Oak Knoll Press, 1998) Why do we care? “Recorded ownership in a particular book at a particular time can tell us something about both owner and text; it can allow us to make deductions about the tastes, intellectual abilities or financial means of the owner, and it can show the reception of the text at different periods of history. If the book is annotated, we can see further into that world of private relationship between reader and text, and the impact of books in their contemporary contexts.” --David Pearson, Books as History (British Library, 2008) What are the common types of provenance? “There are numerous ways in which people have left traces of their ownership in books; they have written their names on the title page, they have pasted in printed bookplates, they have put their names or arms on the binding, they have used codes and mottos.” --David Pearson, Books as History (British Library, 2008) How do we explore? Each copy of a particular title has its own history. If a book, such as Thomas Paine’s Common Sense, is published in 1776, then each surviving individual copy of that work has its own 240- plus year history.
    [Show full text]
  • Curator: Provenance Management for Modern Distributed Systems
    Curator: Provenance Management for Modern Distributed Systems∗† Warren Smith Thomas Moyer Charles Munson The Weather Company, an IBM MIT Lincoln Laboratory Business UNC Charlotte Secure Resilient Systems and Andover, MA, USA Software and Information Systems Technology Charlotte, NC, USA Lexington, MA, USA Abstract systems have focused on the collection and usage of prove- Data provenance is a valuable tool for protecting and trou- nance data, often with the analysis occurring on the same bleshooting distributed systems. Careful design of the prove- system that collected the provenance. While this works well nance components reduces the impact on the design, im- for applications running on a single host, it quickly breaks plementation, and operation of the distributed system. In down on distributed systems. this paper, we present Curator, a provenance management In systems that have considered provenance for distributed toolkit that can be easily integrated with microservice-based systems, the proposed architectures treat provenance as systems and other modern distributed systems. This paper unique from other sources of metadata, such as log and au- describes the design of Curator and discusses how we have dit data. This requires users of provenance to build entire used Curator to add provenance to distributed systems. We infrastructures to manage the provenance data, increasing find that our approach results in no changes to the design the complexity of the application and system. This increased of these distributed systems and minimal additional code complexity can also increase the attack surface of the appli- and dependencies to manage. In addition, Curator uses the cation, negating the security benefits of adding provenance same scalable infrastructure as the distributed system and to a system.
    [Show full text]
  • Archaeology 1
    Archaeology 1 ARCH 450 - Field Studies in Archaeology (3 Hours) ARCHAEOLOGY This course is an excavation, field research, or museum experience. The student will gain experience with archaeological techniques for survey, Faculty: Fisher, Director; Borchard, Camp, London, Thoburn, and excavation, analysis, conservation, classification and recording on an Throckmorton. approved excavation or in a museum or laboratory setting. A minimum of four weeks or 130 hours of participation in an excavation, field school, or Archaeology is the study of the human past through material remains. museum program is required. If a student participates during the summer In 21st century practice, archaeology is truly multidisciplinary, with in an excavation or field school which is not part of the Randolph-Macon contributions from history, art history, biology, chemistry, geology, College summer session, the student should take ARCH 450 in the next anthropology, religious studies, epigraphy, and many other fields. The term of residency at Randolph-Macon College. Permission of instructor scope of the human past studied by the archaeologist ranges from required. Offered as needed. C21:CS,EL. the earliest development of humans to very recent times. Modern Cross-list: CLAS 450 archaeological research is directed toward understanding how the past occurred, why things changed in the past, and how the past relates to our ARCH 451 - Internship in Archaeology (3 Hours) times. This course is an excavation, field research, or museum experience. The student will gain experience with archaeological techniques for survey, With a broad range of disciplines involved, the study of archaeology excavation, analysis, conservation, classification and recording on an also prepares students for a variety of jobs: field archaeology, museum approved excavation or in a museum or laboratory setting.
