CORD-19:f20c8063e9b843c787707e5fc938200b3fd14ebf / 202513-202786
Annnotations
{"target":"https://pubannotation.org/docs/sourcedb/CORD-19/sourceid/f20c8063e9b843c787707e5fc938200b3fd14ebf","sourcedb":"CORD-19","sourceid":"f20c8063e9b843c787707e5fc938200b3fd14ebf","text":"This is doubly important when working across different organizations that impose the added complexity not only of different networks and hardware, but also of different levels of security that may occasion various, and possibly conflicting, needs for secure communications.","tracks":[{"project":"CORD-19_Custom_license_subset","denotations":[{"id":"T21","span":{"begin":0,"end":273},"obj":"Sentence"}],"attributes":[{"subj":"T21","pred":"source","obj":"CORD-19_Custom_license_subset"}]},{"project":"CORD-19-Sentences","denotations":[{"id":"T15677","span":{"begin":0,"end":273},"obj":"Sentence"}],"namespaces":[{"prefix":"_base","uri":"http://pubannotation.org/ontology/tao.owl#"}],"attributes":[{"subj":"T15677","pred":"source","obj":"CORD-19-Sentences"}]},{"project":"Epistemic_Statements","denotations":[{"id":"T778","span":{"begin":0,"end":273},"obj":"Epistemic_statement"}],"attributes":[{"subj":"T778","pred":"source","obj":"Epistemic_Statements"}]}],"config":{"attribute types":[{"pred":"source","value type":"selection","values":[{"id":"CORD-19_Custom_license_subset","color":"#93a5ec","default":true},{"id":"CORD-19-Sentences","color":"#bfec93"},{"id":"Epistemic_Statements","color":"#ec93d9"}]}]}}