This lesson is part of the Software Carpentry workshops that teach how …
This lesson is part of the Software Carpentry workshops that teach how to use version control with Git. Wolfman and Dracula have been hired by Universal Missions (a space services spinoff from Euphoric State University) to investigate if it is possible to send their next planetary lander to Mars. They want to be able to work on the plans at the same time, but they have run into problems doing this in the past. If they take turns, each one will spend a lot of time waiting for the other to finish, but if they work on their own copies and email changes back and forth things will be lost, overwritten, or duplicated. A colleague suggests using version control to manage their work. Version control is better than mailing files back and forth: Nothing that is committed to version control is ever lost, unless you work really, really hard at it. Since all old versions of files are saved, it’s always possible to go back in time to see exactly who wrote what on a particular day, or what version of a program was used to generate a particular set of results. As we have this record of who made what changes when, we know who to ask if we have questions later on, and, if needed, revert to a previous version, much like the “undo†feature in an editor. When several people collaborate in the same project, it’s possible to accidentally overlook or overwrite someone’s changes. The version control system automatically notifies users whenever there’s a conflict between one person’s work and another’s. Teams are not the only ones to benefit from version control: lone researchers can benefit immensely. Keeping a record of what was changed, when, and why is extremely useful for all researchers if they ever need to come back to the project later on (e.g., a year later, when memory has faded). Version control is the lab notebook of the digital world: it’s what professionals use to keep track of what they’ve done and to collaborate with other people. Every large software development project relies on it, and most programmers use it for their small jobs as well. And it isn’t just for software: books, papers, small data sets, and anything that changes over time or needs to be shared can and should be stored in a version control system.
This webinar will introduce the concept of version control and the version …
This webinar will introduce the concept of version control and the version control features that are built into the Open Science Framework (OSF; https://osf.io). The OSF is a free, open source web application built to help researchers manage their workflows. The OSF is part collaboration tool, part version control software, and part data archive. The OSF connects to popular tools researchers already use, like Dropbox, Box, Github and Mendeley, to streamline workflows and increase efficiency. This webinar will discuss how keeping track of the different file versions is important for efficient reproducible research practices, how version control works on the OSF, and how researchers can view and download previous versions of files.
This lecture presents Explanation as a rhetorical mode for composition. The lecture …
This lecture presents Explanation as a rhetorical mode for composition. The lecture is offered here in three different formats: video without captions, video with captions, and a full text transcript.
This lecture reviews "cause and effect" analysis as a rhetorical mode by …
This lecture reviews "cause and effect" analysis as a rhetorical mode by indentifying it in reading selections. The lecture is offered here in three different formats: video without captions, video with captions, and a text transcript.
Die Veranstaltung gibt einen Überblick über Ziele und Methoden der Computerlinguistik. Verschiedene …
Die Veranstaltung gibt einen Überblick über Ziele und Methoden der Computerlinguistik. Verschiedene Anwendungen bzw. potentielle Anwendungen werden vorgestellt, es wird gezeigt, wo die Herausforderungen und Probleme bei der Sprachverarbeitung liegen und von welcher Seite man sich ihnen nähern kann. Bei maschineller Übersetzung braucht man Komponenten, die den Aufbau von Wörtern analysieren (morphologische Komponente), Komponenten, die die Struktur von Sätzen analysieren (syntaktische Komponente) und man muss die Bedeutung eines Satzes ermitteln, um ihn adäquat übersetzen zu können. Es wird das Konzept der endlichen Automaten erklärt und gezeigt, wie sich solche Automaten für die morphologische Analyse benutzen lassen. Es wird gezeigt, wie man syntaktische Gesetzmäßigkeiten formalisieren kann, und wie die entsprechenden Grammatiken verarbeitet werden können. Bedeutungsrepräsentationen können entweder parallel mit der Erzeugung der syntaktischen Strukturen aufgebaut werden oder in einer der syntaktischen Analyse nachgeordneten Komponente berechnet werden.
In der Veranstaltung wird in die Computationelle Semantik eingeführt. Es wird gezeigt, …
In der Veranstaltung wird in die Computationelle Semantik eingeführt. Es wird gezeigt, wie sprachlichen Ausdrücken eine Bedeutung zugewiesen werden kann, die sich kompositional aus der Bedeutung der Teile ergibt. Die folgenden Punkte werden besprochen: Logik erster Stufe Lambda-Kalkül Skopusambiguitäten und unterspezifizierte Repräsentationen Propositionale Inferenz Inferenz erster Stufe und Unifikation Diskursrepräsentationstheorie Präsupposition
This collection uses primary sources to explore The Watsons Go To Birmingham1963 …
This collection uses primary sources to explore The Watsons Go To Birmingham1963 by Christopher Paul Curtis. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
Using actual wildlife injury data from a local wildlife rescue center, students …
Using actual wildlife injury data from a local wildlife rescue center, students learn what animal species have been injured and the causes of injury. Students use spreadsheet software to sort, organize, and evaluate their findings for recommendations to reduce human-caused injury to wildlife. Students prepare and present a summary of their findings and recommendations to the local Audubon Society, The Humane Society, neighborhood associations, and other interested groups. At the end of each public presentation, students gather public reaction to the data and collect ideas on how to reduce injury to wildlife. These recommendations are compiled into a newsletter and wiki for dissemination to a wider audience.
This unit plan was originally developed by the Intel® Teach program as an exemplary unit plan demonstrating some of the best attributes of teaching with technology.
More researchers are preregistering their studies as a way to combat publication …
More researchers are preregistering their studies as a way to combat publication bias and improve the credibility of research findings. Preregistration is at its core designed to distinguish between confirmatory and exploratory results. Both are important to the progress of science, but when they are conflated, problems arise. In this webinar, we discuss the What, Why, and How of preregistration and what it means for the future of science. Visit cos.io/prereg for additional resources.
This video is the first in a series of videos related to …
This video is the first in a series of videos related to the basics of power analyses. All materials shown in the video, as well as content from the other videos in the power analysis series can be found here: https://osf.io/a4xhr/
This collection uses primary sources to explore coal mining and labor in …
This collection uses primary sources to explore coal mining and labor in West Virginia. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
Background The widespread reluctance to share published research data is often hypothesized …
Background The widespread reluctance to share published research data is often hypothesized to be due to the authors' fear that reanalysis may expose errors in their work or may produce conclusions that contradict their own. However, these hypotheses have not previously been studied systematically. Methods and Findings We related the reluctance to share research data for reanalysis to 1148 statistically significant results reported in 49 papers published in two major psychology journals. We found the reluctance to share data to be associated with weaker evidence (against the null hypothesis of no effect) and a higher prevalence of apparent errors in the reporting of statistical results. The unwillingness to share data was particularly clear when reporting errors had a bearing on statistical significance. Conclusions Our findings on the basis of psychological papers suggest that statistical results are particularly hard to verify when reanalysis is more likely to lead to contrasting conclusions. This highlights the importance of establishing mandatory data archiving policies.
This collection uses primary sources to explore Maxine Hong Kingston's The Woman …
This collection uses primary sources to explore Maxine Hong Kingston's The Woman Warrior. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
This collection uses primary sources to explore women in the Civil War. …
This collection uses primary sources to explore women in the Civil War. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
This collection uses primary sources to explore women in the antebellum reform …
This collection uses primary sources to explore women in the antebellum reform movement. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
This collection uses primary sources to explore the campaign for women's suffrage …
This collection uses primary sources to explore the campaign for women's suffrage through the passage of the Nineteenth Amendment. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
Badges are a great way to signal that a journal values transparent …
Badges are a great way to signal that a journal values transparent research practices. Readers see the papers that have underlying data or methods available, colleagues see that norms are changing within a community and have ample opportunities to emulate better practices, and authors get recognition for taking a step into new techniques. In this webinar, Professor Stephen Lindsay of University of Victoria discusses the workflow of a badging program, eligibility for badge issuance, and the pitfalls to avoid in launching a badging program. Visit cos.io/badges to learn more.
This collection uses primary sources to explore women's work on the home …
This collection uses primary sources to explore women's work on the home front during World War II. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
This collection uses primary sources to explore the Wounded Knee Massacre. Digital …
This collection uses primary sources to explore the Wounded Knee Massacre. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.