Similar Articles |
|
D-Lib Jan/Feb 2010 Reilly & Tupelo-Schneck |
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work. |
D-Lib June 2001 John S. Erickson |
A Digital Object Approach to Interoperable Rights Management Fine-grained policy enforcement enabled by a digital object infrastructure... |
D-Lib April 2001 John S. Erickson |
Information Objects and Rights Management: A Mediation-based Approach to DRM Interoperability Although the central focus of this article is to confront current information-opaque approaches to digital rights management, I hope the principles presented here are broader in scope and will suggest solutions elsewhere... |
D-Lib June 2005 Jantz & Giarlo |
Digital Preservation: Architecture and Technology for Trusted Digital Repositories To ensure that current digital archives can be trusted to be available in the future, methods, practices, and standards need to be defined. |
D-Lib October 2006 |
An Interoperable Fabric for Scholarly Value Chains It is possible to build scholarly value chains across heterogeneous, distributed repositories. It is also possible to record audit trails of scholarly value chains into the very foundation of the scholarly communication system. |
D-Lib February 2006 |
ADL-R: The First Instance of a CORDRA Registry The goal of the CORDRA project is to create a global infrastructure for the federation of content repositories. |
D-Lib August 2006 Robert Tansley |
Building a Distributed, Standards-based Repository Federation: The China Digital Museum Project This article presents the architecture developed for the China Digital Museum Project, a collaborative project involving the Chinese Ministry of Education, Hewlett-Packard Company and several Chinese universities, with Beihang University as the main technical partner. |
D-Lib May/Jun 2007 Saidis & Delis |
Type-consistent Digital Objects This article provides an overview of the Digital Object Prototype framework and highlights its type-conformance capabilities and shows how heterogeneous digital material can be treated in a uniform manner without resorting to custom developments. |
D-Lib April 2003 Staples et al. |
The Fedora Project An Open-source Digital Object Repository Management System |
JavaWorld March 2001 Brian Goetz |
Design for performance, Part 3: Remote interfaces Many common Java performance problems stem from class design decisions made early in the design process, long before most developers even start thinking about performance. This article examines performance issues specific to remote applications... |
D-Lib Sep/Oct 2012 Vermaaten et al. |
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. |
D-Lib Nov/Dec 2010 Massart et al. |
Taming the Metadata Beast: ILOX Information for Learning Object eXchange, is developed as part of the IMS Learning Object Discovery & Exchange specification specification that aims to facilitate the discovery and retrieval of learning objects stored across more than one collection. |
D-Lib Nov/Dec 2012 Joan E. Beaudoin |
Context and Its Role in the Digital Preservation of Cultural Objects In discussions surrounding digital preservation, context -- those properties of an object related to its creation and preservation that make the object's origins, composition, and purpose clear -- has been identified as a critical aspect of preservation metadata. |
D-Lib December 2007 Andrew Waugh |
The Design and Implementation of an Ingest Function to a Digital Archive During the design and implementation of public record digital archive, considerable attention was paid to the ingest function that accessions digital objects into the archive. In this article the design of the ingest function, and the lessons learned about ingest are described. |
D-Lib August 2003 Gladney & Bennett |
What Do We Mean by Authentic? What's the Real McCoy? Authenticity is among digital document security properties needing attention. Literature focused on preservation reveals uncertainty -- even confusion -- about what we might mean by authentic. This article provides a solid, useful definition that spans vernacular usage of "authentic." |
D-Lib Jul/Aug 2000 Thornton Staples & Ross Wayland |
Virginia Dons FEDORA: A Prototype for a Digital Object Repository After shopping for a digital library system unsuccessfully, in 1999 we created a digital library research and development group and set about creating the system that we need. |
D-Lib January 2003 Norman Paskin |
On Making and Identifying a "Copy" The purpose of this article is to explore some of the conceptual issues of "making a copy" digitally and in an automated DRM environment which need to be clarified to enable rights expression languages and other DRM tools to deal with the concept of copying. |
D-Lib Mar/Apr 2008 Pearce et al. |
The Australian METS Profile - A Journey about Metadata Steps toward a generic Australian METS profile that can be used across multiple domains and usage scenarios. |
JavaWorld November 2000 Todd Sundsted |
Signed and sealed objects deliver secure serialized content The Java serialization mechanism does not protect the serialized content, and thus introduces the possibility of security flaws in applications using serialization. Two classes are designed to protect the contents of serialized objects from manipulation and examination... |
D-Lib February 2001 Manfred Thaller |
From the Digitized to the Digital Library Many, if not most, digitization projects have aimed at existing collections as individual servers. A digital library, however, should be more than a digitized one... |
D-Lib Nov/Dec 2012 Joan Beaudoin |
A Framework for Contextual Metadata Used in the Digital Preservation of Cultural Objects Contextual information is fundamental to understanding many aspects about digital content. The framework presented here was developed to accommodate recording this critical information. |
JavaWorld November 2001 Kurt Jacobs |
Subscribe now for rapid prototyping Developers often find themselves reengineering an API to meet the demand of evolving requirements. By providing a framework for a more flexible system, the Publisher-Subscriber pattern can help you overcome some problems associated with object dependencies... |
D-Lib April 2000 Moore, Baru, Rajasekar, Ludaescher, et al. |
Collection-Based Persistent Digital Archives - Part 2 A discussion of the four major components of a persistent archive system: support for ingestion, archival storage, information discovery, and presentation of the collection. Includes a description of a one million message persistent E-mail collection. |
D-Lib March 2005 Theo van Veen |
Renewing the Information Infrastructure of the Koninklijke Bibliotheek The Koninklijke Bibliotheek (KB) is engaged in a major renewal of its information infrastructure. |
D-Lib June 2009 Mestl et al. |
Time Challenges - Challenging Times for Future Information Search It is hard to predict what the major challenge in search will be 100 years from now. |
JavaWorld April 2001 Geoff Friesen |
Object-oriented language basics, Part 1 An introduction to object-oriented programming and how to declare classes and create objects from those classes... |
JavaWorld April 2001 Kelly Davis & Robert Di Marco |
Manage distributed sessions Using RMI and the Proxy API introduced in JDK 1.3, this article describes a technique that allows one or more servlet servers to maintain session information on one or more session servers. By adopting this architecture, no single point of failure will exist for session management... |
JavaWorld September 2002 Tarak Modi |
J2SE 1.4 breathes new life into the CORBA community, Part 2 The Portable Object Adapter (POA), introduced in CORBA 2.2, replaced CORBA's Basic Object Adapter (BOA). An object adapter represents a core piece of the CORBA runtime on the server. This article explore J2SE 1.4's POA support. |
D-Lib February 2009 Nicholas et al. |
A Policy Checklist for Enabling Persistence of Identifiers One of the main tasks of the Persistent Identifier Linking Infrastructure (PILIN) project on persistent identifiers was to establish a policy framework for managing identifiers and identifier providers. |
JavaWorld April 2001 Piet Jonas |
Secure type-safe collections A framework that overcomes the standard Java Collections Framework's main problem: its containers lack the ability to restrict themselves to storing objects of a specific type. The solution uses reflection, wrapper classes, and a collection of static factory methods... |
JavaWorld December 2001 Jeff Friesen |
Trash talk, Part 1 One feature that distinguishes Java from other computer languages is its garbage collection abilities. In this article, This article introduces garbage collection and shows how Java's optional support for it affects your programs... |
JavaWorld May 2001 Markus Dorn |
Reading objects is easy with SAX By following some simple rules when mapping objects to XML, you can easily read object structures, even complex ones, from XML. See how you can use SAX to eliminate that complexity... |
JavaWorld July 2000 Todd M. Greanier |
Flatten your objects The Java Serialization API is used by many other Java APIs (like RMI and JavaBeans) to persist objects beyond the duration of a running virtual machine. This article tries to demystify the secrets of the Java Serialization API. |
JavaWorld October 2000 Frank Sommers |
Activatable Jini services, Part 2: Patterns of use This article concentrates on the consequences of activation in the Jini context. Sommers exponds on the issue of deactivating objects, then considers the implications of deactivation for well-designed Jini services and how the Jini helper services introduced in the 1.1 beta version of the JSK can contribute... |
D-Lib Jul/Aug 2012 Patton et al. |
Identification of User Facility Related Publications One metric for evaluating the scientific value or impact of a facility is the number of publications by users as a direct result of using that facility. |
