Hi All I would like to add my items using the statements bellow and I am not sure if I do the correct thing, anyone who have used import function of dspace before please advise, as you can see it says deleting items not adding items
dspace@wits:~/dspace1.8.2/bin$ sudo ./dspace import -add -e [email protected] -c 123456789/2 -s /home/dspace/history/ -m /home/dspace/mapfile [sudo] password for dspace: Deleting items listed in mapfile: /home/dspace/mapfile Started: 1341501644395 Ended: 1341501644496 Elapsed time: 0 secs (101 msecs) Regards, Lewatle -----Original Message----- From: Lewatle Phaladi Sent: 05 July 2012 12:11 PM To: Hilton Gibson Cc: [email protected] Subject: RE: [Dspace-tech] batch upload Hi Hilton and Dspace Team I once used bulk loading successfully and I lost my steps on how to create Contents, dubling_core, Metadata etc. if anyone has link where i can download sample folder containing those files that could help and the script to run on dspace 1.8 Regards, Lewatle -----Original Message----- From: Hilton Gibson [mailto:[email protected]] Sent: Thu 7/5/2012 11:40 AM To: Lewatle Phaladi Cc: [email protected] Subject: Re: [Dspace-tech] batch upload And this: http://wiki.lib.sun.ac.za/index.php/SUNScholar/Asset_Import_and_Export On 5 July 2012 11:30, Lewatle Phaladi <[email protected]> wrote: > Hi All**** > > ** ** > > I have 500 items that I would like to upload to dspace at the same > time, the items have different metadata, any suggestions will > help.**** > > ** ** > > *Regards,* > > *Lewatle * > > This communication is intended for the addressee only. It is confidential. If you have received this communication in error, please notify us immediately and destroy the original message. You may not copy or disseminate this communication without the permission of the University. Only authorized signatories are competent to enter into agreements on behalf of the University and recipients are thus advised that the content of this message may not be legally binding on the University and may contain the personal views and opinions of the author, which are not necessarily the views and opinions of The University of the Witwatersrand, Johannesburg. All agreements between the University and outsiders are subject to South African Law unless the University agrees in writing to the contrary. > > > > ---------------------------------------------------------------------- > -------- > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. > Discussions will include endpoint security, mobile security and the > latest in malware threats. > http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > DSpace-tech mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/dspace-tech > > -- *Hilton Gibson* Systems Administrator JS Gericke Library Room 1025D Stellenbosch University Private Bag X5036 Stellenbosch 7599 South Africa Tel: +27 21 808 4100 | Cell: +27 84 646 4758 http://www.sun.ac.za/library <html><p><font face = "verdana" size = "0.8" color = "navy">This communication is intended for the addressee only. It is confidential. If you have received this communication in error, please notify us immediately and destroy the original message. You may not copy or disseminate this communication without the permission of the University. Only authorized signatories are competent to enter into agreements on behalf of the University and recipients are thus advised that the content of this message may not be legally binding on the University and may contain the personal views and opinions of the author, which are not necessarily the views and opinions of The University of the Witwatersrand, Johannesburg. All agreements between the University and outsiders are subject to South African Law unless the University agrees in writing to the contrary.</font></p></html> ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ DSpace-tech mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/dspace-tech

