http://www.w3.org/ns/prov#value | - ed that other methods well known in the art can alternately or additionally be used to determine information to populate the artifacts schema, such as the availability of Active-X or Java, if the pre-authentication interrogation of the client environment does not report on them.
|