-
GeoDatabase -gdb- Data Curation Primer
The Data Curation primers are documents used as a reference to curate research data within a specific discipline area or when using certain software or data types. They are... -
GCS Training and Workshops
GCS provides first-class training opportunities for the national and European HPC community. More than 50 highly qualified scientists acting as trainers host over 60 courses... -
A selection of training material from the eResearch Alliance
we offer a selection of training material from the eResearch Alliance as well as other providers, and links to other link collections of eResearch-related training materials. -
Intermediate Course: Advanced HPC and Data Management topics
The Steinbuch Centre for Computing is hosting the course: "Advanced High Performance Computing (HPC) and Data Management topics" on October 27, 2021. This course is aimed at...-
HTML
The resource: 'Information page' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Agenda' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Advanced bash scripting' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Advanced job scripting' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Advanced usage of HPC cluster' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Batch systems best practices' is not accessible as guest user. You must login to access it!
-
HTML
-
Introductory Course: HPC and DIC in Baden-Württemberg
The Steinbuch Centre for Computing (SCC/KIT) hosted on October 21, 2021, the introductory course: "High Performance Computing (HPC) and Data Intensive Computing (DIC) in...-
HTML
The resource: 'Information page' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Agenda Course' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Introduction lesson on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'bwUnicluster 2.0 service ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Linux intro' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Intro on filesystems and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Intro on batch systems' is not accessible as guest user. You must login to access it!
-
HTML
-
MIT File organization and version control handouts
The Massachusetts Institute of Technology (MIT) has developed a series of file organization handouts: - Naming and organizing your files and folders worksheet - Documenting...-
PDF
The resource: 'Version control and techniques' is not accessible as guest user. You must login to access it!
-
HTML
The resource: 'Organize your files' is not accessible as guest user. You must login to access it!
-
DOCX
The resource: 'Naming and organizing your ...' is not accessible as guest user. You must login to access it!
-
HTML
The resource: 'Documenting your naming ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'File naming best practices ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Batch file renaming tools ...' is not accessible as guest user. You must login to access it!
-
HTML
The resource: 'Tagging and Finding Your Files' is not accessible as guest user. You must login to access it!
-
PDF
-
Data Management Plan for projects at the University of Vienna
A template for data management (DMP) plans for projects at the University of Vienna.-
PDF
The resource: 'Data Management Plan for ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Data Management Plan - Eine Anleitung zur Erstellung von Data Management Plaenen
This document is an introduction to writing DMPs including their purpose and goals. The material also covers a checklist for writing DMPs as well as an exemplary DMP.-
PDF
The resource: 'Data Management Plan - ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Generalist Repository Comparison Chart
The General Repository Comparison Chart and FAIRsharing Collection is a tool researchers could use to make decisions about selecting a generic or domain agnostic repository.... -
Data formats for preservation - What you need to know when creating a DMP
When starting a new project and creating a Data Management Plan - DMP, one of the first considerations to make should be to decide, in advance, which file formats to use. This...-
HTML
The resource: 'Data formats for ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data formats for preservation' is not accessible as guest user. You must login to access it!
-
HTML
The resource: 'Data formats for ...' is not accessible as guest user. You must login to access it!
-
HTML
-
How FAIR are your data checklist
A Checklist to evaluate how FAIR your data is. Produced for use at the EUDAT summer school to discuss how FAIR the participant's research data were and what measures could be...-
PDF
The resource: 'How FAIR are your data?' is not accessible as guest user. You must login to access it!
-
PDF
-
Anonymization tools and techniques
RDM guidance document gives an overview of important topics and tools concerning anonymity and anonymization. It is particularly useful for researchers who work with...-
PDF
The resource: 'Anonymization tools and ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Pseudonymization of person-related research data - different techniques
A presentation prepared by Vrije Universiteit Brussel gives an overview of different techniques that can be used to pseudonymize person-related research data. Other issues...-
PDF
The resource: 'Pseudonymization of ...' is not accessible as guest user. You must login to access it!
-
PDF
-
The Privacy Impact Assessment route planner for academic research
Inspired by Harry Beck’s London Metro Map, Erasmus University Rotterdam has created a flyer to visualize the main steps involved in conducting the GDPR required impact...-
PDF
The resource: 'The Privacy Impact ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Microsoft Excel Data Curation Primer
The Data Curation primers are documents used as a reference to curate research data within a specific discipline area or when using certain software or data types. They are... -
Guide to using OneNote as a Research Notebook
The University of Glasgow has prepared a detailed guideline on how to use Microsoft OneNote as a research notebook. It guides researchers from the initial steps of accessing...-
PDF
The resource: 'Guide to using OneNote as ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Electronic Research Notebook Case Study
The University of Glasgow run a work package between 2018 and 2019 to investigate the user requirements for Electronic Research Notebooks (ELNs). They organized a series of...-
PDF
The resource: 'University of Glasgow ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Five steps to decide what to keep
The Digital Curation Centre has prepared a tool to guide researchers in their preservation strategy. Through a series of checklist, researchers are guided to reflect on what... -
Publishing and sharing sensitive data - Guidelines and decision tree
ANDS has published a comprehensive guide about best practice for the publication and sharing of research data (in the Australian context). The guide helps researchers with the...-
HTML
The resource: 'Publishing and sharing ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Publishing and sharing ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Publishing and sharing ...' is not accessible as guest user. You must login to access it!
-
HTML
-
Encryption guidelines
Ghent University has elaborated an encryption manual for researchers. It begins with basic information about what encryption is and when is it needed. Then, it describes...-
PDF
The resource: 'Encryption for researchers' is not accessible as guest user. You must login to access it!
-
PDF