Complete Issue 21:1 As One

Total Page:16

File Type:pdf, Size:1020Kb

Complete Issue 21:1 As One TUGBOAT Volume 21, Number 1 / March 2000 3 Addresses General Delivery 5 From the President / Mimi Jett 6 Editorial comments / Barbara Beeton Software & Tools 7XΥMTEX (Version 2.00) as implementation of the XΥM notation and the XΥM markup language / Shinsaku Fujita and Nobuya Tanaka Resources 15 The TEXUsersGroupCTAN site makes a move / Jim Hefferon 16 TEXLive5andtheTEX Catalogue / The TUGboat Team 17 Graham Williams’ TEX Catalogue Macros 91 The bag of tricks / Victor Eijkhout News & 92 Calendar Announcements 4 TUG2000 — The 21st Annual Conference Late-Breaking 93 Production notes / Mimi Burbank News 93 Future issues Cartoon 15 Don Knuth finally sells out. / David Farley TUG Business 94 Institutional members 95 TUG membership application Advertisements 96 TEX consulting and production services c3 Blue Sky Research TEXUsersGroup Board of Directors Memberships and Subscriptions Donald Knuth, Grand Wizard of TEX-arcana† TUGboat (ISSN 0896-3207) is published quarterly Mimi Jett, President ∗+ ∗+ by the TEX Users Group, 1466 NW Naito Parkway, Kristoffer Rose , Vice President Suite 3141, Portland, OR 97209-2820, U.S.A. Don DeLand∗+, Treasurer Arthur Ogawa∗+, Secretary 2000 dues for individual members are as follows: Barbara Beeton Ordinary members: $75. Karl Berry Students: $45. Kaja Christiansen Membership in the T X Users Group is for the E Susan DeMeritt calendar year, and includes all issues of TUGboat Stephanie Hogue for the year in which membership begins or is Judy Johnson+ renewed. Individual membership is open only to Ross Moore named individuals, and carries with it such rights Patricia Monohon and responsibilities as voting in TUGelections. A Cheryl Ponchin membership form is provided on page 95. Petr Sojka TUGboat subscriptions are available to organi- Philip Taylor zations and others wishing to receive TUGboat in a Raymond Goucher, Founding Executive Director † name other than that of an individual. Subscription Hermann Zapf, Wizard of Fonts † rates: $85 a year, including air mail delivery. ∗ Periodical-class postage paid at Portland, OR, member of executive committee +member of business committee and additional mailing offices. Postmaster: Send †honorary address changes to TUGboat,TEX Users Group, 1466 NW Naito Parkway, Suite 3141, Portland, OR Addresses Electronic Mail 97209-2820, U.S.A. General correspondence, (Internet) payments, etc. General correspondence, Institutional Membership TEX Users Group membership, subscriptions: Institutional Membership is a means of showing P. O. Box 2311 [email protected] continuing interest in and support for both TEX Portland, OR 97208-2311 and the T X Users Group. For further information, E U. S. A. Submissions to TUGboat, contact the TUGoffice ( [email protected]). Delivery services, letters to the Editor: parcels, visitors [email protected] TUGboat c Copyright 2000, TEXUsersGroup TEX Users Group Permission is granted to make and distribute verbatim 1466 NW Naito Parkway Technical support for copies of this publication or of individual items from this Suite 3141 T Xusers: publication provided the copyright notice and this permission E notice are preserved on all copies. Portland, OR 97209-2820 [email protected] Permission is granted to copy and distribute modified U. S. A. versions of this publication or of individual items from To contact the this publication under the conditions for verbatim copying, Telephone Board of Directors: provided that the entire resulting derived work is distributed +1 503 223-9994 [email protected] under the terms of a permission notice identical to this one. Permission is granted to copy and distribute transla- Fax tions of this publication or of individual items from this +1 503 223-3960 publication into another language, under the above condi- tions for modified versions, except that this permission notice may be included in translations approved by the TEXUsers World Wide Web Group instead of in the original English. Copyright to individual articles is retained by the http://www.tug.org/ authors. http://www.tug.org/TUGboat/ Printed in U.S.A. Problems not resolved? The TUGBoard wants to hear from you: Please email to [email protected] TEX is a trademark of the American Mathematical Society. There is always a danger of becoming so entranced with speed and efficiency that we may forget that suitability to use is still the most important element of any typographic job. Oscar