You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a digital archivist at BDRC, I would like to asses SCAM and compare the costs of its workflow against the outside vendor that BDRC uses. (@jimk-bdrc - write DDD workflow rubric).
To do that, AO needs to walk through the complete cycle of SCAMming a work, without being interrupted for training in how to use it.
A User's Guide to SCAM would facilitate this process. It should document:
preparation requirements - what folder structures, how to prepare for transmission
Sending to scam:
format
authorization private (Not public in the repo)
location - private
Invoking scam
endpoint/resource URI (may be private)
credentials - private
invocation
Reviewing output:
endpoint/resource URI - private
credentials - private
invocation
Downloading / transferring
endpoint/resource URI
credentials
invocation
Define resulting format
The text was updated successfully, but these errors were encountered:
As a digital archivist at BDRC, I would like to asses SCAM and compare the costs of its workflow against the outside vendor that BDRC uses. (@jimk-bdrc - write DDD workflow rubric).
To do that, AO needs to walk through the complete cycle of SCAMming a work, without being interrupted for training in how to use it.
A User's Guide to SCAM would facilitate this process. It should document:
The text was updated successfully, but these errors were encountered: