Tuesday 19 May 2015

360 Virtual Tours

Virtual tours are a wonderful way of engaging your online visitors and giving them a unique opportunity to experience your exhibitions, gallery or archive. These tours can consist of single or multiple panoramas, a map of the premises and hotspots with information 'pop-ups' within the tour.


Not only do these tours act as an interactive experience online, they allow you to create a catalogue of your exhibitions. As most exhibits last for a limited time, having a lasting copy of the full exhibition can enable people to view the collection in a virtual environment. This service is a distinct way to promote your collection and to keep a record of the events throughout the years.


Virtual tours can be custom-designed to suit any branding. We can work alongside your online team so that your tour works efficiently within your website, with mobile & tablet compatibility and Google Maps integration. This service can be a unique addition and an easy access point for a range of consumers, using hassle free digital-mapping from a trusted industry specialist.
To view an example of our Virtual Tours service, please follow the link to a tour that we created for Bexley County Council of their 'Illuminated World' exhibition. 

Tuesday 31 March 2015

Data Security



Why is it important?

Data security is a key aspect of any modern business. It's as important as physical security, just as you would ensure that your physical archive is protected and safe, your digital collection is just as vulnerable. Unprotected data has the potential to be accessed by anyone, it could be infected by a malicious virus, stolen or even deleted.
Though it may seem trivial, this threat extends beyond protecting your archive alone. Many businesses store personal information on their systems which is equally as important. This could range from: phone numbers, addresses, bank details, credit card information, both employee and client details could be at risk. This data should never be publicly accessible and you will be responsible for its protection. For example, if your companies system has a virus which is passed onto another company and they can prove it came from your organisation due to the lack of adequate security, you could be held responsible.
Even if someone accesses your system and only does something harmless, this can still affect the reputation of the business and be potentially humiliating.

How to protect your data

Ultimately you want to restrict who can access your data and here is how:

  • All data should require a password to access. This can be done by making sure whatever you use to store your data is password protected i.e. Wifi, computer, laptop, tablet. Not only does this protect your data if the device was stolen, this also safeguards your account over a network.
  • Take care when downloading, never open any attachments from people that you do not know or were not expecting contact from. Opening emails is fine, but avoid downloading attachments or clicking links especially if you are uncertain what the content is.
  • Only use reputable software, if you do not recognise the developer of the software (i.e. Adobe, Microsoft etc.) it is advised to do a quick background check via Google to check that the source isn't malicious.
  • When emailing sensitive data you can zip the files and add a protective password before sending. This can be done using WinRAR, a file compression and zipping tool. The password can then be sent via text or phone.
  • Other safe ways of sharing data include; Google Docs. This tool is a great extension to your Gmail, giving you the option of 'sharing' certain data with other email contacts either as read only or editable format, allowing controlled sharing of potentially sensitive data. This is a more direct way of accessing information without the risk of emails being intercepted.
  • Regularly changing your passwords, we would recommend changing your passwords once every 6 months. If you are having difficulty remembering all your passwords, we would recommend using tools such as KeePass 2 (Windows) or Keychain (Mac OSX), which log all your passwords safely with a master password to access the system.


If you have an archive and are concerned about any of these issues, feel free to contact us for more advice.

Tuesday 17 February 2015

Competition Winner!

Congratulations to Carolynne Cotton who is the winner of our newsletter competition!

Of course the answer was: When was the Wright Brothers first flight?

Photo: Carolynne Cotton, Local Studies,
Archives and Museum Manager at London
Borough of Hillingdon

We hope Carolynne enjoys her Champagne prize and we would like to thank everybody who

participated in the competition, better luck next time!

Tuesday 3 February 2015

Oxford Games

Max recently completed a project with Oxford Games Ltd, a renowned board game designer and creators of classic games such as Jenga and Playing Shakespeare. Oxford Games have recently decided to reintroduce some of their family favourite board games with some digitisation assistance from Max. Leslie Scott, one of the founders of Oxford Games has overseen the digitisation process. Using scans of the original board game materials we were able to do layer by layer restoration of the games; Flummoxed and Bookworm, two unique and compelling titles.  

  
Before

After

As original games are over 20 years old, the work we faced involved a lot of restoration. The games were hand coloured by pencil and the vibrancy of the colours had deteriorated over time, so we were tasked to colour correct them to revitalise the images. We modernised the branding along with other aspects of the games that needed renovating, in some cases we were able to recover damaged cards from the originals and fully restore them. 

All of our staff who participated in the work thoroughly enjoyed the assignment and stated that it was fun to find solutions to each aspect of the project they encountered. 

Monday 12 January 2015

Scanning Solutions: Bookeye

Max is always seeking ways to provide efficient, flexible solutions to meet all of our clients' specifications for optimal customer satisfaction. One solution of which is the Bookeye scanner, this intelligent piece of equipment combines archival friendly material handling with cutting edge scanning technology.


It's laser focusing technology ensures sharpness across the entire image regardless of depth. For example, when a book's pages curve and there is writing close to the spine, the focusing depth is adjusted to ensure optimal image quality. 

With a capacity to scan up to A1+ sized material, this scanner has the capability to digitise a wide range of content from large artworks to small leaflets. With the option to use this equipment as either a unique book cradle or by laying the material flat on the scanning bed. It also has individually suspended plates that considers the weight of the object (particularly books) and automatically adjust so that the material is laid as flat as possible for best capture results.

Not only does the Bookeye have all this functionality it is portable enough for us to undertake work in situ at a client's archive. 

For further information on our services please go to: