Listen "A1: (Meta)data are retrievable by their identifier using a standardized communication protocol"
Episode Synopsis
You want to avoid protocols with limited implementation, poor documentation, and, when possible, components involving human intervention.It may not be possible to provide secure access through a fully mechanized protocol like HTTP, for example, for highly sensitive data. However, the protocol must be clear and explicit in the metadata, whether it involves a verbal request, email, telephone number, Slack username, et cetera.The important thing is that the communication protocol for how to access is explicit and clearly defined in the metadata, whether fully mechanized or not.
More episodes of the podcast Machine-Centric Science
Sandra Gesing
17/02/2023
Christophe Blanchi
18/01/2023
Vineeth Venugopal
31/10/2022
walk-and-talk: DIKW pyramid/hierarchy
27/09/2022
I Fought the Law
07/09/2022
Martynas Jusevičius
29/08/2022
FAIR-Enabling Services
18/08/2022
Stuck Data Mining Again (Lodi)
09/08/2022
Don't Silo Me In
04/08/2022
Shreyas Cholia
29/07/2022
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.