SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Data Management
Use Backups
Rule of 3: have 2 on-site copies, 1 offsite
Automate backups whenever possible
Periodically test restore data from backups

Be Consistent
Name your files consistently
Avoid spaces and the following characters: “ /  : * ? ‘ < > [ ] & $
Use date conventions: YYYY-MM-DD or YYYYMMDD
Examples: 20090923_spctrm_trans_03.csv, SLAposter_FINAL.ai, BlogPost-2011-11-12.docx
Consistent documentation
Think about documentation before you start a project
Make a list of the information to record when you acquire a dataset
Examples: date, experiment, sample number, calibration factors, temperature, etc.

Document Your Conventions
Print out near computer/experiment area
In front of research/lab notebook
Page 1: Project information
Page 2: Document conventions and abbreviations
Page 3-X: Index of experiments (use 1 index line per page in notebook)
README.txt in computer folders
Top-level folder: Project information
Lower-level folders: What’s in this folder?

Plan ahead
Get security assistance if you deal with HIPPA, FERPA, IRB, or other sensitive information
UWM Information Security Office: www.uwm.edu/itsecurity/
HIPAA: www.uwm.edu/legal/hipaa/index.cfm
FERPA: www.uwm.edu/academics/ferpa.cfm
Avoid proprietary file formats or convert to them as soon as possible
Examples: .doc to .txt, .xls to .csv, .jpg to .tif
Preserve software if no open format available
Periodically move data off outdated media

CC-BY Kristin Briney, Data Services Librarian

University of Wisconsin-Milwaukee Libraries
http://www4.uwm.edu/libraries/dataservices/

Contenu connexe

Similaire à Data Management Tips Handout

Data Management for Undergraduate Researchers (updated - 02/2016)
Data Management for Undergraduate Researchers (updated - 02/2016)Data Management for Undergraduate Researchers (updated - 02/2016)
Data Management for Undergraduate Researchers (updated - 02/2016)Rebekah Cummings
 
Landis - System Administration
Landis - System AdministrationLandis - System Administration
Landis - System Administrationckuyehar
 
Data management for TA's
Data management for TA'sData management for TA's
Data management for TA'saaroncollie
 
Research Data Management for Qualitative Researchers
Research Data Management for Qualitative ResearchersResearch Data Management for Qualitative Researchers
Research Data Management for Qualitative ResearchersCelia Emmelhainz
 
Ch13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and ProceduresCh13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and ProceduresInformation Technology
 
Lecture-1-Windows-Artefacts.pdf
Lecture-1-Windows-Artefacts.pdfLecture-1-Windows-Artefacts.pdf
Lecture-1-Windows-Artefacts.pdfssuserfd0132
 
15 Pages (3pages-section) References Choose a topic that re.docx
15 Pages (3pages-section) References Choose a topic that re.docx15 Pages (3pages-section) References Choose a topic that re.docx
15 Pages (3pages-section) References Choose a topic that re.docxjesusamckone
 
Level 3 IT Principles Overview
Level 3 IT Principles OverviewLevel 3 IT Principles Overview
Level 3 IT Principles OverviewStellaITEC
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Disk Image!...and then what? Strategies for sustainable long-term storage an...
Disk Image!...and then what?  Strategies for sustainable long-term storage an...Disk Image!...and then what?  Strategies for sustainable long-term storage an...
Disk Image!...and then what? Strategies for sustainable long-term storage an...Helen Bailey
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data ManagementAmanda Whitmire
 
ManagingOrganizingData_ReusableSlides.ppt
ManagingOrganizingData_ReusableSlides.pptManagingOrganizingData_ReusableSlides.ppt
ManagingOrganizingData_ReusableSlides.pptRichard Gamaliel Cortez
 
ResourceAppendix B.3, The Wellmeadows Hospital Case Stud.docx
ResourceAppendix B.3, The Wellmeadows Hospital Case Stud.docxResourceAppendix B.3, The Wellmeadows Hospital Case Stud.docx
ResourceAppendix B.3, The Wellmeadows Hospital Case Stud.docxsjennifer395
 
A basic course on Reseach data management, part 2: protecting and organizing ...
A basic course on Reseach data management, part 2: protecting and organizing ...A basic course on Reseach data management, part 2: protecting and organizing ...
A basic course on Reseach data management, part 2: protecting and organizing ...Leon Osinski
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksshyaminfopvtltd
 

Similaire à Data Management Tips Handout (20)

Data Management for Undergraduate Researchers (updated - 02/2016)
Data Management for Undergraduate Researchers (updated - 02/2016)Data Management for Undergraduate Researchers (updated - 02/2016)
Data Management for Undergraduate Researchers (updated - 02/2016)
 
