Story Book: an Efficient Extensible Provenance Framework

Total Page:16

File Type:pdf, Size:1020Kb

Story Book: an Efficient Extensible Provenance Framework Story Book: An Efficient Extensible Provenance Framework R. Spillane, R. Sears∗, C. Yalamanchili, S. Gaikwad, M. Chinni, and E. Zadok Stony Brook University and ∗University of California, Berkeley Abstract the changes made by applications to .txt files, and the other records modifications to .docx metadata, such as Most application provenance systems are hard coded the author name. for a particular type of system or data, while cur- Our experiments show that Story Book’s storage and rent provenance file systems maintain in-memory prove- query performance are adequate for file system prove- nance graphs and reside in kernel space, leading to com- nance workloads where each process performs a hand- plex and constrained implementations. Story Book re- ful of provenance-related actions. However, systems sides in user space, and treats provenance events as a that service many small requests across a wide range generic event log, leading to a simple, flexible and eas- of users, such as databases and Web servers, gener- ily optimized system. ate provenance information at much higher rates and We demonstrate the flexibility of our design by adding with finer granularity. As such systems handle most provenance to a number of different systems, including of today’s multi-user workloads, we believe they also a file system, database and a number of file types, and by provide higher-value provenance information than in- implementing two separate storage backends. Although teractive desktop systems. This space is where Story Story Book is nearly 2.5 times slower than ext3 under Book’s extensible user-space architecture and high write worst case workloads, this is mostly due to FUSE mes- throughput are most valuable. sage passing overhead. Our experiments show that cou- The rest of this paper is organized as follows: Sec- pling our simple design with existing storage optimiza- tion 2 describes existing approaches to provenance, Sec- tions provides higher throughput than existing systems. tion 3 describes the design and implementation of Story Book, and Section 4 describes our experiments and per- 1 Introduction formance comparisons with PASSv2. We conclude in Existing provenance systems are designed to deal with Section 5. specific applications and system architectures, and are difficult to adapt to other systems and types of data. 2 Background Story Book decouples the application-specific aspects of A survey of provenance systems [14] provides a taxon- provenance tracking from dependency tracking, queries omy of existing provenance databases. A survey of the and other mechanisms common across provenance sys- taxonomy shows that Story Book is flexible enough to tems. cover much of the design space targeted by existing sys- Story Book runs in user space, simplifying its im- tems. This flexibility comes from Story Book’s layered, plementation, and allowing it to make use of existing, modular approach to provenance tracking (Figure 1). off-the-shelf components. Implementing provenance A provenance source intercepts user interaction (or any other) file system in user space incurs signifi- events with application data and sends these events to cant overhead. However, our user space design signif- application specific extensions which interpret them and icantly reduces communication costs for Story Book’s generate provenance inserts into one of Story Book’s application-specific provenance extensions, which may storage backends. Queries are handled by Story Book’s use existing IPC mechanisms, or even run inside the pro- Story Book API. Story Book relies on external li- cess generating provenance data. braries to implement each of its modules. FUSE [8] Story Book supports application-specific extensions, and MySQL [18] intercept file system and database allowing it to bring provenance to new classes of sys- events. Extensions to Story Book’s FUSE file sys- tems. It currently supports file system and database tem, such as the .txt and .docx modules, anno- provenance and can be extended to other types of sys- tate events with application-specific provenance. These tems, such as Web or email servers. Story Book’s file provenance records are then inserted into either Sta- system provenance system also supports extensions that sis [12] or Berkeley DB [15]. Stasis stores provenance record additional information based on file type. We data using database-style no-Force/Steal recovery for its have implemented two file-type modules: One records hashtables, and compressed log structured merge (LSM) Provenance Sources PASS Linux Kernel FUSE FS MySQL Network logs Events FS instrumentation Network consensus protocol ... Durability Protocols ( Protocols Durability Processs hierarchy Processs Event timestamps Graph pruning Cycle detection and breaking Application Specific Extensions Inserts Event Reordering WAL implementation TXT Versioning DOCX ... WALDO Valor) Story Book API Realtime Query ... WAL consumption + indexing Storage Backends Queries over stale data Stasis / Rose BDB ... Compression Figure 2: PASSv2’s monolithic approach to provenance track- ing. Although Story Book contains more components than PASSv2, Story Book addresses a superset of PASSv2’s ap- Figure 1: Story Book’s modular approach to provenance track- plications, and leverages existing systems to avoid complex, ing. provenance-specific code. trees [11] for its Rose [13] indexes. Story Book utilizes need to be extended to understand annotations such Valor [16] to maintain write-ordering between its logs as “version-of” or “derived-from,” and act accordingly. and the kernel page cache. This reduces the number of Applications could implement custom queries that make disk flushes, greatly improving performance. use of these attributes, but such queries would incur sig- Although Story Book utilizes a modular design that nificant I/O cost. This is because our schema stores (po- separates different aspects of its operation into external tentially large) application-specific annotations in a sep- modules (i.e., Rose, Valor, and FUSE), it does hardcode arate physical location on disk. Of course, user-defined some aspects of its implementation. Simhan’s survey annotations could be stored in the provenance graph, but discusses provenance systems that store metadata sep- this would increase complexity, both in the schema, and arately from application data, and provenance systems in provenance query implementations. that do not. One design decision hardcoded into Story Databases such as Trio [20] reason about the quality Book is that metadata is always stored separately from or reliability of input data and processes that modify it application data for performance reasons. Story Book over time. Such systems typically cope with provenance stores blob data in a physically separate location on disk information, as unreliable inputs reflect uncertainty in in order to preserve locality of provenance graph nodes the outputs of queries. Story Book targets provenance and efficiently support queries. over exact data. This is especially appropriate for file Story Book avoids hardcoding most of the other de- system provenance and regulatory compliance applica- sign decisions mentioned by the survey. Because Story tions; in such circumstances, it is more natural to ask Book does not directly support versioning, application- which version of an input was used rather than to calcu- specific provenance systems are able to decide whether late the probability that a particular input is correct. to store logical undo/redo records of application opera- tions to save space and improve performance, or to save 2.1 Comparison to PASS raw value records to reduce implementation time. Story Existing provenance systems couple general provenance Book’s .txt module stores patches between text files concepts to system architectures, leading to complex in- rather than whole blocks or pages that were changed. kernel mechanisms and complicating integration with Story Book allows applications to determine the gran- application data representations. Although PASSv2 [9] ularity of their provenance records, and whether to fo- suffers from these issues, it is also the closest system to cus on information about data, processes or both. Simi- Story Book (Figure 2). larly, Story Book’s implementation is independent of the PASSv2 distinguishes between data attributes, such format of extended records, allowing applications to use as name or creation time, and relationships indicat- metadata standards such as RDF [19] or Dublin Core [2] ing things like data flow and versioning. Story Book as they see fit. performs a similar layering, except that it treats ver- The primary limitation of Story Book compared to sioning information (if any) as an attribute. Further- systems that make native use of semantic metadata is more, whereas PASSv2 places such mechanisms in ker- that Story Book’s built-in provenance queries would nel space, Story Book places them in user space. On the one hand, this means that user-level prove- is important when tracking database provenance, as it nance inspectors could tamper with provenance infor- allows Story Book to reuse existing durability mecha- mation; on the other it has significant performance and nisms, such as Valor, and inexpensive database replica- usability advantages. In regulatory environments (which tion techniques. For our experiments, we extended write cope with untrusted end-users), Story Book should run ahead provenance with some optimizations employed in a trusted file or other application server. The security by Fable so that PASSv2’s
Recommended publications
  • Book Self-Publishing Best Practices