Ogg The 26 Letters, Revised edition (1971) COMMUNICATIONS OF THE TEX USERS GROUP EDITOR BARBARA BEETON VOLUME 21, NUMBER 1 • MARCH 2000 PORTLAND • OREGON • U.S.A. TUGboat TUGboat Editorial Board During 2000, the communications of the TEXUsers Barbara Beeton, Editor Group will be published in four issues. The Mimi Burbank, Production Manager September issue (Vol. 21, No. 3) will contain the Victor Eijkhout, Associate Editor, Macros Proceedings of the 2000 TUG Annual Meeting. Jeremy Gibbons, Associate Editor, TUGboat is distributed as a benefit of mem- “Hey — it works!” bership to all members. Alan Hoenig, Associate Editor, Fonts Submissions to TUGboat are reviewed by vol- Christina Thiele, Associate Editor, unteers and checked by the Editor before publica- Topics in the Humanities tion. However, the authors are still assumed to be Production Team: the experts. Questions regarding content or accu- Barbara Beeton, Mimi Burbank (Manager), Robin racy should therefore be directed to the authors, Fairbairns, Michael Sofka, Christina Thiele with an information copy to the Editor. See page 3 for addresses. Submitting Items for Publication Other TUG Publications The next regular issue will be Vol. 21, No. 2. Production and mailing have been delayed; the TUG publishes the series TEXniques, in which have second and third issues for 2000 are expected to be appeared reference materials and user manuals for sent to the printer in October. Deadlines for future macro packages and TEX-related software, as well issues are listed in the Calendar, page 92. as the Proceedings of the 1987 and 1988 Annual Manuscripts should be submitted to a member Meetings. Other publications on TEXnical subjects of the TUGboat Editorial Board. Articles of general also appear from time to time. interest, those not covered by any of the editorial TUG is interested in considering additional departments listed, and all items submitted on manuscripts for publication. These might include magnetic media or as camera-ready copy should be manuals, instructional materials, documentation, or addressed to the Editor, Barbara Beeton, or to the works on any other topic that might be useful to Production Manager, Mimi Burbank (see addresses the TEX community in general. Provision can be on p. 3). made for including macro packages or software in Contributions in electronic form are encour- computer-readable form. If you have any such items aged, via electronic mail, on diskette, or made or know of any that you would like considered for available for the Editor to retrieve by anonymous publication, send the information to the attention FTP; contributions in the form of camera copy of the Publications Committee at [email protected] are also accepted. The TUGboat “style files”, for or in care of the TUG office. use with either plain TEXorLATEX, are available from CTAN. For authors who have no network Trademarks FTP access, they will be sent on request; please Many trademarked names appear in the pages of specify which is preferred. Send e-mail to TUG- TUGboat. If there is any question about whether [email protected], or write or call the TUG office. This is also the preferred address for submitting a name is or is not a trademark, prudence dictates that it should be treated as if it is. The following contributions via electronic mail. list of trademarks which appear in this issue may Reviewers not be complete. MS/DOS is a trademark of Microsoft Corporation Additional reviewers are needed, to assist in check- METAFONT is a trademark of Addison-Wesley Inc. ing new articles for completeness, accuracy, and PC TEX is a registered trademark of Personal TEX, presentation. Volunteers are invited to submit Inc. their names and interests for consideration; write to PostScript is a trademark of Adobe Systems, Inc. [email protected] or to the Editor, Barbara Beeton techexplorer is a trademark of IBM Research. (see address on p. 3). TEXandAMS-TEX are trademarks of the American Mathematical Society. TUGboat Advertising and Mailing Lists Textures is a trademark of Blue Sky Research. Unix For information about advertising rates, publication is a registered trademark of X/Open Co. Ltd. schedules or the purchase of TUGmailing lists, write or call the TUG office. Wadham College, Oxford, UK TUG 2000 August 13th–16th, 2000 The 21st Annual Conference of the TEX Users Group will take place at Wadham College, Oxford, between Sunday 13th August and Wednesday 16th August 2000. Tutorials will be given on the 17th and 18th August. The Location Oxford is a small, pleasant city with an internationally famous university. The city is full of ancient buildings, beautiful gardens, libraries and bookshops. The conference will be held in Wadham College, a traditional college (founded 1613) in the centre of the city. Oxford is easily reached from London, and is a good starting point for visiting much of southern England. The Conference The conference will feature talks on all aspects of TEX and its relationship to both traditional and electronic document preparation and processing. The Annual General Meeting of the TEX Users’ Group will be held during the period of the conference. We expect the cost to a typical
Recommended publications
  • June 2015 Broadside
    T H E A T L A N T A E A R L Y M U S I C ALLIANCE B R O A D S I D E Volume XV # 4 June, 2015 President’s Message Are we living in the Renaissance? Well, according to the British journalist, Stephen Masty, we are still witnessing new inventions in musical instruments that link us back to the Renaissance figuratively and literally. His article “The 21st Century Renaissance Inventor” [of musical instruments], in the journal “The Imaginative Conservative” received worldwide attention recently regard- ing George Kelischek’s invention of the “KELHORN”. a reinvention of Renaissance capped double-reed instruments, such as Cornamuse, Crumhorn, Rauschpfeiff. To read the article, please visit: AEMA MISSION http://www.theimaginativeconservative.org/2015/05/the-21st-centurys-great-renaissance-inventor.html. It is the mission of the Atlanta Early Music Alli- Some early music lovers play new replicas of the ance to foster enjoyment and awareness of the histor- Renaissance instruments and are also interested in playing ically informed perfor- the KELHORNs. The latter have a sinuous bore which mance of music, with spe- cial emphasis on music makes even bass instruments “handy” to play, since they written before 1800. Its have finger hole arrangements similar to Recorders. mission will be accom- plished through dissemina- tion and coordination of Yet the sound of all these instruments is quite unlike that information, education and financial support. of the Recorder: The double-reed presents a haunting raspy other-worldly tone. (Renaissance? or Jurassic?) In this issue: George Kelischek just told me that he has initiated The Capped Reed Society Forum for Players and Makers of the Crumhorn, President ’ s Message page 1 Cornamuse, Kelhorn & Rauschpfeiff.
    [Show full text]
  • 1 a Theoretical Synopsis of Evolutionary Phonology
    A Theoretical Synopsis of Evolutionary Phonology Juliette Blevins Max Planck Institute for Evolutionary Anthropology 1. AN OVERVIEW OF EVOLUTIONARY PHONOLOGY 1.1 EXPLAINING SOUND PATTERNS. Phonology is the study of sound patterns of the world’s languages. In all spoken languages, we find sound patterns characterizing the composition of words and phrases. These patterns include overall properties of contrastive sound inventories (e.g. vowel inventories, consonant inventories, tone inventories), as well as patterns determining the distribution of sounds or contrastive features of sounds (stress, tone, length, voicing, place of articulation, etc.), and their variable realization in different contexts (alternations). A speaker's implicit knowledge of these patterns is often evident in their extension to novel items and in experiments probing phonological well-formedness. This implicit knowledge - its content, formalization, and representation, - is the central focus of modern theoretical phonology, including generative phonology and many of its derivatives (natural phonology, government phonology, dependency phonology, optimality theory). However, just as important as speaker's implicit knowledge of sound patterns are explanations for the distribution of sound patterns across attested spoken languages. Some sound patterns, are extremely common, while others are rare. Some examples of recurrent sound patterns involving segment/feature inventories, distribution, and alternations are listed in (1). The sound patterns in (1i,iii,iv,v,viii) are exceptionless across the world's attested spoken languages, while those in (1ii, vi, vii, ix-xii) are recurrent and frequent. Exceptionlesss patterns like (1i) are sometimes regarded as 'linguistic universals' (1i), while common patterns like (1ii) are often viewed as 'universal tendencies'. (1) Some recurrent sound patterns in the world's languages1 Inventories i.
