【英語論文の書き方】第80回 「データ、その他の大事なものをバックアップする(パート1)」について

2021年4月1日 17時26分

第79回では「データの解析(パート3):データを提示する」を取り上げました。

第80回(今回)のテーマは
「データ、その他の大事なものをバックアップする(パート1)」についてです。
 
研究者の方は、データを取得して分析するために、
多くの時間と費用をかけると思いますが、
膨大な時間と費用を費やしたデータに、もし何か起きてしまったら?
 
研究を再び行うことが不可能であるがために、
データの交換ができないようなケースもあります。
また、研究者としての世評や、
今後、研究を行っていくことに影響を及ぼす以外にも、
人間の健康や幸福、希少種や絶滅危惧種の生存にとって
極めて重要な情報を失ってしまうかもしれないのです。
 
このようなことが起きないようにするためには、
データのバックアップについて
強力な戦略を立てておくことが絶対不可欠です。
 
形あるものでも、そうでないものでも、
守れなければいけないものはたくさんあります。
保護する必要があるものはデータだけではありませんが、
パート1ではまず、データのバックアップについてお話します。
 
それでは、記事をお読みください。

 

Backing up your data… and other important things By Geoffrey Hart

As a researcher, you spend large amounts of time and money acquiring and analyzing data. If anything happens to that data, you’ve wasted all that time and money. In some cases, it may be impossible to replace the data because it’s impossible to repeat the research. Apart from the impact on your reputation and your ability to do more research in the future, you may have lost information crucial to human health and well-being or to the survival of rare and endangered species. For this reason, it’s essential to have a strong backup strategy for your data.
Most researchers work for large organizations, such as universities and research institutes, and these organizations generally do an adequate job of safeguarding employee data. Unfortunately, it’s no longer safe to rely solely on these people for your data protection. The staff who are responsible for this work are usually overworked, and represent a single point of failure. The data they protect is also a target for criminals, since a university or research institute’s data represents a concentration of valuable information. As a result, the news media have reported increasing numbers of security breaches that involved the theft of valuable data. Ransomware is a growing problem and a particular concern. Whereas traditional computer hackers are most interested in stealing your data, a growing number of modern hackers may be more interested in preventing you from accessing your own data.
Note: Ransomware is software that encrypts data and other computer files so that you cannot access them without paying the hacker a large amount of money (the ransom) to provide you with the encryption key.
It’s also necessary to preserve more than just your data; there are many tangible and intangible things you should protect, and these are rarely included in your employer’s data backup and protection strategies. In part II of this article, I’ll describe things you should be doing by yourself, independent of what your employer is doing, to safeguard the results of your hard work. I’ll try to encourage you to develop backup strategies for these other things too.
 

Part I: backing up your data

Backup hierarchy

A successful backup strategy should include the following elements:
  • Ongoing backups as you work.
  • Near-line backups.
  • Offline backups.
  • Cloud-based (Internet) backups
Ongoing backups are copies of your work that you create as you work, often using automatic tools. These tools include specialized software such as the Time Machine software installed on Apple computers or Acronis True Image for Windows computer (https://www.acronis.com/). You can also create these backups manually. This approach sometimes stores backups on the same computer you’re using to create information, but a better solution is to store the data elsewhere, such as on a shared disk drive on your employer’s network or on a “cloud” storage site. (I’ll discuss cloud backups later in this section.)
In addition, most modern software lets you automatically save copies of the files that you’re working on. For example, Microsoft Word offers both automatic backups (in which it creates a copy each time you open a file) and automatic (autosave) backups at scheduled intervals (in which it saves changes in the file you’re currently working on). Although these features protect you if your program crashes and loses the data in memory, they won’t work if your hard disk fails or your entire computer is stolen or destroyed.
Near-line backups store copies of your information on something close (“near”) to your computer, such as a USB flash drive plugged into your computer or an external hard drive. They protect you against failures of your computer, but if your lab burns down or is destroyed by a hurricane, you’re going to lose those backups too. If the near-line storage is portable, so that you can bring it home with you at the end of the day, this provides some insurance against such problems. (Moving your backups to a different location is called “off-site backup”.) A laboratory fire won’t cause the loss of your data, but a hurricane that destroys your lab may also destroy your home. This is an important justification for cloud-based backups.
Offline backups are not available simply by connecting to your employer’s computer network. Typically, you must retrieve them from a storage site and specifically attach them to your computer. Examples include magnetic-tape drives for large backups and CD-ROM or DVD-R disks for backups less than about 5 gigabytes. The tapes are best for large volumes of data, but may be more fragile than other methods and less suitable for truly long-term storage. The disks are potentially more durable (though they too will eventually degrade), but have the additional advantage that they cannot be overwritten by ransomware.
Note: “Write protection” means that a file cannot be overwritten. This may be permanent, as in the case of a write-once DVD disk; temporary as a result of the hardware, as in the case of a flash drive with a hardware toggle that lets you switch between allowing and disallowing changes; or temporary as a result of the software, as in the case of changing the properties of a file to “read only”. The latter is similar to a hardware toggle, but is set through software and can be disabled by software or by a hacker.
Cloud (Internet) backups offer the advantage of off-site storage, so that if anything happens to your research facility, and the same catastrophe is sufficiently widespread to affect your home, your data will still be safe somewhere else in the world. In most cases, the data will be stored on multiple servers in different countries. These backups offer the protection of a full-time staff who are responsible for security, and the distribution of your data to multiple cities or countries means that the loss of any one copy is not serious; you can retrieve a copy from backups at other sites. The primary disadvantage of cloud backups is that such networks are not always available, and Murphy’s law suggests that they will become unavailable the one time you need them. Their security also isn’t foolproof; any network can be hacked by a sufficiently determined hacker.
Note: Smaller vendors of cloud storage services may not store your data at multiple, widely separated locations. When you choose a cloud storage vendor, check the details of their storage locations carefully to ensure that they meet your needs.

My strategy

Given this description of methods, how do I protect my data? I use the following strategies:
  • Ongoing backups: I have configured Word to automatically save a copy of my working file every 15 minutes. If my computer crashes, I lose no more than 15 minutes of work. Although you can set this to provide more frequent backups, this process creates large numbers of temporary files that Word only removes when you close the software for the day. If enough of these files accumulate, they can cause Word to crash.
  • Near-line backups: Every 45 to 60 minutes, I create a copy of the file I’m working on, and my Macintosh operating system adds a copy number to the filename. Then I copy that file to a flash drive. I use a different flash drive for every day of the week. In addition, my Macintosh is configured to run a complete backup of all changes on my computer every night using the built-in Time Machine software. (It’s also possible to create hourly backups, but I found that this slowed my computer and didn’t interact well with some software.)
  • Offline backups: Every week, I create a full backup of my data to a DVD-R and store it far away from my computer.
  • Cloud (Internet) backups: Every week, I copy all of my data manually to the DropBox service (http://www.dropbox.com).
I also create a clone (identical copy) of my computer’s hard drive every few months using an older computer so that if my computer is damaged or stolen, I can continue working from the old computer.

Protecting completed files

One way to create a protected version of your data is to compress it as a .zip or .tar archive before you begin working on a file. That way, if you accidentally damage the original file or if it’s damaged by malware, you can easily return to the original data.
Automate as much of the backup process as possible, since human nature tends to make us forget to do backups, particular when we’re tired or working late. Many backup services such as Acronis True Image (https://www.acronis.com/) and Backblaze (https://www.backblaze.com/) let you install software that creates ongoing backups of your data in your office or on their Internet storage network. Verify your backups immediately after they’re complete to ensure that you can actually reopen them. For example, open a few important files in the backup to ensure that the copy was created successfully and no files were missed. 
Note: If you work on confidential information (e.g., human medical data) or proprietary information (e.g., research related to patented information), don’t store that information outside your employer’s computer network without their explicit permission. Even if you do have their permission, encrypt the data (encode it) so that if a stranger gains access to the location where your files are stored, they cannot read the files. Store the encryption password somewhere safe; if you lose it, the encrypted data will generally be unrecoverable.
In the second part of this article, I’ll describe things other than data that you should safeguard using backups.
 

無料メルマガ登録

メールアドレス
お名前

これからも約2週間に一度のペースで、英語で論文を書く方向けに役立つコンテンツをお届けしていきますので、お見逃しのないよう、上記のフォームよりご登録ください。
 
もちろん無料です。

バックナンバー

第1回 if、in case、when の正しい使い分け:確実性の程度を英語で正しく表現する

第2回 「装置」に対する英語表現

第3回 助動詞のニュアンスを正しく理解する:「~することが出来た」「~することが出来なかった」の表現

第4回 「~を用いて」の表現:by と with の違い

第5回 技術英文で使われる代名詞のitおよび指示代名詞thisとthatの違いとそれらの使用法

第6回 原因・結果を表す動詞の正しい使い方:その1 原因→結果

第7回 原因・結果を表す動詞の使い方:その2 結果→原因

第8回 受動態の多用と誤用に注意

第9回 top-heavyな英文を避ける

第10回 名詞の修飾語を前から修飾する場合の表現法

第11回 受動態による効果的表現

第12回 同格を表す接続詞thatの使い方

第13回 「技術」を表す英語表現

第14回 「特別に」を表す英語表現

第15回 所有を示すアポストロフィー + s ( ’s) の使い方

第16回 「つまり」「言い換えれば」を表す表現

第17回 寸法や重量を表す表現

第18回 前置詞 of の使い方: Part 1

第19回 前置詞 of の使い方: Part 2

第20回 物体や物質を表す英語表現

第21回 句動詞表現より1語動詞での表現へ

第22回 不定詞と動名詞: Part 1

第23回 不定詞と動名詞の使い分け: Part 2

第24回 理由を表す表現

第25回 総称表現 (a, theの使い方を含む)

第26回研究開発」を表す英語表現

第27回 「0~1の数値は単数か複数か?」

第28回 「時制-現在形の動詞の使い方」

第29回  then, however, therefore, for example など接続副詞の使い方​

第30回  まちがえやすいusing, based onの使い方-分詞構文​

第31回  比率や割合の表現(ratio, rate, proportion, percent, percentage)

第32回 英語論文の書き方 総集編

第33回 Quality Review Issue No. 23 report, show の時制について​

第34回 Quality Review Issue No. 24 参考文献で日本語論文をどう記載すべきか​

第35回 Quality Review Issue No. 25 略語を書き出すときによくある間違いとは?​

第36回 Quality Review Issue No. 26 %と℃の前にスペースを入れるかどうか

第37回 Quality Review Issue No. 27 同じ種類の名詞が続くとき冠詞は付けるべき?!​

第38回 Quality Review Issue No. 22  日本人が特に間違えやすい副詞の使い方​

第39回 Quality Review Issue No. 21  previous, preceding, earlierなどの表現のちがい

第40回 Quality Review Issue No. 20 using XX, by XXの表現の違い

第41回 Quality Review Issue No. 19 increase, rise, surgeなど動詞の選び方

第42回 Quality Review Issue No. 18 論文での受動態の使い方​

第43回 Quality Review Issue No. 17  Compared with とCompared toの違いは?​

第44回 Reported about, Approach toの前置詞は必要か?​

第45回 Think, propose, suggest, consider, believeの使い分け​

第46回 Quality Review Issue No. 14  Problematic prepositions scientific writing: by, through, and with -3つの前置詞について​

第47回 Quality Review Issue No. 13 名詞を前から修飾する場合と後ろから修飾する場合​

第48回 Quality Review Issue No. 13 単数用法のThey​

第49回 Quality Review Issue No. 12  study, investigation, research の微妙なニュアンスのちがい

第50回 SinceとBecause 用法に違いはあるのか?

第51回 Figure 1とFig.1の使い分け

第52回 数式を含む場合は現在形か?過去形か?

第53回 Quality Review Issue No. 8  By 2020とup to 2020の違い

第54回 Quality Review Issue No. 7  high-accuracy data? それとも High accurate data? 複合形容詞でのハイフンの使用

第55回 実験計画について

第56回 参考文献について

第57回 データの分析について

第58回 強調表現について

第59回 共同研究の論文執筆について

第60回 論文の略語について

第61回 冠詞の使い分けについて

第62回 大文字表記について

第63回 ダッシュの使い分け

第64回 英語の言葉選びの難しさについて

第65回 過去形と能動態について

第66回 「知識の呪い」について

第67回 「文献の引用パート1」について

第68回 「文献の引用パート2」について

第69回 「ジャーナル用の図表の準備」について

第70回 「結論を出す ~AbstractとConclusionsの違い~」について

第71回 「研究倫理 パート1: 研究デザインとデータ報告」について

第72回 「研究倫理 パート2: 読者の時間を無駄にしない」について

第73回 「記号と特殊文字の入力」について

第74回 「Liner regression(線形回帰)は慎重に」について

第75回 「Plagiarism(剽窃)を避ける」について

第76回 研究結果がもたらす影響を考える

第77回 「データの解析(パート1):データ探索を行う」について

第78回 「データの解析(パート2):統計分析」について

第79回 「データの解析(パート3):データを提示する」について


〒300-1206
茨城県牛久市ひたち野西3-12-2
オリオンピアA-5

TEL 029-870-3307
FAX 029-870-3308
ワールド翻訳サービス スタッフブログ ワールド翻訳サービス Facebook ワールド翻訳サービスの動画紹介