Re: dwbp-ACTION-184: Review the existing template and identify any additional fields that could be added to improve the bp

This is taking the approach of a design pattern, which works very well when your readers have a specific problem that they know they need to address and are looking for a solution that’s already been well thought out. I could see a value in developing a set of patterns for publishing data on the web, but I think it differs a little from what’s called for in a best practices document. Design patterns work well when you know you have a problem. Best practices help you realize that something you never thought was a problem really is one. I think the latter are used more like a checklist, so that, at least in our case, one can answer the question “Am I doing everything I need to do to make my data usable on the web?” Design patterns answer the question, “How do I go about solving this common problem nicely without reinventing the wheel?” I could sort of imagine the suggestions for implementation being conceived as patterns, but that would probably require more detail than is called for in the context of a best practices document.
-Annette
--
Annette Greiner
NERSC Data and Analytics Services
Lawrence Berkeley National Laboratory
510-495-2935

On Jul 10, 2015, at 8:06 AM, Peter.Winstanley@scotland.gsi.gov.uk wrote:

> Colleagues
> 
> The logic of the pattern approach described in http://ifets.ieee.org/discussions/discuss_june2004.html  is as follows:
> --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> If I find myself in some *Context* like *Examples*, and I face this *Problem*, with these *Forces or constraints*, but my situation is different from these *Related Patterns*......
> 
> Then I should think like this *Rationale*. If I want this *Resulting Context* then I should follow this *Solution*.....
> 
> And here is a *Name* to help me remember this scenario, help chunk my thinking, and make my communication with others effective and efficient.
> -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> 
> Before I get cranking through the BPs completed to date I would appreciate your first impressions on this pattern of thinking.
> 
> Cheers
> 
> Peter
> 
> -----Original Message-----
> From: Data on the Web Best Practices Working Group Issue Tracker [mailto:sysbot+tracker@w3.org] 
> Sent: 10 July 2015 14:47
> To: public-dwbp-wg@w3.org
> Subject: dwbp-ACTION-184: Review the existing template and identify any additional fields that could be added to improve the bp
> 
> dwbp-ACTION-184: Review the existing template and identify any additional fields that could be added to improve the bp
> 
> http://www.w3.org/2013/dwbp/track/actions/184
> 
> Assigned to: Peter Winstanley
> 
> 
> 
> 
> 
> 
> 
> 
> 
> This email was scanned by the Government Secure Intranet anti-virus service supplied by Vodafone in partnership with Symantec.  (CCTM Certificate Number 2009/09/0052.)  In case of problems, please call your organisations IT Helpdesk.
> Communications via the GSi may be automatically logged, monitored and/or recorded for legal purposes.
> 
> *********************************** ********************************
> This email has been received from an external party and
> has been swept for the presence of computer viruses.
> ******************************************************************** 
> 
> **********************************************************************
> This e-mail (and any files or other attachments transmitted with it) is intended solely for the attention of the addressee(s). Unauthorised use, disclosure, storage, copying or distribution of any part of this e-mail is not permitted. If you are not the intended recipient please destroy the email, remove any copies from your system and inform the sender immediately by return.
> 
> Communications with the Scottish Government may be monitored or recorded in order to secure the effective operation of the system and for other lawful purposes. The views or opinions contained within this e-mail may not necessarily reflect those of the Scottish Government.
> 
> 
> Tha am post-d seo (agus faidhle neo ceanglan  còmhla ris) dhan neach neo luchd-ainmichte a-mhàin. Chan eil e ceadaichte a chleachdadh ann an dòigh sam bith, a’ toirt a-steach còraichean, foillseachadh neo sgaoileadh,  gun chead. Ma ’s e is gun d’fhuair sibh seo le gun fhiosd’, bu choir cur às dhan phost-d agus lethbhreac sam bith air an t-siostam agaibh, leig fios chun  neach a sgaoil am post-d  gun dàil.  
> 
> Dh’fhaodadh gum bi teachdaireachd sam bith bho Riaghaltas na h-Alba air a chlàradh neo air a sgrùdadh airson dearbhadh gu bheil an siostam ag obair gu h-èifeachdach neo airson adhbhar laghail eile. Dh’fhaodadh nach  eil beachdan anns a’ phost-d seo co-ionann ri beachdan Riaghaltas na h-Alba. 
> **********************************************************************
> 
> 
> 
> The original of this email was scanned for viruses by the Government Secure Intranet virus scanning service supplied by Vodafone in partnership with Symantec. (CCTM Certificate Number 2009/09/0052.) This email has been certified virus free.
> Communications via the GSi may be automatically logged, monitored and/or recorded for legal purposes.
> 

Received on Friday, 10 July 2015 20:47:08 UTC