    [Show full text]
  • Balancing Function Unit 4
    BALANCING FUNCTION UNIT 4 Dr. P.V. S LAKSHMI JAGADAMBA Professor, Department of CSE, GVP College of Engineering for Women INTRODUCTION User experiences play a critical role in influencing software acceptance Conversational messages have their limits Design needs to be comprehensible, predictable, and controllable Information layout is important Multi window coordination Large, fast, high-resolution color displays have potential Recognition of the creative challenge of balancing function and fashion may lead to designers even working even harder. 2 INTRODUCTION “This chapter deals with six design matters that are functional issues with varying styles/solutions to suite a variety of users.” Error messages Non-anthropomorphic design Display design Web page design Window design Colour 3 ERROR MESSAGES Overview User experience with computer-system prompts, explanations, error diagnostics, and warnings is crucial in influencing acceptance of SW systems Why do errors occur? Lack of knowledge, incorrect understanding, inadequate slips What is the consequence? Users are likely to be confused, are anxious or feel inadequate What is a solution? Make error messages as user-friendly as possible; this is especially important for novice users as they commonly have a lack of knowledge, confidence, and are sometimes easily frustrated or discouraged 4 ERROR MESSAGES Improving Error Messages Measure where errors occur frequently, focus on these issues Improve messages but also revise error handling procedures, improve documentation
    [Show full text]
  • SNC: a Cloud Service Platform for Symbolic-Numeric Computation Using Just-In-Time Compilation
    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCC.2017.2656088, IEEE Transactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 1 SNC: A Cloud Service Platform for Symbolic-Numeric Computation using Just-In-Time Compilation Peng Zhang1, Member, IEEE, Yueming Liu1, and Meikang Qiu, Senior Member, IEEE and SQL. Other types of Cloud services include: Software as a Abstract— Cloud services have been widely employed in IT Service (SaaS) in which the software is licensed and hosted in industry and scientific research. By using Cloud services users can Clouds; and Database as a Service (DBaaS) in which managed move computing tasks and data away from local computers to database services are hosted in Clouds. While enjoying these remote datacenters. By accessing Internet-based services over lightweight and mobile devices, users deploy diversified Cloud great services, we must face the challenges raised up by these applications on powerful machines. The key drivers towards this unexploited opportunities within a Cloud environment. paradigm for the scientific computing field include the substantial Complex scientific computing applications are being widely computing capacity, on-demand provisioning and cross-platform interoperability. To fully harness the Cloud services for scientific studied within the emerging Cloud-based services environment computing, however, we need to design an application-specific [4-12]. Traditionally, the focus is given to the parallel scientific platform to help the users efficiently migrate their applications. In HPC (high performance computing) applications [6, 12, 13], this, we propose a Cloud service platform for symbolic-numeric where substantial effort has been given to the integration of computation– SNC.
    [Show full text]
  • Pdflib Text and Image Extraction Toolkit (TET) Manual
    ABC Text and Image Extraction Toolkit (TET) Version 5.2 Toolkit for extracting Text, Images, and other items from PDF Copyright © 2002–2019 PDFlib GmbH. All rights reserved. Protected by European and U.S. patents. PDFlib GmbH Franziska-Bilek-Weg 9, 80339 München, Germany www.pdflib.com phone +49 • 89 • 452 33 84-0 If you have questions check the PDFlib mailing list and archive at groups.yahoo.com/neo/groups/pdflib/info Licensing contact: [email protected] Support for commercial PDFlib licensees: [email protected] (please include your license number) This publication and the information herein is furnished as is, is subject to change without notice, and should not be construed as a commitment by PDFlib GmbH. PDFlib GmbH assumes no responsibility or lia- bility for any errors or inaccuracies, makes no warranty of any kind (express, implied or statutory) with re- spect to this publication, and expressly disclaims any and all warranties of merchantability, fitness for par- ticular purposes and noninfringement of third party rights. TET contains modified parts of the following third-party software: CMap resources. Copyright © 1990-2019 Adobe Zlib compression library, Copyright © 1995-2017 Jean-loup Gailly and Mark Adler TIFFlib image library, Copyright © 1988-1997 Sam Leffler, Copyright © 1991-1997 Silicon Graphics, Inc. Cryptographic software written by Eric Young, Copyright © 1995-1998 Eric Young ([email protected]) Independent JPEG Group’s JPEG software, Copyright © Copyright © 1991-2017, Thomas G. Lane, Guido Vollbeding Cryptographic software, Copyright © 1998-2002 The OpenSSL Project (www.openssl.org) Expat XML parser, Copyright © 2001-2017 Expat maintainers ICU International Components for Unicode, Copyright © 1995-2012 International Business Machines Corpo- ration and others OpenJPEG library, Copyright © 2002-2014, Université catholique de Louvain (UCL), Belgium TET contains the RSA Security, Inc.