    [Show full text]
  • Studying and Documenting Web Archives Provenance Emily Maemura, Phd Candidate Faculty of Information, University of Toronto Netlab Forum February 27, 2018 the Team
    If These Crawls Could Talk: Studying and Documenting Web Archives Provenance Emily Maemura, PhD Candidate Faculty of Information, University of Toronto NetLab Forum February 27, 2018 The Team Nich Worby Christoph Becker Ian Milligan Librarian, Assistant Professor Associate Professor, Web Archivist Director, Digital Curation Institute Digital Historian Emily Maemura Doctoral Candidate brought together through the Digital Curation Institute McLuhan Centenary Fellowship in Digital Sustainability 2016-17 and supported by SSHRC Number of Pages per Domain, Canadian Political Parties Collection, 2005-2015 http://lintool.github.io/warcbase/vis/crawl-sites/ Pages from “policyalternatives.ca” Sept. 2007 - Nov. 2009 Dec. 2009 - May 2015 over 200.000 less than 50.000 pages per crawl pages per crawl How are web archives made and used? How can we document or communicate this? Creating web archives Using web archives As a web archivist... As a researcher… What do I need to document What do I need to ask about for researchers using this data to have confidence in web archives material? the analysis and findings? Researcher Perspective: “Web Archives Research Objects” Maemura, Milligan, Becker, 2016. Understanding computational web archives research methods using research objects, Computational Archival Science Workshop at IEEE Big Data 2016 http://hdl.handle.net/1807/74866 How are web archives used by researchers? Can shared conceptual frameworks of research methods used with Web Archives collections help to systematize practices, advance the field,
    [Show full text]
  • A Manifesto for an Introspective Digital Archaeology
    Open Archaeology 2015; 1: 86–95 Original Study Open Access Jeremy Huggett A Manifesto for an Introspective Digital Archaeology Abstract: This paper presents a grand challenge for Digital Archaeology of a different kind: it is not technical in and of itself, it does not seek out technological solutions for archaeological problems, it does not propose new digital tools or digital methodologies as such. Instead, it proposes a broader challenge, one which addresses the very stuff of archaeology: an understanding of how digital technologies influence and alter our relationships with data, from their creation and storage ultimately through to the construction of archaeological knowledge. It argues that currently this area is under-theorised, under-represented, and under-valued, yet it is increasingly fundamental to the way in which we arrive at an understanding of the past. Keywords: digital archaeology, digital data, introspection, digital intervention, digital intermediation DOI 10.1515/opar-2015-0002 Received December 4, 2014; accepted February 2, 2015 1 Ghosts in the machine In 2011, James Bridle coined the term New Aesthetic to describe his curation of a series of images on Tumblr which he saw as pointing “towards new ways of seeing the world, an echo of the society, technology, politics and people that co-produce them ... It is a series of artefacts of the heterogeneous network, which recognises differences, the gaps in our overlapping but distant realities.” [1]. This New Aesthetic was predicated on the discovery and revelation of images which are embedded in digital technologies and without which they could not exist. Bridle described the New Aesthetic as ‘seeing like digital devices’ [2], although Sterling [3] argued that humans had ultimate responsibility for the creation of the digital imagery, describing the results as some kind of ‘wunderkammer’.
    [Show full text]
  • Preservation Metadata (2Nd Edition)
    01000100 01010000 Preservation 01000011 Metadata 01000100 (2nd edition) 01010000 Brian Lavoie and Richard Gartner 01000011 01000100 DPC Technology Watch Report 13-03 May 2013 01010000 01000011 01000100 01010000 Series editors on behalf of the DPC 01000011 Charles Beagrie Ltd. Principal Investigator for the Series 01000100 Neil Beagrie 01010000 01000011DPC Technology Watch Series © Digital Preservation Coalition 2013 – and Richard Gartner and Brian Lavoie 2013 Published in association with Charles Beagrie Ltd. ISSN: ISSN 2048-7916 DOI: http://dx.doi.org/10.7207/twr13-03 Second Edition All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing from the publisher. The moral rights of the authors have been asserted. First edition published in Great Britain in 2005 by the Digital Preservation Coalition. Second edition published in Great Britain in 2013 by the Digital Preservation Coalition. Acknowledgements The authors would like to thank series editor Neil Beagrie and our reviewers for many helpful comments and suggestions, which significantly improved the final version of this report. Foreword The Digital Preservation Coalition (DPC) is an advocate and catalyst for digital preservation, ensuring our members can deliver resilient long-term access to digital content and services. It is a not-for-profit membership organization whose primary objective is to raise awareness of the importance of the preservation of digital material and the attendant strategic, cultural and technological issues. It supports its members through knowledge exchange, capacity building, assurance, advocacy and partnership. The DPC’s vision is to make our digital memory accessible tomorrow.
    [Show full text]