Landis - System Administration
Landis - System AdministrationLandis - System Administration
Landis - System Administration
 
Data management for TA's
Data management for TA'sData management for TA's
Data management for TA's
 
Research Data Management for Qualitative Researchers
Research Data Management for Qualitative ResearchersResearch Data Management for Qualitative Researchers
Research Data Management for Qualitative Researchers
 
Ch13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and ProceduresCh13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and Procedures
 
Data Life Cycle
Data Life CycleData Life Cycle
Data Life Cycle
 
Lecture-1-Windows-Artefacts.pdf
Lecture-1-Windows-Artefacts.pdfLecture-1-Windows-Artefacts.pdf
Lecture-1-Windows-Artefacts.pdf
 
15 Pages (3pages-section) References Choose a topic that re.docx
15 Pages (3pages-section) References Choose a topic that re.docx15 Pages (3pages-section) References Choose a topic that re.docx
15 Pages (3pages-section) References Choose a topic that re.docx
 
Data management
Data management Data management
Data management
 
Level 3 IT Principles Overview
Level 3 IT Principles OverviewLevel 3 IT Principles Overview
Level 3 IT Principles Overview
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Disk Image!...and then what? Strategies for sustainable long-term storage an...
Disk Image!...and then what?  Strategies for sustainable long-term storage an...Disk Image!...and then what?  Strategies for sustainable long-term storage an...
Disk Image!...and then what? Strategies for sustainable long-term storage an...
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data Management
 
ManagingOrganizingData_ReusableSlides.ppt
ManagingOrganizingData_ReusableSlides.pptManagingOrganizingData_ReusableSlides.ppt
ManagingOrganizingData_ReusableSlides.ppt
 
Introduction to RDM for trainee physicians
Introduction to RDM for trainee physiciansIntroduction to RDM for trainee physicians
Introduction to RDM for trainee physicians
 
Good Practice in Research Data Management
Good Practice in Research Data ManagementGood Practice in Research Data Management
Good Practice in Research Data Management
 
ResourceAppendix B.3, The Wellmeadows Hospital Case Stud.docx
ResourceAppendix B.3, The Wellmeadows Hospital Case Stud.docxResourceAppendix B.3, The Wellmeadows Hospital Case Stud.docx
ResourceAppendix B.3, The Wellmeadows Hospital Case Stud.docx
 
A basic course on Reseach data management, part 2: protecting and organizing ...
A basic course on Reseach data management, part 2: protecting and organizing ...A basic course on Reseach data management, part 2: protecting and organizing ...
A basic course on Reseach data management, part 2: protecting and organizing ...
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
 

Plus de Kristin Briney

NCURA Webinar on Open Data
NCURA Webinar on Open DataNCURA Webinar on Open Data
NCURA Webinar on Open DataKristin Briney
 
Leveling Up Data Management
Leveling Up Data ManagementLeveling Up Data Management
Leveling Up Data ManagementKristin Briney
 
Breaking the Data Management Barrier
Breaking the Data Management BarrierBreaking the Data Management Barrier
Breaking the Data Management BarrierKristin Briney
 
TEDxUWMilwaukee: Rethinking Research Data
TEDxUWMilwaukee: Rethinking Research DataTEDxUWMilwaukee: Rethinking Research Data
TEDxUWMilwaukee: Rethinking Research DataKristin Briney
 
Data Management 101 (2015)
Data Management 101 (2015)Data Management 101 (2015)
Data Management 101 (2015)Kristin Briney
 
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...Kristin Briney
 
Measuring Research Impact
Measuring Research ImpactMeasuring Research Impact
Measuring Research ImpactKristin Briney
 
Retaining Your Old Research Data
Retaining Your Old Research DataRetaining Your Old Research Data
Retaining Your Old Research DataKristin Briney
 
Organizing Your Research Data
Organizing Your Research DataOrganizing Your Research Data
Organizing Your Research DataKristin Briney
 
Documenting Your Research Data
Documenting Your Research DataDocumenting Your Research Data
Documenting Your Research DataKristin Briney
 
Storing Your Research Data
Storing Your Research DataStoring Your Research Data
Storing Your Research DataKristin Briney
 
Research Data & Digital Preservation - CUWL Conference 2014
Research Data & Digital Preservation - CUWL Conference 2014Research Data & Digital Preservation - CUWL Conference 2014
Research Data & Digital Preservation - CUWL Conference 2014Kristin Briney
 
Practical Data Management - ACRL DCIG Webinar
Practical Data Management - ACRL DCIG WebinarPractical Data Management - ACRL DCIG Webinar
Practical Data Management - ACRL DCIG WebinarKristin Briney
 