    Montana Tech Library Digital Commons @ Montana Tech Graduate Theses & Non-Theses Student Scholarship Fall 2019 Book Self-Publishing Best Practices Erica Jansma Follow this and additional works at: https://digitalcommons.mtech.edu/grad_rsch Part of the Communication Commons Book Self-Publishing Best Practices by Erica Jansma A project submitted in partial fulfillment of the requirements for the degree of M.S. Technical Communication Montana Tech 2019 ii Abstract I have taken a manuscript through the book publishing process to produce a camera-ready print book and e-book. This includes copyediting, designing layout templates, laying out the document in InDesign, and producing an index. My research is focused on the best practices and standards for publishing. Lessons learned from my research and experience include layout best practices, particularly linespacing and alignment guidelines, as well as the limitations and capabilities of InDesign, particularly its endnote functionality. Based on the results of this project, I can recommend self-publishers to understand the software and distribution platforms prior to publishing a book to ensure the required specifications are met to avoid complications later in the process. This document provides details on many of the software, distribution, and design options available for self-publishers to consider. Keywords: self-publishing, publishing, books, ebooks, book design, layout iii Dedication I dedicate this project to both of my grandmothers. I grew up watching you work hard, sacrifice, trust, and love with everything you have; it was beautiful; you are beautiful; and I hope I can model your example with a fraction of your grace and fruitfulness. Thank you for loving me so well.
    [Show full text]
  • New Traveling Exhibition from the Guild of Book Workers with 50 New Book Artists' Work Form Across the Country
    New Traveling Exhibition from the Guild of Book Workers with 50 New Book Artists’ Work form Across the Country May 24, 2021 Contact Person: Jeanne Goodman Contact Email: [email protected] The Guild of Book Workers traveling exhibition will travel from June 2021 to September 2022. The opening and close dates for “Wild/LIFE” should be confirmed with each venue before travel and to check local public health precautions in place due to COVID-19. EXHIBITION “Wild/LIFE: Guild of Book Workers Triannual Exhibition”, June 2021 to September 2022 DESCRIPTION This exhibition features approximately 50 works by members of the Guild of Book Workers, an book artists organization that promotes interest in and awareness of the tradition of the book and paper arts by maintaining high standards of workmanship, hosting educational opportunities, and sponsoring exhibits. Members were invited to interpret the theme of “wildlife” in any way they wish, be it literal or abstract, humorous or serious. In a biological sense, wildlife describes the myriad of creatures sharing this planet, interacting and adapting, all connected to each other and their environment. "Wild" also describes an untamable essence that survives despite the constraints of society and culture. As craftspeople, knowledge of materials and keen observation of how they behave (and often how they refuse to comply) is an integral part of the practice of book making, and a reminder of how traditional bookbinding materials originate in nature. The exhibition opens at the American Bookbinders Museum in San Francisco, CA in June 2021, and will continue to travel to five additional venues across the country, closing in the fall of 2022.
    [Show full text]
  • Digital Preservation Workflows for Museum Imaging Environments
    The 11th International Symposium on Virtual Reality, Archaeology and Cultural Heritage VAST (2010) A. Artusi, M. Joly, D. Pitzalis, G. Lucet, and A. Ribes (Editors) Digital preservation workflows for museum imaging environments Michael Ashley1 1 Cultural Heritage Imaging, San Francisco, California, USA From: Principles and Practices of Robust, Photography-based Digital Imaging Techniques for Museums. Contributors: Mark Mudge, Carla Schroer, Graeme Earl, Kirk Martinez, Hembo Pagi, Corey Toler-Franklin, Szymon Rusinkiewicz, Gianpaolo Palma, Melvin Wachowiak, Michael Ashley, Neffra Matthews, Tommy Noble, Matteo Dellepiane. Edited by Mark Mudge and Carla Schroer, Cultural Heritage Imaging. The 11th International Symposium on Virtual Reality, Archaeology and Cultural Heritage VAST (2010) A. Artusi, M. Joly, D. Pitzalis, G. Lucet, and A. Ribes (Editors) This is a pre-print copy of a paper that is currently under review. Please respect the intellectual property of the authors and the efforts of the publishers and reviewers until its publication. If you find any errors that need modification please contact the author at [email protected]. Meanwhile this pdf is distributed to interested readers under a Creative Commons 3.0 license. M. Ashley / Digital Preservation Workflows For Museum Imaging Environments Digital preservation workflows for museum imaging environments Michael Ashley1 1 Cultural Heritage Imaging, San Francisco, California, USA Abstract We discuss and demonstrate practical digital preservation frameworks that protect images throughout the entire production life-cycle. Using off the shelf and open source software coupled with a basic understanding of metadata, it is possible to produce and manage high value digital representations of physical objects that are born archive- ready and long-term sustainable.
    [Show full text]
  • Introducticn Tc Ccnservoticn
    introducticntc ccnservoticn UNITED NATTONSEDUCATIONA],, SCIEIilIIFTC AND CULTIJRALOROANIZATTOII AN INIRODUCTION TO CONSERYATIOI{ OF CULTURAT PROPMTY by Berr:ar"d M. Feilden Director of the Internatlonal Centre for the Preservatlon and Restoratlon of Cultural Property, Rome Aprll, L979 (cc-ig/ws/ttt+) - CONTENTS Page Preface 2 Acknowledgements Introduction 3 Chapter* I Introductory Concepts 6 Chapter II Cultural Property - Agents of Deterioration and Loss . 11 Chapter III The Principles of Conservation 21 Chapter IV The Conservation of Movable Property - Museums and Conservation . 29 Chapter V The Conservation of Historic Buildings and Urban Conservation 36 Conclusions ............... kk Appendix 1 Component Materials of Cultural Property . kj Appendix 2 Access of Water 53 Appendix 3 Intergovernmental and Non-Governmental International Agencies for Conservation 55 Appendix k The Conservator/Restorer: A Definition of the Profession .................. 6? Glossary 71 Selected Bibliography , 71*. AUTHOR'S PREFACE Some may say that the attempt to Introduce the whole subject of Conservation of Cultural Propety Is too ambitious, but actually someone has to undertake this task and it fell to my lot as Director of the International Centre for the Study of the Preservation and Restoration of Cxiltural Property (ICCROM). An introduction to conservation such as this has difficulties in striking the right balance between all the disciplines involved. The writer is an architect and, therefore, a generalist having contact with both the arts and sciences. In such a rapidly developing field as conservation no written statement can be regarded as definite. This booklet should only be taken as a basis for further discussions. ACKNOWLEDGEMENTS In writing anything with such a wide scope as this booklet, any author needs help and constructive comments.
    [Show full text]
  • Archaeology Book Collection 2013
    Archaeology Book Collection 2013 The archaeology book collection is held on the upper floor of the Student Research Room (2M.25) and is arranged in alphabetical order. The journals in this collection are at the end of the document identified with the ‘author’ as ‘ZJ’. Use computer keys CTRL + F to search for a title/author. Abulafia, D. (2003). The Mediterranean in history. London, Thames & Hudson. Adkins, L. and R. Adkins (1989). Archaeological illustration. Cambridge, Cambridge University Press. Adkins, L. and R. A. Adkins (1982). A thesaurus of British archaeology. Newton Abbot, David & Charles. Adkins, R., et al. (2008). The handbook of British archaeology. London, Constable. Alcock, L. (1963). Celtic Archaeology and Art, University of Wales Press. Alcock, L. (1971). Arthur's Britain : history and archaeology, AD 367-634. London, Allen Lane. Alcock, L. (1973). Arthur's Britain: History and Archaeology AD 367-634. Harmondsworth, Penguin. Aldred, C. (1972). Akhenaten: Pharaoh of Egypt. London, Abacus; Sphere Books. Alimen, H. and A. H. Brodrick (1957). The prehistory of Africa. London, Hutchinson. Allan, J. P. (1984). Medieval and Post-Medieval Finds from Exeter 1971-1980. Exeter, Exeter City Council and the University of Exeter. Allen, D. F. (1980). The Coins of the Ancient Celts. Edinburgh, Edinburgh University Press. Allibone, T. E. and S. Royal (1970). The impact of the natural sciences on archaeology. A joint symposium of the Royal Society and the British Academy. Organized by a committee under the chairmanship of T. E. Allibone, F.R.S, London: published for the British Academy by Oxford University Press. Alves, F. and E.
    [Show full text]
  • Selection in Web Archives: the Value of Archival Best Practices
    WITTENBERG: SELECTION IN WEB ARCHIVES Selection in Web Archives: The Value of Archival Best Practices Jamie Wittenberg, University of Illinois at Urbana-Champaign, United States of America Abstract: The abundance of valuable material available online has mobilized the development of preservation initiatives at collecting institutions that aim to capture and contextualize web content. Web archiving selection criteria are driven by the limitations inherent in harvesting technologies. Observing core archival principles like provenance and original order when establishing collection development policies for web content will help to ensure that archives continue to assure the authenticity of the materials they steward. Keywords: Web Archives; Archival Theory; Digital Libraries; Internet Content; Selection and Appraisal Introduction The abundance of valuable material available online has mobilized the development of preservation initiatives at collecting institutions that aim to capture and contextualize web content. Methodologies for web collection practices are institution and collection-specific. Among institutions charged with preserving cultural heritage, web archiving has become commonplace. However, the disparity between institutional selection and appraisal criteria reveals the absence of standardization for web archive establishment. The Australian web archive, for example, accessions content that it evaluates as having long-term research value. The Library of Congress web archive, represented by its Minerva team, established a collection
    [Show full text]
  • Review (Abridged) of Bogle, Sophia S.W. Book Restoration Unveiled: an Essential Guide for Bibliophiles. [N.P.]: First Editions Press, 2019
    Syracuse University From the SelectedWorks of Peter D Verheyen June, 2019 Review (Abridged) of Bogle, Sophia S.W. Book Restoration Unveiled: An Essential Guide for Bibliophiles. [n.p.]: First Editions Press, 2019. Peter D Verheyen This work is licensed under a Creative Commons CC_BY-NC-SA International License. Available at: https://works.bepress.com/peter_verheyen/54/ BOOK REVIEW by Peter D. Verheyen Book Restoration Unveiled - An Essential Guide for Bibliophiles <' ~ Sophia S. w Bogle I.... -::-,·::.. :-;:v->~~-.•;,-/..-ic·-<-.· -.. ,<:-/s-'.'7-.-·::-.)-_;.;~-':-"li-/}-~.\..... ~\-,,:~-;t-,\t-\'.?,.....,~~~j--.;t'.--;.;·-j~-}l: .....}-l-f.J ~ u 0 (Ashland, OR: First Editions Press, 2019) :::0 (D o' 5: In Book Restoration Unveiled, Sophia S.W Bogle Book Restoration (D r6 sets out "to provide the tools to spot restorations so ~ that everyone can make more informed decisions s'-I when buying or selling books." The second reason was CJ UnvedJ c% p.J her realization that "instead of a simple list of clear "D 8 0 0 terminology, [there] was a distressing lack of agreement ~ ~ (") (D and even confusion about the most basic of book repair 0 () 8 ~ If ......__ (D terms." She writes, "this book [is] a bridge between the Iv :::0 /,8'~.4' 0 ....... world of collecting, buying, and selling books, and that <..O-< (D ......__ '-I of book repair, restoration, and conservation." In the ~ 0 (D case of the latter, she describes some of the minutiae ::: ~- 8" ~ 0 (") of the book such as structure, and treatments, good ;;,;- p.J ~ :::0 as well as bad. But, "this is not a 'how-to' manual." (D u ~ (D Rather, it is a "guide to help you understand the world S; o' of restoration, to recognize restorations, and to choose §.
    [Show full text]
  • 2016 Technical Guidelines for Digitizing Cultural Heritage Materials
    September 2016 Technical Guidelines for Digitizing Cultural Heritage Materials Creation of Raster Image Files i Document Information Title Editor Technical Guidelines for Digitizing Cultural Heritage Materials: Thomas Rieger Creation of Raster Image Files Document Type Technical Guidelines Publication Date September 2016 Source Documents Title Editors Technical Guidelines for Digitizing Cultural Heritage Materials: Don Williams and Michael Creation of Raster Image Master Files Stelmach http://www.digitizationguidelines.gov/guidelines/FADGI_Still_Image- Tech_Guidelines_2010-08-24.pdf Document Type Technical Guidelines Publication Date August 2010 Title Author s Technical Guidelines for Digitizing Archival Records for Electronic Steven Puglia, Jeffrey Reed, and Access: Creation of Production Master Files – Raster Images Erin Rhodes http://www.archives.gov/preservation/technical/guidelines.pdf U.S. National Archives and Records Administration Document Type Technical Guidelines Publication Date June 2004 This work is available for worldwide use and reuse under CC0 1.0 Universal. ii Table of Contents INTRODUCTION ........................................................................................................................................... 7 SCOPE .......................................................................................................................................................... 7 THE FADGI STAR SYSTEM .......................................................................................................................
    [Show full text]
  • Art Deaccessioning Policy
    Deaccessioning Policy Document No. CUR 4.0 – Deaccessioning Policy Page 1 Approved: December 2020 Approved by: National Gallery of Australia Council next review due: December 2022 Summary Name of Policy Description of Policy Deaccessioning Policy Policy applies to ☒ NGA wide ☐ Specific (eg. Department) Policy Status ☐ New policy ☒ Revision of Existing Policy (previously Art Acquisition Policy) Approval Authority Director Responsible Officer Assistant Director, Artistic Programs Contact area Artistic Programs Date of Policy Review* October 2022 Related Policies, Procedures, National Gallery Act 1975 Guidelines and Local Protocols Public Governance, Performance and Accountability Act 2013 Council Instructions including Financial Delegations Aboriginal and Torres Strait Islander Cultural Rights and Engagement Policy Due Diligence and Provenance Policy Acquisitions Policy Research Library Collection Development Policy Research Archive Acquisition Policy The Copyright Act 1968 The Privacy Act 1988 Privacy Policy Australian Best Practice Guide to Collecting Cultural Material 2015 Collections Law: Legal issues for Australian Archives, Galleries, Libraries and Museums *Unless otherwise indicated, this policy will still apply beyond the review date. Approvals Position Name Endorsed Date Assistant Director Natasha Bullock Yes Director Nick Mitzevich Yes Council Ryan Stokes Yes Document No. CUR 4.0 – Deaccessioning Policy Page 2 Approved: December 2020 Approved by: National Gallery of Australia Council next review due: December 2022 Table of contents
    [Show full text]
  • Search the Full Text of Books and Discover New Ones
    Search the full text of books and discover new ones With Google Book Search, you can quickly search the full text of books, from the first word on the first page to the last word in the final chapter. Find the perfect books for your purposes or discover ones you never even knew existed. Book Search works like web search Try a search on Google Book Search (http://books.google.com) or on Google.com. When we find a book whose content contains a match for your search terms, we’ll link to it in your search results. Browse books online Clicking on a book result, you’ll be able to see everything from a few short excerpts to the entire book, depending on a few different factors. • Full view: If we’ve determined that a book is out of copyright or the publisher or rightsholder has given us permission, you’ll be able to page through the entire book from start to finish. • Limited preview: If the publisher or author has provided the book through the Google Books Partner Program, you’ll be able to preview sample pages – typically about 20% of the book. • Snippet view: If a book is under copyright and the publisher or author is not part of the Partner Program, you’ll find bibliographic about the book and a few snippets of text from the book, showing your search term in context. • No preview available: For books where we’re unable to show snippets, you’ll see only bibliographic information. Search within the book Once you a find a title of interest, you can search within the book.