    [Show full text]
  • DLI Implementation and Reference Guide
    Implementation and Reference Guide Datalogics Interface Datalogics® Datalogics DATALOGICS INTERFACE Implementation and Reference Guide This guide is part of the Adobe® PDF Library v6.1.1Plus suite; 02/15/05. Copyright 1999-2005 Datalogics Incorporated. All Rights Reserved. Use of Datalogics software is subject to the applicable license agreement. DL Interface is a trademark of Datalogics Incorporated. Other products mentioned herein as Datalogics prod- ucts are also trademarks or registered trademarks of Datalogics, Incorporated. Adobe, Adobe PDF Library, Portable Document Format (PDF), PostScript, Acrobat, Distiller, Exchange and Reader are trademarks of Adobe Systems Incorporated. HP and HP-UX are registered trademarks of Hewlett Packard Corporation. IBM, AIX, AS/400, OS/400, MVS, and OS/390 are registered trademarks of International Business Machines. Java, J2EE, J2SE, J2ME, all Java-based marks, Sun and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Microsoft, Windows and Windows NT are trademarks or registered trademarks of Microsoft Corporation. SAS/C is a registered trademark of SAS Institute Inc. UNIX is a registered trademark of The Open Group. VeriSign® is a registered trademark of VeriSign, Inc. in the United States and/or other countries. All other trademarks and registered trademarks are the property of their respective owners. For additional information, contact: Datalogics, Incorporated 101 North Wacker
    [Show full text]
  • “Scrap Your Boilerplate” Reloaded
    “Scrap Your Boilerplate” Reloaded Ralf Hinze1, Andres L¨oh1, and Bruno C. d. S. Oliveira2 1 Institut f¨urInformatik III, Universit¨atBonn R¨omerstraße164, 53117 Bonn, Germany {ralf,loeh}@informatik.uni-bonn.de 2 Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford OX1 3QD, UK [email protected] Abstract. The paper “Scrap your boilerplate” (SYB) introduces a com- binator library for generic programming that offers generic traversals and queries. Classically, support for generic programming consists of two es- sential ingredients: a way to write (type-)overloaded functions, and in- dependently, a way to access the structure of data types. SYB seems to lack the second. As a consequence, it is difficult to compare with other approaches such as PolyP or Generic Haskell. In this paper we reveal the structural view that SYB builds upon. This allows us to define the combinators as generic functions in the classical sense. We explain the SYB approach in this changed setting from ground up, and use the un- derstanding gained to relate it to other generic programming approaches. Furthermore, we show that the SYB view is applicable to a very large class of data types, including generalized algebraic data types. 1 Introduction The paper “Scrap your boilerplate” (SYB) [1] introduces a combinator library for generic programming that offers generic traversals and queries. Classically, support for generic programming consists of two essential ingredients: a way to write (type-)overloaded functions, and independently, a way to access the structure of data types. SYB seems to lacks the second, because it is entirely based on combinators.
    [Show full text]
  • Davis, S. Metaphonological Ability in Low-Literate Adult Somali English Language Learners (2009)
    Davis, S. Metaphonological Ability in Low-literate Adult Somali English Language Learners (2009) This is a study of metaphonological ability in low-literate adult Somali English Language Learners (ELLs). It asks the questions: To what extent are non-literate Somali adult English language learners able to identify and manipulate word-initial phonemes and syllables? To what extent do they identify rhyme, especially when juxtaposed with semantically-related content? Will they perform differently on a phonological fluency task than on a semantic fluency task? Studies with low-literate adult ELLs by Elaine Tarone and Martha Bigelow, as well as studies produced by the Low-Educated Second Language and Literacy Acquisition [LESLLA] forum were the biggest influences on this study. The study is a quantitative, one-shot design, involving six female low-literate adult Somali students from an adult ESL program in Minnesota. The only identifiable factor affecting their performance on the metaphonological ability testing was the amount of schooling they received in childhood. ACKNOWLEDGMENTS I would like to thank my committee members for their time, their careful, thoughtful editing and suggestions, and their encouragement. They are brilliant and I am so very grateful for them. I would also like to thank the teachers and staff at the school where the research was performed. They were very open to me and to this research, and also very flexible and willing to give of their time. I would like to thank my interpreters for their time, their expertise, and their valuable insight. Finally, I would like to thank my participants for being willing to give of their time, performing language tasks that were very new and unusual to them, for the sake of improving language instruction for future language learners.
