Skip to main content

Currently Skimming:

4 The Opportunities: The Relationship of Technological Advances to New Data Use and Retention Strategies
Pages 42-48

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 42...
... This feature removes constraints imposed by the limited physical access. Because most government physical science data are considered to be in the public domain, the constraints of copyright and fee collection to the free movement of data are removed as well.
From page 43...
... Users thus are freed to concentrate on the most effective use of the data, rather than on their own data management issues. Networks can provide a vehicle for regularly distributing backup copies of data and metadata to ensure safe storage.
From page 44...
... Although networks can provide a quick and easy means to distribute data, it must be noted that CDROMs have been used to distribute data for several years and have been very successful. CD-ROMs not only permit users to have a huge local library of data, but they often come with a better set of data access tools than are normally available.
From page 45...
... Improvements have occurred in database management systems, hierarchical file systems, data representation standards, query optimizers, data distribution techniques, specialized access methods, and data security tools (Silberschatz et al., 1991~. Further, investment in standards and cooperative approaches is accelerating, fueled in part by the demands of medicine, education, entertainment, journalism, financial services, and other commercial applications.
From page 46...
... High Reliability of Technology Components Microprocessors, new storage media technologies, mature software, error correction capabilities, improved packaging, and reduced power consumption have all made si~nifi~.nnt o.ontnbiltion~ to th reliability of computer systems and networks r - ~ _ _ _ =~ __A~ ,^ ~ ~ _ _^ _ What was recently considered unreliable, requiring constant attention and expensive repair, is now regarded as reliable and not worthy of effort to repair. Although precautions have always been taken to protect against loss of valuable data, many of these precautions are now built into the base of mature software or are increasingly familiar parts of facilities' operating procedures.
From page 47...
... is a standard used to represent and link documents; it is used to describe pages viewed with Internet viewers such as Mosaic. Hardware and software standards such as the instruction set architectures for microprocessorbased computers, modem protocols, media formats, and query languages also have played critical roles.
From page 48...
... In a fast-paced, and, perhaps, widely distributed effort, metrics are important to clearly communicate expectations of performance, register results, and help in detecting weak spots for corrective action. In particular, metrics could be established to determine data set use and to support archiving strategy decisions.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.