Easy Migration and Upload
Digital representations are quickly created from single or multiple files, either one-by-one or via an efficient bulk ingest program. Alma supports migration from third-party systems using standards like OAI-PMH, as well as automatic collection creation from EAD-formatted metadata.
Data Management and Workflows
Alma’s metadata, collections and workflow management interface for digital content mirrors that used for print and electronic resources. The resource digitization process, from request to curation, is streamlined and simple, while built-in analytics provide the insight needed for improved performance.
Alma’s native deposit interface and support for the SWORD protocol make it easy for content creators — researchers, scholars and other community members — to directly enrich your digital collections. Full approval workflows ensure that sharing resources with your institution is easy, secure and complete.
Your institution’s unique content is protected in the Alma environment by the Amazon S3 cloud storage service. File integrity is continually verified and any checksum discrepancies are automatically corrected. These safeguards and data security measures are integral to Alma, relieving your library of all set-up and maintenance worries.
Delivery and Discovery
Alma increases the visibility of your digital resources in discovery systems such as Primo and Summon, integrating digital, electronic and physical content in comprehensive result lists. Hierarchical collections encourage thematic browsing, while delivery through Alma via native, IIIF-based or any third-party system is uniformly tracked for usage rights and copyright implications.
Controlled Digital Lending
Alma supports Controlled Digital Lending flows by limiting number of concurrent users accessing a digital resource, maintaining an owned-to-loaned ratio of the original print version. Advanced workflows for managing patron waitlists for digital material, such as course resources, including customizable notifications throughout the process, can be managed as part of the access rights control. Watch the video here.