Electronic Laboratory Notebooks
Electronic Laboratory NotebooksElectronic Laboratory Notebooks
Electronic Laboratory NotebooksKristin Briney
 
Data Management Crash Course
Data Management Crash CourseData Management Crash Course
Data Management Crash CourseKristin Briney
 
Responsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementResponsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementKristin Briney
 
Data Management Plan Checklist
Data Management Plan ChecklistData Management Plan Checklist
Data Management Plan ChecklistKristin Briney
 

Plus de Kristin Briney (20)

NCURA Webinar on Open Data
NCURA Webinar on Open DataNCURA Webinar on Open Data
NCURA Webinar on Open Data
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Leveling Up Data Management
Leveling Up Data ManagementLeveling Up Data Management
Leveling Up Data Management
 
Breaking the Data Management Barrier
Breaking the Data Management BarrierBreaking the Data Management Barrier
Breaking the Data Management Barrier
 
Twitter For Academics
Twitter For AcademicsTwitter For Academics
Twitter For Academics
 
TEDxUWMilwaukee: Rethinking Research Data
TEDxUWMilwaukee: Rethinking Research DataTEDxUWMilwaukee: Rethinking Research Data
TEDxUWMilwaukee: Rethinking Research Data
 
Data Management 101 (2015)
Data Management 101 (2015)Data Management 101 (2015)
Data Management 101 (2015)
 
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
 
Data Management 101
Data Management 101Data Management 101
Data Management 101
 
Measuring Research Impact
Measuring Research ImpactMeasuring Research Impact
Measuring Research Impact
 
Retaining Your Old Research Data
Retaining Your Old Research DataRetaining Your Old Research Data
Retaining Your Old Research Data
 
Organizing Your Research Data
Organizing Your Research DataOrganizing Your Research Data
Organizing Your Research Data
 
Documenting Your Research Data
Documenting Your Research DataDocumenting Your Research Data
Documenting Your Research Data
 
Storing Your Research Data
Storing Your Research DataStoring Your Research Data
Storing Your Research Data
 
Research Data & Digital Preservation - CUWL Conference 2014
Research Data & Digital Preservation - CUWL Conference 2014Research Data & Digital Preservation - CUWL Conference 2014
Research Data & Digital Preservation - CUWL Conference 2014
 
Practical Data Management - ACRL DCIG Webinar
Practical Data Management - ACRL DCIG WebinarPractical Data Management - ACRL DCIG Webinar
Practical Data Management - ACRL DCIG Webinar
 
Electronic Laboratory Notebooks
Electronic Laboratory NotebooksElectronic Laboratory Notebooks
Electronic Laboratory Notebooks
 
Data Management Crash Course
Data Management Crash CourseData Management Crash Course
Data Management Crash Course
 
Responsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementResponsible Conduct of Research: Data Management
Responsible Conduct of Research: Data Management
 
Data Management Plan Checklist
Data Management Plan ChecklistData Management Plan Checklist
Data Management Plan Checklist
 

Dernier

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Dernier (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Data Management Tips Handout

  • 1. Data Management Use Backups Rule of 3: have 2 on-site copies, 1 offsite Automate backups whenever possible Periodically test restore data from backups Be Consistent Name your files consistently Avoid spaces and the following characters: “ / : * ? ‘ < > [ ] & $ Use date conventions: YYYY-MM-DD or YYYYMMDD Examples: 20090923_spctrm_trans_03.csv, SLAposter_FINAL.ai, BlogPost-2011-11-12.docx Consistent documentation Think about documentation before you start a project Make a list of the information to record when you acquire a dataset Examples: date, experiment, sample number, calibration factors, temperature, etc. Document Your Conventions Print out near computer/experiment area In front of research/lab notebook Page 1: Project information Page 2: Document conventions and abbreviations Page 3-X: Index of experiments (use 1 index line per page in notebook) README.txt in computer folders Top-level folder: Project information Lower-level folders: What’s in this folder? Plan ahead Get security assistance if you deal with HIPPA, FERPA, IRB, or other sensitive information UWM Information Security Office: www.uwm.edu/itsecurity/ HIPAA: www.uwm.edu/legal/hipaa/index.cfm FERPA: www.uwm.edu/academics/ferpa.cfm Avoid proprietary file formats or convert to them as soon as possible Examples: .doc to .txt, .xls to .csv, .jpg to .tif Preserve software if no open format available Periodically move data off outdated media CC-BY Kristin Briney, Data Services Librarian University of Wisconsin-Milwaukee Libraries http://www4.uwm.edu/libraries/dataservices/