Claim Ownership


Subscribed: 0Played: 0


DIKW pyramid / DIKW hierarchy -"Data becomes information when it is stored *in* a given *formation*."From B. Fong and D. I. Spivak, “Seven Sketches in Compositionality: An Invitation to Applied Category Theory,” Ch. 3 - Databases, arXiv, Oct. 12, 2018. doi: 10.48550/arXiv.1803.05316."There are only three things we can do with data. We can accrete data by adding it to an existing collection, reduce data by discarding information from an existing collection, or reshape data by placing it in a different kind of collection."From Z. Tellman, *Elements of Clojure*, Ch. 4 - Composition. Monee, IL:, 2019.types of information: situational, methodological, philosophical (epistemological, axiological, ontological)From Dorian Taylor, "2022-05-11 types of information", (May 11, 2022). Accessed: Sep. 27, 2022. [Online Video]. Available: vs deductions vs abductionsInformed by M. K. Bergman, A Knowledge Representation Practionary: Guidelines Based on Charles Sanders Peirce. Cham: Springer International Publishing, 2018. doi: 10.1007/978-3-319-98092-8."programs must be written for people to read, and only incidentally for machines to execute."From preface to first edition (and included in subsequent editions) of H. Abelson, G. J. Sussman, and J. Sussman, *Structure and interpretation of computer programs*, Cambridge, Mass.: MIT Press.
I Fought the Law

I Fought the Law


`.split()`s on strings and `filter`s on `None`I fought the Law and the Law wonI fought the Law and the Law wonI needed spec compliance; I got noneI fought the Law and the Law wonI fought the Law and the Law wonI varied my output with the latest fadBreakin' every downstream runNeeded Postel more than I ever hadI fought the Law and the Law wonI fought the Law and theScatterin' parsing like a shotgunI fought the Law and the Law wonI fought the Law and the Law wonI lost robustness and I lost my funI fought the Law and the Law wonI fought the Law and the Law wonI varied my output with the latest fadBreakin' every downstream runNeeded Postel more than I ever hadI fought the Law and the Law wonI fought the Law and the
Martynas Jusevičius

Martynas Jusevičius


- Linked Data- Project Jupyter (Notebook, Lab, etc.)- UI Blocks: Block Protocol- Personal Knowledge Graphs: Roam, Logseq, Obsidian- Solid: decentralized data stores- Resource Description Framework (RDF)- Twitter: Martynas, AtomGraph- LinkedDataHub (Apache-2.0 license)- AtomGraph: Website, GitHub
FAIR-Enabling Services

FAIR-Enabling Services


I was thinking about FAIR-enabling resources and wanted to distinguish between things that actually have to be running in order for data to be alive and for you to actually find it, access it, interoperate with it, and reuse it, versus "one-time" things that those services will need.
Just about a week ago,I set out to download.Seekin' supplementary data,lookin' for a pot of gold.Things got bad, and things got worse,I guess you will know the tune.Oh lord, stuck data mining again.Rode in on semantics,I'll be hand-waving out if I go.Trying controlled vocabularies,must've been seven of 'em or more.No corresponding authorshave replied to my emails yet.Oh lord, I'm stuck data mining again.The man from Stack Overflowsaid I was on my way.My code kept raising exceptions.I was reading tracebacks for days.I wanted to run a one-off benchmark.Looks like my plans fell through.Oh lord, stuck data mining again.If I only had metadatathat was machine-actionableevery time I've had a datasetthat I's told was interoperable.You know I'd catch the FAIR trainand breeze through my planned reuse.Oh lord, I'm stuck data mining again.Oh lord, I'm stuck data mining again.
Don't Silo Me In

Don't Silo Me In


Oh give me mappings, lots of mappings, with resolving URIs. Don’t silo me in.Let me prance through semantics of namespaces that I love. Don’t silo me in.Let me use an open protocol to access these bytes, and for metadata promise me you’ll keep on the lights. Authenticate me repeatedly, but give clear usage rights. Don’t silo me in.Just give me data bare. Let me reuse my old CPUs and mint my URIs.With my own software, let me wander over yonder with least surprise.I want to probe the provenance of metadata rich and plural, and represent my knowledge to be machine actionable. And I can’t look at schemas if they’re not interoperable. Don’t silo me in.
Shreyas Cholia

Shreyas Cholia


* [Materials Project](* [Environmental Systems Science Data Infrastructure for a Virtual Ecosystem (ESS-DIVE)](* [National Microbiome Data Collaborative (NMDC)](* [W3C Provenance (PROV) specs](* [Research Equals (R=)](* [JSON-LD](* [Ecological Metadata Language (EML)](* [DataCite](* [OSTI](* [DOI](** [OAuth](* [OpenID Connect (OIDC)](* [OpenAPI](* [REST](* [IGSN](* [Data Observation Network for Earth (DataONE)](* [Frictionless Data](
Patrick Huck

Patrick Huck


Materials Project (MP) website: Materials Discovery (NOMAD) Laboratory: Roles Taxonomy: resources (FAIR A1.2):- Department of Energy resources:- Office of Scientific and Technical Information (OSTI) Data ID Service: with Patrick:-
The FAIR Implementation Profile (FIP) Ontology:
Linked Open Vocabularies (LOV): of Linked Open Vocabularies (LOV): of Open Scholarly Infrastructure (POSI): Component 1: Entities/Activities:Type: EntityType: ActivityRelation: Generation/Invalidation (E-Act)Relation: Usage (Act-E)Relation: Communication (Act1-[E]-Act2)Relation: Trigger/Starter of Start of Act (trigger E, starter Act)Relation: Trigger/Ender of End of Act End of Act (trigger E, ender Act)# Component 2: Derivations:Relation: Derivation (E-E, E-Act)Relation: Revision (E-E)Relation: Quotation (E-E)Relation: Primary Source (E-E)# Component3 : Agents, Responsibility, and InfluenceType: AgentRelation: Attribution (E-Agt)Relation: Association (Act-Agt (role), Act-E (plan))Relation: Delegation (Agt-Act) - acted on behalf ofRelation: Influencer/Influencee ({E,Act,Agt}-[usage,start,end,generation,invalidation,communication,derviation,attribution,association,delgation]-{E,Act,Agt})3 core types: entities, activities, agents. “instantaneous events” are put in context of activities.wrt "time instants":- generation is at instant of completion of production- usage is at instant of beginning of utilization- start, when activity is deemed started, is an instant- end, when activity is deemed ended, is an instant- invalidation is at instant of start of destruction, cessation, or expiry10 influencing relations (not including 3 included subtypes of derivation - (1) [was] revision [of], (2) quotation ("was quoted from"), (3) [had] primary source).
The Creative Commons suite of licenses: CC0, CC BY, CC BY-SA, CC-BY-ND, CC BY-NC, CC BY-NC-SA, CC BY-NC-ND.Code licenses: Server Side Public License, Affero GPL (AGPL), Lesser GPL (LGPL), Mozilla Public License (MPL), Business Source License (used e.g. by Sentry, <>), Elastic License (for Elasticsearch), Apache 2.0, BSD, MIT. Spectrum of user freedom and redistributor freedom."The CRAPL: An academic-strength open source license": <>
In the W3C Provenance Ontology: HTML Anchor Element:
Heather Hedden, "Foundation for a Knowledge Graph Taxonomy Design Best Practices", slides at Petkova, "The Dialogic Potential of the Web of Data", slides at Berners-Lee's bag of chips
GUPRIs, RDF, RDFS, OWL, SHACL, JSON, JSON-LD, JSON Schema, ActivityPub, "fediverse", XMPP, SMTP.
Archival Resource Key (ARK) specification (section on policy metadata): Levels and the Archives for NIH NLM's Permanent Web Documents:
A brief dip into the world of HTTP auth. The Authorization request header. The WWW-Authenticate response header. Basic authentication. Bearer-based authentication. Authenticating securely. Shared secrets versus asymmetric encryption (for non-repudiation).
Protocol versus implementation. HTTP, SMTP, Zulip.
You want to avoid protocols with limited implementation, poor documentation, and, when possible, components involving human intervention.It may not be possible to provide secure access through a fully mechanized protocol like HTTP, for example, for highly sensitive data. However, the protocol  must be clear and explicit in the metadata, whether it involves a verbal request, email, telephone number, Slack username, et cetera.The important thing is that the communication protocol for how to access is explicit and clearly defined in the metadata, whether fully mechanized or not.
Download from Google Play
Download from App Store