{"id":5688,"date":"2020-12-03T06:33:54","date_gmt":"2020-12-03T06:33:54","guid":{"rendered":"https:\/\/dev.wissenschaftliche-integritaet.de\/kommentare\/dokumentation-von-forschungssoftware\/"},"modified":"2021-06-11T08:10:14","modified_gmt":"2021-06-11T08:10:14","slug":"research-software-documentation","status":"publish","type":"kommentare","link":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/","title":{"rendered":"Research software documentation"},"content":{"rendered":"\n<p>Reproducibility is another important issue in connection with research software. In addition to the source code as mentioned in the explanations (Level 2), it is also important to document and archive the design of the software, and where applicable the compiler, the operating system and information on its use, as well as the applicable data, rights systems, governance structures and entire virtual machines.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reproducibility is another important issue in connection with research software. In addition to the source code as mentioned in the explanations (Level 2), it is also important to document and archive the design of the software, and where applicable the compiler, the operating system and information on its use, as well as the applicable data, [&hellip;]<\/p>\n","protected":false},"featured_media":0,"menu_order":0,"template":"","kommentar_cats":[257],"kommentar_tags":[176,191,201],"class_list":["post-5688","kommentare","type-kommentare","status-publish","hentry","kommentar_cats-general","kommentar_tags-archiving","kommentar_tags-documentation","kommentar_tags-research-software"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Research software documentation - Wissenschaftliche Integrit\u00e4t<\/title>\n<meta name=\"description\" content=\"In addition to the source code as mentioned in the explanations (Level 2), it is also important to document and archive the design of the software, and where applicable the compiler [\u2026].\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research software documentation - Wissenschaftliche Integrit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"In addition to the source code as mentioned in the explanations (Level 2), it is also important to document and archive the design of the software, and where applicable the compiler [\u2026].\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/\" \/>\n<meta property=\"og:site_name\" content=\"Wissenschaftliche Integrit\u00e4t\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-11T08:10:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.wissenschaftliche-integritaet.de\/wp-content\/uploads\/2020\/02\/dfg-wissenschaftliche-integritaet-defaultimage.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2324\" \/>\n\t<meta property=\"og:image:height\" content=\"1474\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/en\\\/comments\\\/research-software-documentation\\\/\",\"url\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/en\\\/comments\\\/research-software-documentation\\\/\",\"name\":\"Research software documentation - Wissenschaftliche Integrit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/#website\"},\"datePublished\":\"2020-12-03T06:33:54+00:00\",\"dateModified\":\"2021-06-11T08:10:14+00:00\",\"description\":\"In addition to the source code as mentioned in the explanations (Level 2), it is also important to document and archive the design of the software, and where applicable the compiler [\u2026].\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/en\\\/comments\\\/research-software-documentation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/en\\\/comments\\\/research-software-documentation\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/en\\\/comments\\\/research-software-documentation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research software documentation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/#website\",\"url\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/\",\"name\":\"Wissenschaftliche Integrit\u00e4t\",\"description\":\"Sicherung guter wissenschaftlicher Praxis\",\"publisher\":{\"@id\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/#organization\",\"name\":\"Deutsche Forschungsgemeinschaft e.V.\",\"url\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/GWP-Logo-v20200213@2x.png\",\"contentUrl\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/GWP-Logo-v20200213@2x.png\",\"width\":252,\"height\":70,\"caption\":\"Deutsche Forschungsgemeinschaft e.V.\"},\"image\":{\"@id\":\"https:\\\/\\\/dev.wissenschaftliche-integritaet.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research software documentation - Wissenschaftliche Integrit\u00e4t","description":"In addition to the source code as mentioned in the explanations (Level 2), it is also important to document and archive the design of the software, and where applicable the compiler [\u2026].","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/","og_locale":"en_US","og_type":"article","og_title":"Research software documentation - Wissenschaftliche Integrit\u00e4t","og_description":"In addition to the source code as mentioned in the explanations (Level 2), it is also important to document and archive the design of the software, and where applicable the compiler [\u2026].","og_url":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/","og_site_name":"Wissenschaftliche Integrit\u00e4t","article_modified_time":"2021-06-11T08:10:14+00:00","og_image":[{"width":2324,"height":1474,"url":"https:\/\/dev.wissenschaftliche-integritaet.de\/wp-content\/uploads\/2020\/02\/dfg-wissenschaftliche-integritaet-defaultimage.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/","url":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/","name":"Research software documentation - Wissenschaftliche Integrit\u00e4t","isPartOf":{"@id":"https:\/\/dev.wissenschaftliche-integritaet.de\/#website"},"datePublished":"2020-12-03T06:33:54+00:00","dateModified":"2021-06-11T08:10:14+00:00","description":"In addition to the source code as mentioned in the explanations (Level 2), it is also important to document and archive the design of the software, and where applicable the compiler [\u2026].","breadcrumb":{"@id":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/comments\/research-software-documentation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/"},{"@type":"ListItem","position":2,"name":"Research software documentation"}]},{"@type":"WebSite","@id":"https:\/\/dev.wissenschaftliche-integritaet.de\/#website","url":"https:\/\/dev.wissenschaftliche-integritaet.de\/","name":"Wissenschaftliche Integrit\u00e4t","description":"Sicherung guter wissenschaftlicher Praxis","publisher":{"@id":"https:\/\/dev.wissenschaftliche-integritaet.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.wissenschaftliche-integritaet.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dev.wissenschaftliche-integritaet.de\/#organization","name":"Deutsche Forschungsgemeinschaft e.V.","url":"https:\/\/dev.wissenschaftliche-integritaet.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dev.wissenschaftliche-integritaet.de\/#\/schema\/logo\/image\/","url":"https:\/\/dev.wissenschaftliche-integritaet.de\/wp-content\/uploads\/2020\/02\/GWP-Logo-v20200213@2x.png","contentUrl":"https:\/\/dev.wissenschaftliche-integritaet.de\/wp-content\/uploads\/2020\/02\/GWP-Logo-v20200213@2x.png","width":252,"height":70,"caption":"Deutsche Forschungsgemeinschaft e.V."},"image":{"@id":"https:\/\/dev.wissenschaftliche-integritaet.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentare\/5688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentare"}],"about":[{"href":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/types\/kommentare"}],"version-history":[{"count":2,"href":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentare\/5688\/revisions"}],"predecessor-version":[{"id":6777,"href":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentare\/5688\/revisions\/6777"}],"wp:attachment":[{"href":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/media?parent=5688"}],"wp:term":[{"taxonomy":"kommentar_cats","embeddable":true,"href":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentar_cats?post=5688"},{"taxonomy":"kommentar_tags","embeddable":true,"href":"https:\/\/dev.wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentar_tags?post=5688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}