Cyberinfrastructure Key Tenets

Based on the principles of minimal computing in Digital Humanities and the broader concepts of cyberinfrastructure and open source, here are some key mindsets, non-negotiables, and questions to consider as you build your own cloud and digital infrastructure:

Mindsets:

  1. Sustainability-focused: Prioritize long-term viability over short-term gains.
  2. Resource-conscious: Be mindful of hardware, software, and energy constraints.
  3. Accessibility-driven: Ensure your work is accessible to a wide range of users and contexts.
  4. Open and transparent: Embrace open-source solutions and share your process.
  5. Security-aware: Prioritize cybersecurity in all aspects of your infrastructure.

Non-negotiables:

  1. Use of open standards and protocols
  2. Regular security updates and patches
  3. Data backup and recovery plans
  4. Documentation of all processes and decisions
  5. Respect for user privacy and data protection

Key Questions:

  1. What do we need? (Identify essential components)
  2. What do we have? (Assess available resources)
  3. What must we prioritize? (Determine critical features)
  4. What are we willing to give up? (Identify acceptable trade-offs)
  5. How can we ensure long-term sustainability?
  6. How can we make our infrastructure more accessible?
  7. What are the security implications of our choices?
  8. How can we minimize environmental impact?
  9. How can we contribute back to the open-source community?
  10. How will our choices affect collaboration and interoperability?

By keeping these mindsets, non-negotiables, and questions at the forefront as you build your infrastructure, you'll be better equipped to create a sustainable, secure, and accessible system that aligns with the principles of minimal computing and open science.

Citations:
[1] https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/3405233/0d9ad563-56d9-47fa-b350-2c3b98773c63/Introduction-to-a-Self-Managed-Life.md
[2] https://www.advisenltd.com/wp-content/uploads/2017/01/take-back-control-of-cybersecurity-2017-01.pdf
[3] https://pmc.ncbi.nlm.nih.gov/articles/PMC5817638/
[4] https://www.digitalhumanities.org/dhq/vol/16/2/000646/000646.html
[5] https://go-dh.github.io/mincomp/about/
[6] https://ideah.pubpub.org/pub/mf7o4gk5/release/2
[7] https://www.cyberdefensemagazine.com/newsletters/december-2023/files/downloads/CDM-CYBER-DEFENSE-eMAGAZINE-December-2023.pdf
[8] https://nsf-gov-resources.nsf.gov/pubs/2007/nsf0728/nsf0728.pdf
[9] https://cra.org/crn/wp-content/uploads/sites/7/2023/10/October-CRN.pdf
[10] https://repository.cshl.edu/id/eprint/40950/1/2023_Swetnam_CyVerse_Cyberinfrastructure_for_Open_Science.pdf
[11] https://www.files.ethz.ch/isn/175686/Book-029.pdf
[12] https://www.nsf.gov/pubs/2012/nsf12113/nsf12113.htm
[13] https://waml.org/waml-information-bulletin/volume-52-number-3/a-minimal-computing-case-study-the-la-city-planning-digitization-project/
[14] https://jntry.work/minimalcomputing/
[15] https://www.tandfonline.com/doi/full/10.1080/17439884.2024.2435200
[16] https://www.digitalhumanities.org/dhq/vol/16/2/000596/000596.html
[17] https://dhanswers.ach.org/topic/questions-to-facilitate-design-of-digital-humanities-projects/
[18] https://sas-dhrh.github.io/dhcc-toolkit/toolkit/minimal-computing.html
[19] https://palimpsest.stmarytx.edu/thanneken/2023/ach/text.html