Browse Definitions :
Definition

RELAX NG (RELAX Next Generation)

RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard. Whereas XML Schema has the reputation of being convoluted and verbose, RELAX NG is easy to learn, use, and master. Furthermore, RELAX NG offers both an XML syntax and a compact non-XML syntax, supports XML namespace s, and does not alter the information set for any XML document it processes. Like XML Schema, RELAX NG works with XML Schema Datatypes and can draw on the expressive power of that markup to create complex data types that may then be instantiated in governing documents.

RELAX NG is an OASIS development project and the subject of ISO/IEC standard 19757-2. The standard is based on an earlier version of RELAX and another schema language called TREX, both of which were developed by SGML and XML contributor James Clark.

Clark's recent work, which centers around RELAX NG, includes:

  • Jing, an Open Source validator for RELAX NG
  • DTDinst, a toolkit for converting XML DTDs into RELAX NG
  • TRANG, a Java program that translates RELAX NG documents into numerous other formats
  • An XML mode for GNU Emacs that offers incremental XML parsing and RELAX NG validation capabilities.
This was last updated in December 2007

Continue Reading About RELAX NG (RELAX Next Generation)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close