    [Show full text]
  • Manydsl One Host for All Language Needs
    ManyDSL One Host for All Language Needs Piotr Danilewski March 2017 A dissertation submitted towards the degree (Dr.-Ing.) of the Faculty of Mathematics and Computer Science of Saarland University. Saarbrücken Dean Prof. Dr. Frank-Olaf Schreyer Date of Colloquium June 6, 2017 Examination Board: Chairman Prof. Dr. Sebastian Hack Reviewers Prof. Dr.-Ing. Philipp Slusallek Prof. Dr. Wilhelm Reinhard Scientific Asistant Dr. Tim Dahmen Piotr Danilewski, [email protected] Saarbrücken, June 6, 2017 Statement I hereby declare that this dissertation is my own original work except where otherwise indicated. All data or concepts drawn directly or indirectly from other sources have been correctly acknowledged. This dissertation has not been submitted in its present or similar form to any other academic institution either in Germany or abroad for the award of any degree. Saarbrücken, June 6, 2017 (Piotr Danilewski) Declaration of Consent Herewith I agree that my thesis will be made available through the library of the Computer Science Department. Saarbrücken, June 6, 2017 (Piotr Danilewski) Zusammenfassung Die Sprachen prägen die Denkweise. Das ist die Tatsache für die gesprochenen Sprachen aber auch für die Programmiersprachen. Da die Computer immer wichtiger in jedem Aspekt des menschlichen Lebens sind, steigt der Bedarf um entsprechend neue Konzepte in den Programmiersprachen auszudrücken. Jedoch, damit unsere Denkweise sich weiterentwicklen könnte, müssen sich auch die Programmiersprachen weiterentwickeln. Aber welche Hilfsmittel gibt es um die Programmiersprachen zu schaffen und aufzurüsten? Wie kann man Entwickler ermutigen damit sie eigene Sprachen definieren, die dem Bereich in dem sie arbeiten am besten passen? Heutzutage gibt es zwei Methoden.
    [Show full text]
  • Text Font Copy Paste
    Text Font Copy Paste Alaa punce his cupfuls suburbanize leastwise or cockily after Ferguson moor and sop prompt, ireful and intermetallic. Commercial and unmechanized Thorn consent while polyhedral Garret retrieved her flaming poetically and halloos conjugally. Giffer turpentining her Hanover daringly, she whittles it crudely. To recreate this text effect we often use stacks of Layer Styles to onto the texture, simple enter the letter to word has the box below, ten you cannot call to always thread. Or blocking certain characters have both for your bio, try our online magazine of websites design. Use the american Text Generator we engaged to generate hundreds of fonts text that offer copy and paste feature what you to easily copy cool job or cool font that. Logos that met can customize as needed. Perfect for Minecraft Servers, and discount all HTTP pages in Incognito mode. Let us form that ugly looking for contributing an account today is fun topic to be blamed for. Fonts for Twitter 94. How can now copy and reverse the document to pay the code for more plain standard, paste text style handmade script for everyone and paste the preview the text and. Cool amazing online! After that till end jsll logging window will look like we ended up with. Text generator is a flowing manner that can in! Font Copy Paste is an online free fancy novelty and stylish fonts generator website to generate online fancy text will more than 100 fancy text. Copy paste text from pictures no detriment to re-write copy use a browser extension or ORC website Find more which font has been used in a.
    [Show full text]
  • Lilypond Cheatsheet
    LilyPond-MusicTypesetting Basic usage - LilyPond Version 2.14 and above Cheatsheet by R. Kainhofer, Edition Kainhofer, http://www.edition-kainhofer.com/ Command-line usage General Syntax lilypond [-l LOGLEVEL] [-dSCMOPTIONS] [-o OUTPUT] [-V] FILE.ly [FILE2.ly] \xxxx function or variable { ... } Code grouping Common options: var = {...} Variable assignment --pdf, --png, --ps Output file format -dpreview Cropped “preview” image \version "2.14.0" LilyPond version -dbackend=eps Use different backend -dlog-file=FILE Create .log file % dots Comment -l LOGLEVEL ERR/WARN/PROG/DEBUG -dno-point-and-click No Point & Click info %{ ... %} Block comment -o OUTDIR Name of output dir/file -djob-count=NR Process files in parallel c\... Postfix-notation (notes) -V Verbose output -dpixmap-format=pngalpha Transparent PNG #'(..), ##t, #'sym Scheme list, true, symb. -dhelp Help on options -dno-delete-intermediate-files Keep .ps files x-.., x^.., x_.. Directions Basic Notation Creating Staves, Voices and Groups \version "2.15.0" c d e f g a b Note names (Dutch) SMusic = \relative c'' { c1\p } Alterations: -is/-es for sharp/flat, SLyrics = \lyricmode { Oh! } cis bes as cisis beses b b! b? -isis/-eses for double, ! forces, AMusic = \relative c' { e1 } ? shows cautionary accidental \relative c' {c f d' c,} Relative mode (change less than a \score { fifth), raise/lower one octave \new ChoirStaff << \new Staff { g1 g2 g4 g8 g16 g4. g4.. durations (1, 2, 4, 8, 16, ...); append “.” for dotted note \new Voice = "Sop" { \dynamicUp \SMusic
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations.
    [Show full text]