JavaWorld March 2002 James Carman |
Write once, persist anywhere Most J2EE applications strive to abstract the database tier by employing the Data Access Object design pattern. This article shows you a DAO pattern framework that you can reuse on all your projects, regardless of object type... |
JavaWorld November 2000 M. Jeff Wilson |
Get smart with proxies and RMI RMI enables developers to either get a remote reference to a distributed object, in which all method calls are forwarded to the server object, or get a copy of the remote object and invoke on it locally. You can combine these approaches in a way that is transparent to the client code... |
Technology Research News September 5, 2005 |
Finding Information on the 'Net Although the reach of today's search engines seems impressive, collectively they have indexed only about half of all publicly available Web pages. Here are ways to garner more information from the Web. |
Information Today February 13, 2013 George H. Pike |
Amazon Patents Electronic Marketplace For 'Used' Digital Content Will individuals soon be able to buy and sell "used" digital media such as apps, ebooks, and music downloads? And if so, will they only be able to do this through Amazon? |
JavaWorld May 2002 Ryan Daigle |
Eliminate JDBC overhead Most J2EE and other types of Java applications interact in some way with information persisted in a database. Interfacing with that database involves several iterations of SQL statements, connection management, transaction lifecycles, result processing, and exception handling. The many parts of this ritualistic dance are common in all contexts; however, this replication doesn't have to exist. This article outlines a flexible framework that remedies the repetition of interacting with a JDBC-compliant database. |
D-Lib May/Jun 2012 Andras Holl |
Information Bulletin on Variable Stars -- Rich Content and Novel Services for an Enhanced Publication Technically skilled authors, freely available bibliographic services and discipline-wide standardization -- all characteristic of astronomy -- form the foundation on which this uniquely enhanced journal is built, enabling it to provide quality services to its research community. |
JavaWorld June 2002 Dirk Laessig |
Score big with JSR 77, the J2EE Management Specification The specification's core is based on the model of managed objects, explained in this article. JSR 77 also defines an Enterprise JavaBeans (EJB) component for easily accessing these managed objects. |
JavaWorld September 2000 Frank Sommers |
Activatable Jini services, Part 1: Implement RMI activation Jini services must be long-lived and resilient, and must efficiently manage their computational resources with little user intervention. This article shows how to use RMI activation to manage computational resources and increase the availability of Jini services... |
JavaWorld January 2002 Jeff Friesen |
Trash talk, Part 2 This article explores the Reference Objects API, an API that allows your programs to interact with the garbage collector in limited ways... |
JavaWorld October 2000 Bruce Eckel |
Everything is an object, Part 2 Eckel takes you through name visibility and using components from other libraries; the static keyword; and comments and embedded documentation. By the end, you should be able to build your first Java program... |
JavaWorld September 2001 Jian Zhong |
Step into the J2EE architecture and process By reading this article, you will better understand many important J2EE architecture topics, and be able to apply that knowledge to extend and modify this simple methodology to solve your special business problems... |
JavaWorld July 18, 2003 James Carman |
Get down to business In this article, you will learn how to structure your applications such that modifications to the business object implementation do not require changes to the user interface using a simple framework for accessing your business objects. |
T.H.E. Journal August 2001 Angel Rodriguez |
The Virtual Reality Skeleton Project The objective of this project is to provide a flexible, interactive teaching tool for a human anatomy and physiology lecture and lab... |
Technology Research News February 25, 2004 |
Scans pick up object orientation Researchers in Spain have improved the process of pattern recognition with a method of mapping three-dimensional objects in a way that records every possible point of view of the object. The method could be used to inspect the orientation and shapes of manufactured goods, and also for face recognition. |
JavaWorld August 2001 Michael L. Perry |
Automate dependency tracking, Part 1 Interactive applications are typically subdivided into information model and user interface subsystems. Automatic dependency tracking can discover dependencies within the system and keep the user interface current... |