    [Show full text]
  • The Project Gutenberg Ebook of Things to Make, by Archibald Williams This Ebook Is for the Use of Anyone Anywhere at No Cost
    The Project Gutenberg EBook of Things To Make, by Archibald Williams This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.net Title: Things To Make Author: Archibald Williams Release Date: January 11, 2005 [EBook #14664] Language: English Character set encoding: ASCII *** START OF THIS PROJECT GUTENBERG EBOOK THINGS TO MAKE *** Produced by Don Kostuch Transcriber's Note: If the pdf version of the book is viewed using facing pages with even numbered pages on the left, you will see a close approximation of the original book. Notations of the form "(1,650) 2" appear at the bottom of some pages; they are probably printer's references for assembling to book. The text only version is of limited use because of the many figures used. I recommend the pdf or rtf versions. Some of the projects should be approached with care since they involve corrosive or explosive chemicals, electricity and steam boilers. Do not use lead solder, particularly on cooking utensils. Whether you simply want to travel back into the mind of a young boy at the beginning of the twentieth century, or want to try your hand at some interesting projects in carpentry, machinery, kites and many other areas, have fun. The following four pages have definitions of unusual (to me) terms used frequently in the text. Terms Batten - Narrow strip of wood.
    [Show full text]
  • Provenance in Digital Collections, Margo Seltzer
    Provenance in Digital Collections Margo Seltzer Harvard School of Engineering and Applied Sciences September 20, 2012 Provenance: Special Metadata • From the French word for “source” or “origin” • The complete history or lineage of a object • In the art world, provenance documents the chain of ownership of an artifact. • In the digital world, provenance records: – The process that created an artifact – The transformations applied to an artifact – The human and computational agents that operated upon an artifact – Open question: sufficient information to reproduce the artifact? Designing Storage Architectures: 9/20/12 2 Example: Art Designing Storage Architectures: 9/20/12 3 Example: Art with Provenance Provenance < 1662 Simon de Vos, Antwerp (possibly) by 1662 Guilliam I Forchoudt, Antwerp (possibly) to 1747 Jacques de Roore, The Hague 1747 - 1771 Anthonis de Groot and Stephanus de Groot, The Hague 1771 - ? Abelsz to 1779 Jacques Clemens to 1798 Supertini and Platina, Brussels to 1814 Pauwels, Brussels to 1822 Robert Saint-Victor, Paris 1822 - ? Roux to 1924 Marquise d'Aoust,&nbspFrance 1924 Galerie Georges Petit, Paris to 1940 Federico Gentili di Giuseppe,&nbspdied 1940, Paris 1940 - 1950 Mrs. A. Salem, Boston (Mr. Gentili di Giuseppe's daughter ) 1950 - 1954 Frederick Mont and Newhouse Galleries, New York 1954 - 1961 Samuel H. Kress Foundation, New York 12/09/1961 Seattle Art Museum Designing Storage Architectures: 9/20/12 4 Example: Data with Provenance Meleana e From the Library of Congress National Jukebox From the page: Musical Group: Irene West Royal Hawaiians Label Name/Number: Victo 17864 Matrix Number/Take Number: B‐15530/2 Recording Date: 12/19/1914 Location: Camden, NJ Size: 10” From http://www.loc.gov/jukebox/about/making‐the‐jukebox: “A slip that provides the elements of the filename of the digital copy is inserted in the sleeve of each selected disc: institution/collection code, label name, label number, disc copy, matrix number, and take number are all noted on the slip.
    [Show full text]