Glink Script Reference

Total Page:16

File Type:pdf, Size:1020Kb

Glink Script Reference TM G&RGLINK PROFESSIONAL EDITION ENTERPRISE EDITION Script Reference G&R GALLAGHER http://www.glink.com/glink/ ROBERTS ON Microsoft, Windows, MS are registered trademarks of Microsoft Corp. IBM and PC are registered trademarks of IBM Corp. Glink Enterprise Edition, version 8.6 Glink Professional Edition, version 8.6 © Gallagher & Robertson A/S 1987-2019 All Rights Reserved GALLAGHER & ROBERTSON A/S, Grini Næringspark 3, N-1361 Oslo, Norway Tel: +47 23357800 www: http://www.glink.com/ e-mail: [email protected] Contents Contents Contents ................................................................................................ i General ................................................................................................. 1 Overview ......................................................................................................... 1 Starting a script ............................................................................................... 2 Script directories ............................................................................................. 5 Script file format ............................................................................................. 6 Nesting of scripts ............................................................................................. 7 Compiled scripts .............................................................................................. 7 Termination script ........................................................................................... 8 Script variables ................................................................................. 11 Normal variables ........................................................................................... 11 Numeric variables ......................................................................................... 12 Built-in variables ........................................................................................... 13 The $STATUS variable ........................................................................... 19 Pattern variables ............................................................................................ 19 File variables ................................................................................................. 20 Script command categories .............................................................. 21 Alphanumeric handling ................................................................................. 21 Compiler and debugging commands ............................................................. 21 Configuration control .................................................................................... 22 Control structures .......................................................................................... 23 Dial directory ................................................................................................ 23 File I/O commands ........................................................................................ 24 File transfer and control ................................................................................ 24 Host interaction commands ........................................................................... 25 Key definitions and handling ......................................................................... 26 Menu handling ............................................................................................... 26 Screen and cursor control .............................................................................. 27 System-related commands ............................................................................. 27 Timing commands ......................................................................................... 28 User input commands .................................................................................... 28 Variable handling commands ........................................................................ 28 Gallagher & Robertson Glink: Script Reference i Contents Windows-specific commands ........................................................................ 29 Commands for backwards compatibility ....................................................... 30 Script commands .............................................................................. 31 The #ELSE directive ..................................................................................... 31 The #ENDIF directive ................................................................................... 31 The #IFDEF directive ................................................................................... 32 The #IFNDEF directive ................................................................................. 33 The ABORT command ................................................................................. 33 The ACTIVATE command ........................................................................... 33 The ADD command ...................................................................................... 34 The ADDMENU command ........................................................................... 34 The ADMSHELL command ......................................................................... 35 The APPEND command ............................................................................... 35 The ASSIGN command ................................................................................. 35 The BEEP command ..................................................................................... 36 The BEGIN command ................................................................................... 36 The BINARY command ................................................................................ 36 The BREAK command ................................................................................. 37 The BUILDMENU command ....................................................................... 37 The BUTTON command ............................................................................... 38 The CALC command .................................................................................... 40 The CALL command ..................................................................................... 41 The CAPTURE command ............................................................................. 42 The CASE command ..................................................................................... 42 The CD command ......................................................................................... 43 The CFIX command ...................................................................................... 44 The CFXW command ................................................................................... 44 The CHAIN command .................................................................................. 44 The CHANNEL command ............................................................................ 45 The CLEAR command .................................................................................. 45 The CMPNUM command ............................................................................. 45 The COMPARE command ............................................................................ 46 The CONCAT command ............................................................................... 46 The CONFIG command ................................................................................ 47 The CONNECT (modem) command ............................................................. 47 The CONTEXT command ............................................................................ 48 The CONVERSE command .......................................................................... 49 The COPY command .................................................................................... 49 The CRDB command .................................................................................... 49 The CRDW command ................................................................................... 50 The CREAD command.................................................................................. 50 The CRLF command ..................................................................................... 50 ii Glink: Script Reference Gallagher & Robertson Contents The CSWITCH command ............................................................................. 51 The CTYPE command .................................................................................. 51 The CURSOR command ............................................................................... 52 The CXRESTORE command ........................................................................ 52 The CXSAVE command ............................................................................... 53 The DBOX command .................................................................................... 53 The DCHANGE command ............................................................................ 54 The DDEADVISE command ........................................................................ 55 The DDECLOSE command .......................................................................... 55 The DDEEXECUTE command ..................................................................... 55 The DDENAME command ........................................................................... 56 The DDEOPEN command ...........................................................................
Recommended publications
  • Portable Paper
    Volume 2, Number 2 The HP Portable/Portable Plus Users Newsletter March / April, 1987 PortableTHE Paper Special Feature: Database Software Management Publisher's Message ...................... I Special Feature: Database Management Letters Software Charge Portable Off Car Lighter .............. 2 Introduction ............................ 16 Portable To Macintosh ..................... 4 Database Management Product Summary ...... 16 110% Lotus As A Database Manager . 18 New HP Portable? ......................... '; Executive Card Manager ................... 18 Updates on Personalized Software Products ..... 5 dBASE II ............................... 22 Buying Disks ............................ 6 Turbo Pascal Toolbox ..................... 2-} X-rays And The Portable .................... 6 PC File III .............................. 24 More Info On Backlighting ................. 33 T/Master ............................... 25 HP-IL Link Program ........ .............. 33 Condor Junior .......................... 25 Foundations Conclusion ............................. 25 Built-in Self-Test .......................... 8 PLUS Notes Six Ways To Restart Your Portable ............. 8 Lotus 2.01 and HAL ...................... 25 Getting Program To Run . ..... 8 B Drive RAM Cards With Greater Capacity ........... 26 EPROM Update .......................... 26 DOS AID Software Drawer & SPC ................ 27 Bypassing PAM ............................ 11 1erminal Through The Looking Glass ............ 27 CompuServe Autologon, Uploading Revisited ....
    [Show full text]
  • THE FUTURE of SCREENS from James Stanton a Little Bit About Me
    THE FUTURE OF SCREENS From james stanton A little bit about me. Hi I am James (Mckenzie) Stanton Thinker / Designer / Engineer / Director / Executive / Artist / Human / Practitioner / Gardner / Builder / and much more... Born in Essex, United Kingdom and survived a few hair raising moments and learnt digital from the ground up. Ok enough of the pleasantries I have been working in the design field since 1999 from the Falmouth School of Art and onwards to the RCA, and many companies. Ok. less about me and more about what I have seen… Today we are going to cover - SCREENS CONCEPTS - DIGITAL TRANSFORMATION - WHY ASSETS LIBRARIES - CODE LIBRARIES - COST EFFECTIVE SOLUTION FOR IMPLEMENTATION I know, I know, I know. That's all good and well, but what does this all mean to a company like mine? We are about to see a massive change in consumer behavior so let's get ready. DIGITAL TRANSFORMATION AS A USP Getting this correct will change your company forever. DIGITAL TRANSFORMATION USP-01 Digital transformation (DT) – the use of technology to radically improve performance or reach of enterprises – is becoming a hot topic for companies across the globe. VERY DIGITAL CHANGING NOT VERY DIGITAL DIGITAL TRANSFORMATION USP-02 Companies face common pressures from customers, employees and competitors to begin or speed up their digital transformation. However they are transforming at different paces with different results. VERY DIGITAL CHANGING NOT VERY DIGITAL DIGITAL TRANSFORMATION USP-03 Successful digital transformation comes not from implementing new technologies but from transforming your organisation to take advantage of the possibilities that new technologies provide.
    [Show full text]
  • File Management
    File management Information about file management How to use the SFTP Wrapper Advanced: WinSCP SFTP Guide Advanced: CyberDuck SFTP Guide Restoring Backups Installation Locations File Manager How to use the SFTP Wrapper To quickly load up WinSCP, you can use our wrapper to automatically launch WinSCP and log you in without messing around with usernames/passwords/ports/protocols etc. It's super easy!* Our wrapper is currently Windows only; if you would like information on how to access your files using one of our other sFTP guides. Our wrapper is currently Windows only; if you would like information on how to access your files please see one of our other sFTP guides. 1. Make sure you have .NET Framework 4.0 (or higher) installed from Microsoft's website. This is needed for the wrapper to work properly. If your computer is on Windows 8 or later, you already have it! 2. Download and run it by clicking here: here NOTE: CLOSE THE PROGRAM AFTER INSTALLATION. 1. Head on over back to the "Service" > "Access" page and click the "Download" button and then confirm you have read the very serious warning, and click "Download" again. This will download your chPPK file, a tiny little file crammed with information on how to connect to your system. Note: If clicking the sFTP wrapper install URL shows a page full of text. You will need to go back and Right Click > Save As, and run the wrapper application from your download folder. Some browsers/browser versions will not automatically download this .application file. 2.
    [Show full text]
  • Data File Manager
    Data File Manager Welcome to Data File Manager! Thank you for using the data file manager. Highlights of the data file manager are as follows: Intuitive operability Buttons on the tool menu, drag & drop, and context menu with a right click are supported to use each function. Tree view for data in SD memory card Files and folders in SD memory card are shown in a tree structure and target files can easily be found. Operations for files and folders Files and folders can be added, renamed or deleted. PLC maintenance Viewing the PLC status, such as Run/Stop state or error status, downloading/uploading user programs, or upgrading the system software of the PLC are supported. MICRO/I maintenance Viewing the target information, such as system software version or external memory device information, or downloading/uploading project is supported. Notes - Data File Manager There are the following notes when you use Data File Manager: Supported hardware Data File Manager supports the following hardware: FC4A series MICROSmart FC5A series MICROSmart Pentra FC6A series MICROSmart FT1A series SmartAXIS expect FT1A Touch HG3G/4G series MICRO/I HG2G-5F series MICRO/I HG2G-5T series MICRO/I HG1G series MICRO/I SD card access (SmartAXIS Pro & Lite) SD card inserted on SmartAXIS series can be accessed while the PLC is stopped only. Downloading or uploading the user program (PLC) You can download or upload the user programs using ZLD files, which can be created or read with WindLDR. Downloading or uploading the project (MICRO/I) You can download or upload the project using ZNV files, which can be created or read with WindO/I-NV4.
    [Show full text]
  • The Snap Framework: a Web Toolkit for Haskell
    The Functional Web The Snap Framework A Web Toolkit for Haskell Gregory Collins • Google Switzerland Doug Beardsley • Karamaan Group askell is an advanced functional pro- the same inputs, always produce the same out- gramming language. The product of more put. This property means that you almost always H than 20 years of research, it enables rapid decompose a Haskell program into smaller con- development of robust, concise, and fast soft- stituent parts that you can test independently. ware. Haskell supports integration with other Haskell’s ecosystem also includes many power- languages and has loads of built-in concurrency, ful testing and code-coverage tools. parallelism primitives, and rich libraries. With Haskell also comes out of the box with a set its state-of-the-art testing tools and an active of easy-to-use primitives for parallel and con- community, Haskell makes it easier to produce current programming and for performance pro- flexible, maintainable, high-quality software. filing and tuning. Applications built with GHC The most popular Haskell implementation is enjoy solid multicore performance and can han- the Glasgow Haskell Compiler (GHC), a high- dle hundreds of thousands of concurrent net- performance optimizing native-code compiler. work connections. We’ve been delighted to find Here, we look at Snap, a Web-development that Haskell really shines for Web programming. framework for Haskell. Snap combines many other Web-development environments’ best fea- What’s Snap? tures: writing Web code in an expressive high- Snap offers programmers a simple, expressive level language, a rapid development cycle, fast Web programming interface at roughly the same performance for native code, and easy deploy- level of abstraction as Java servlets.
    [Show full text]
  • Ocи Power Print Controller
    Océ Power Print Controller PCL5e Reference Guide Océ-Technologies B.V. This manual reflects software release 4.3 of the Océ Power Print Controller. Trademarks Products in this manual are referred to by their trade names. In most, if not all cases, these designations are claimed as trademarks or registered trademarks of their respective companies. Xionics Document Technologies, the Xionics logo and PhoenixPage are trademarks of Xionics. Copyright Océ-Technologies B.V. Venlo, The Netherlands © 2000 All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form or by any means without written permission from Océ. Océ-Technologies B.V. makes no representation or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Further, Océ-Technologies B.V. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation to notify any person of such revision or changes. Edition 2.0 GB Contents Chapter 1 Introduction For who is this Reference Guide intended? 8 End users and Key Operators 8 Programmers 8 Structure of this PCL5e Reference Guide 9 Overview of chapters 9 Additional documentation 10 Additional PCL documentation 10 Additional Océ printer documentation 10 User interfaces 11 Chapter 2 PCL implementation PCL implementation in the Océ Power Print Controller 14 Printing files using the PCL PDL 14 Printer commands 14 HP PCL5 emulation 16 PCL compatibility
    [Show full text]
  • Open Windows File from Download Open Files from the File Menu
    open windows file from download Open files from the File menu. The Open tab on the File menu shows a list of files you’ve recently opened, and it includes links to places where you commonly store files. The Recent list shows the files that you opened recently from any of your devices. If this list gets unwieldy, you can remove files from it. Just right- click the file name and then pick Remove from list . You can make other changes to the Recent list. To learn more, see Customize the list of recently used files. If you don’t use the list of Recent files, and you’d rather jump straight into browsing folders, use Ctrl+F12 to open the Open dialog box directly. To access files from your Microsoft 365 Groups or SharePoint Online document libraries click the Sites - Your Company link. You'll get a list of your frequently Groups and Sites to select from. Pick the one you want and browse to the file you want to open. Double-click Computer to get to local files, including removable flash drives. You can also select one of the locations your accounts let you get to, sign in if necessary, and then open the file you want. To add a new location, click Add a Place . Tip: If you want to bypass File > Open and always use the Open dialog box, do this: Select File > Options > Save , and then select the Don’t show the Backstage when opening or saving files check box. Then, close and reopen any open Office applications.
    [Show full text]
  • Analysing the Use of Outdated Javascript Libraries on the Web
    Updated in September 2017: Require valid versions for library detection throughout the paper. The vulnerability analysis already did so and remains identical. Modifications in Tables I, III and IV; Figures 4 and 7; Sections III-B, IV-B, IV-C, IV-F and IV-H. Additionally, highlight Ember’s security practices in Section V. Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson and Engin Kirda Northeastern University {toby, 3abdou, arshad, wkr, cbw, ek}@ccs.neu.edu Abstract—Web developers routinely rely on third-party Java- scripts or HTML into vulnerable websites via a crafted tag. As Script libraries such as jQuery to enhance the functionality of a result, it is of the utmost importance for websites to manage their sites. However, if not properly maintained, such dependen- library dependencies and, in particular, to update vulnerable cies can create attack vectors allowing a site to be compromised. libraries in a timely fashion. In this paper, we conduct the first comprehensive study of To date, security research has addressed a wide range of client-side JavaScript library usage and the resulting security client-side security issues in websites, including validation [30] implications across the Web. Using data from over 133 k websites, we show that 37 % of them include at least one library with a and XSS ([17], [36]), cross-site request forgery [4], and session known vulnerability; the time lag behind the newest release of fixation [34]. However, the use of vulnerable JavaScript libraries a library is measured in the order of years.
    [Show full text]
  • Cross-Platform Mobile Application for the Cothority
    Cross-Platform Mobile Application for the Cothority Vincent Petri & Cedric Maire School of Computer and Communication Sciences Decentralized and Distributed Systems Lab Semester Project January 2018 Responsible Supervisor Prof. Bryan Ford Linus Gasser EPFL / DeDiS EPFL / DeDiS 2 Acknowledgements We would like to express our special thanks to Linus Gasser who gave us the opportunity to do this very interesting project related to the collec- tive authority (Cothority) framework developed by the DeDiS laboratory at EPFL. We would like to thank him for the valuable help he gave us whenever we needed and for the knowledge he provided to us throughout the semester. Secondly, we would also like to thank our parents and friends who helped us through the hard times of finalising the project within the limited time frame. 3 1 Abstract The Cothority2 framework has been developed and maintained by the DeDiS laboratory at EPFL. This project provides a framework for develop- ing, analysing, and deploying decentralised and distributed cryptographic protocols. A set of servers that runs these protocols and communicates among each other is referred to as a collective authority, or cothority, and the individual servers are called cothority servers or conodes. A cothority that executes decentralised protocols could be used for collective signing, threshold signing, or the generation of public-randomness, to name only a few options. The highest level of abstraction can be created by protocols like the collective signature (CoSi) protocol, the random numbers (Rand- Hound) protocol, or the communication (Messaging) protocol used by the conodes to exchange data. Then come the services, which rely on these pro- tocols.
    [Show full text]
  • The Effect of Ajax on Performance and Usability in Web Environments
    The effect of Ajax on performance and usability in web environments Y.D.C.N. op ’t Roodt, BICT Date of acceptance: August 31st, 2006 One Year Master Course Software Engineering Thesis Supervisor: Dr. Jurgen Vinju Internship Supervisor: Ir. Koen Kam Company or Institute: Hyves (Startphone Limited) Availability: public domain Universiteit van Amsterdam, Hogeschool van Amsterdam, Vrije Universiteit 2 This page intentionally left blank 3 Table of contents 1 Foreword ................................................................................................... 6 2 Motivation ................................................................................................. 7 2.1 Tasks and sources................................................................................ 7 2.2 Research question ............................................................................... 9 3 Research method ..................................................................................... 10 3.1 On implementation........................................................................... 11 4 Background and context of Ajax .............................................................. 12 4.1 Background....................................................................................... 12 4.2 Rich Internet Applications ................................................................ 12 4.3 JavaScript.......................................................................................... 13 4.4 The XMLHttpRequest object..........................................................
    [Show full text]
  • ATM Adaptation Layer for Computer Data
    29762 99 389-410 r1jk.ps 6/18/03 1:38 PM Page 389 Index 3GIO, 273 Associated IRP, 40 8B/10B encoding scheme, 108 Asymmetric cryptography, 85–86 1394 architecture, 43–44 Asynchronous I/O, 12–14 1394 driver, 29 Asynchronous replication, 321, 324 ATA (AT attached), 48 AAL5 (ATM Adaptation Layer for computer data), 119 ATA devices, 49 Access Controls, 129, 133 ATA drives and SMART, 49 ACK (positive acknowledgment) frame, 114 ATA specifications, 48–49 ACLs (access control lists), 8, 205, 211, 338–339 ATAPI (AT Attachment Packet Interface), 49 Active Directory, 334, 336 $AttrDef file, 198 adapter/HBA class, 55 Attribute list defragmentation, 217 Address Resolution Protocol, 105 Authentication, 75–76 Address spoofing, 102 Automated System Recovery, 365 ADIC (Advanced Digital Information Corporation), AutoPath, 315–316 129, 236, 237 AndX, 76–77 B+ tree, 204 ANSI (American National Standards Institute), 107 Back-end networks, 274 ANSI (American National Standards Institute) Web BackOffice, 88 site, 43 Backup applications, 141–144, 156, 165 APCs (asynchronous procedure calls), 7, 24–25, 41 Backup classifications, 143 APIs architecture-based, 144–146 backup/restore applications, 163 functionality-based, 146–147 backups and restores, 139–140 network infrastructure-based, 148–156 volume management applications, 333–334 Backup Exec program, 156 Windows 2000 RSM (Removable Storage Manage- Backup ISVs (independent software vendors), 155 ment), 266–268 Backup server and server-free backups, 154–155 Application images, 227–230 Backup utility, 156–157 Application
    [Show full text]
  • Dell EMC Openmanage Installation and Management Release Notes Version 9.3.1 Notes, Cautions, and Warnings
    Dell EMC OpenManage Installation and Management Release Notes Version 9.3.1 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. 2019 - 10 Rev. A01 Contents 1 Release summary..........................................................................................................................4 2 New and enhanced features.......................................................................................................... 5 3 Compatibility............................................................................................................................... 6 Supported network cards.....................................................................................................................................................6 Supported operating systems..............................................................................................................................................6 Supported web browsers....................................................................................................................................................
    [Show full text]