The bracket racket

GCN Insider | Trends & technologies that affect the way government does IT

The standards bodies have been busy of late. Both the
Organization for the Advancement of Structured Information
and the World Wide Consortium are
incorporating new Extensible Markup Language-based schema
extensions into their portfolios. Such approval paves the way for
interoperability of products built on these standards.

An OASIS working group has approved Version 1 of the Emergency
Data Exchange’s Language Hospital Availability
as a committee draft. HAVE will allow hospitals to
publish status information on the number of available beds and
other services. Such information could be used by hospitals and
first responders to better plan during a disaster. According to the
specification, hospitals now largely use commercial Web systems for
this task, which lack the facilities to export the data to new
systems or get material to external personnel.

The W3C has put up a few emerging XML protocols as proposed
standards. Among the newly anointed is Version 2 of the
Extensible Stylesheet Language Transformation. XSLT styles
sheets can be used to render XML-encoded data into a viewable form
for a browser. XSLT also can be used to translate XML data into
another schema so the data can be used by other systems.

Also proposed are XML Query, a database query language
for conducting database-style queries against XML documents, and
XPath, a model for hierarchically arranging data

About the Author

Joab Jackson is the senior technology editor for Government Computer News.


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected