Programming, Using and Understanding Pike

Total Page:16

File Type:pdf, Size:1020Kb

Programming, Using and Understanding Pike Programming, using and understanding Pike by Fredrik H¨ubinette 2 This book was written with the intention of making anybody with a little pro- gramming experience able to use Pike. It should also be possible to gain a deep understanding of how Pike works and to some extent why it works the way it does from this book. It will teach you how to write your own extensions to Pike. I have been trying for years to get someone else to write this book, but since it seems impossible without paying a fortune for it I will have to do it myself. A http://www.emit.com.pl/ian big thanks goes to Ian Carr-de Avelon* and Henrik Wallin <[email protected]> .html for helping me iron out some of the rough spots. The book assumes that you have programmed some other programming language before and that you have some experience of UNIX. Contents 0.1 Overview ............................... 4 0.2 The history of Pike .......................... 4 0.3 A comparison with other languages ................. 5 0.4 What is Pike ............................. 5 0.5 How to read this manual ....................... 6 1 Getting started 7 1.1 Your first Pike program ....................... 7 1.2 Improving hello world.pike ...................... 8 1.3 Further improvements ........................ 9 1.4 Control structures .......................... 11 1.5 Functions ............................... 11 1.6 True and false ............................. 12 1.7 Data Types .............................. 12 2 A more elaborate example 15 2.1 Taking care of input ......................... 17 2.1.1 add record() ......................... 17 2.1.2 main() ............................. 18 2.2 Communicating with files ...................... 19 2.2.1 save() ............................. 19 2.2.2 load() ............................. 20 2.2.3 main() revisited ........................ 21 2.3 Completing the program ....................... 21 2.3.1 delete() ............................ 21 2.3.2 search() ............................ 22 3 4 CONTENTS 2.3.3 main() again ......................... 22 2.4 Then what? .............................. 23 2.5 Simple exercises ............................ 23 3 Control Structures 25 3.1 Conditions ............................... 25 3.1.1 if ................................ 25 3.1.2 switch ............................. 26 3.2 Loops ................................. 27 3.2.1 while .............................. 27 3.2.2 for ............................... 28 3.2.3 do-while ............................ 28 3.2.4 foreach ............................ 29 3.3 Breaking out of loops ......................... 29 3.3.1 break ............................. 29 3.3.2 continue ............................ 30 3.3.3 return ............................. 30 3.4 Exercises ............................... 31 4 Data types 33 4.1 Basic types .............................. 33 4.1.1 int ............................... 33 4.1.2 float .............................. 34 4.1.3 string ............................. 35 4.2 Pointer types ............................. 38 4.2.1 array .............................. 38 4.2.2 mapping ............................ 40 4.2.3 multiset ............................ 42 4.2.4 program ............................ 43 4.2.5 object ............................. 45 4.2.6 function ............................ 48 4.3 Sharing data ............................. 49 4.4 Writing data types .......................... 50 CONTENTS 5 5 Operators 53 5.1 Arithmetic operators ......................... 53 5.2 Comparison operators ........................ 56 5.3 Logical operators ........................... 56 5.4 Bitwise/set operators ......................... 57 5.5 Indexing ................................ 58 5.6 The assignment operators ...................... 59 5.7 The rest of the operators ....................... 61 5.8 Operator precedence ......................... 62 5.9 Operator functions .......................... 63 6 Object orientation 65 6.1 Terminology .............................. 65 6.2 The approach ............................. 66 6.3 How does this help? ......................... 66 6.4 Pike and object orientation ..................... 66 6.5 Inherit ................................. 67 6.6 Multiple inherit ............................ 70 6.7 Pike inherit compared to other languages ............. 71 6.8 Modifiers ............................... 71 6.9 Operator overloading ......................... 72 6.10 Simple exercises ............................ 73 7 Miscellaneous functions 75 7.1 sscanf ................................. 75 7.2 catch &throw ............................. 76 7.3 gauge ................................. 77 7.4 typeof ................................. 77 8 Modules 79 8.1 How to use modules ......................... 81 8.2 Where do modules come from? ................... 81 8.3 The . operator ............................ 81 8.4 How to write a module ........................ 82 6 CONTENTS 8.5 Simple exercises ............................ 82 9 File I/O 83 Stdio ..................................... 83 9.1 File management - Stdio.File .................... 83 Stdio.File ............................... 83 9.2 Buffered file management - Stdio.FILE ............... 93 Stdio.FILE .............................. 93 9.3 Standard streams - Stdio.stdin, stdout and stderr ......... 94 9.4 Listening to sockets - Stdio.Port .................. 94 Stdio.Port ............................... 94 9.5 UDP socket and message management - Stdio.UDP ........ 96 Stdio.UDP ............................... 96 9.6 Terminal management - Stdio.Terminfo .............. 98 Terminfo ................................ 98 9.6.1 Stdio.Terminfo.Termcap ................... 99 9.6.2 Stdio.Terminfo.Terminfo ................... 100 9.7 Simple input-by-prompt - Stdio.Readline .............. 100 Stdio.Readline ............................ 100 9.8 Other Stdio functions ........................ 101 9.9 A simple example ........................... 105 9.10 A more complex example - a simple WWW server ........ 105 10 Threads 113 10.1 Starting a thread ........................... 113 10.2 Threads reference section ...................... 114 Thread.Mutex ............................. 114 Thread.Condition ........................... 116 Thread.Fifo .............................. 117 Thread.Queue ............................. 118 Thread.thread local ......................... 119 10.3 Threads example ........................... 120 CONTENTS 7 11 Modules for specific data types 123 11.1 String ................................. 123 String ................................. 123 11.2 Array ................................. 125 Array ................................. 125 12 Image 135 Image .................................... 135 12.1 Image.Image ............................. 137 Image.Image ............................. 137 12.2 Image.Colortable ........................... 171 Image.Colortable ........................... 171 12.3 Image.Layer .............................. 180 Image.Layer .............................. 180 12.4 Image.Font .............................. 184 Image.Font .............................. 184 12.5 Image.colortable ........................... 186 Image.colortable ........................... 186 12.6 Image.Poly .............................. 186 Image.Poly .............................. 186 12.7 Image.Color .............................. 186 Image.Color .............................. 186 12.7.1 Image.Color.Color ...................... 188 12.8 Image.X ................................ 192 Image.X ................................ 192 12.9 Image.ANY .............................. 193 Image.ANY .............................. 193 12.10Image.AVS .............................. 194 Image.AVS .............................. 194 12.11Image.BMP .............................. 194 Image.BMP .............................. 194 12.12Image.GD ............................... 196 Image.GD ............................... 196 12.13Image.GIF ............................... 197 8 CONTENTS Image.GIF ............................... 197 12.14Image.HRZ .............................. 204 Image.HRZ .............................. 204 12.15Image.ILBM .............................. 205 Image.ILBM .............................. 205 12.16Image.PCX .............................. 207 Image.PCX .............................. 207 12.17Image.PNG .............................. 208 Image.PNG .............................. 208 12.18Image.PNM .............................. 210 Image.PNM .............................. 210 12.19Image.PSD .............................. 212 Image.PSD .............................. 212 12.20Image.TGA .............................. 212 Image.TGA .............................. 212 12.21Image.XBM .............................. 213 Image.XBM .............................. 213 12.22Image.XCF .............................. 214 Image.XCF .............................. 214 12.23Image.XWD .............................. 215 Image.XWD .............................. 215 12.24Image.JPEG ............................. 216 Image.JPEG ............................. 216 12.25Image.TIFF .............................. 218 Image.TIFF .............................. 218 12.26Image.TTF .............................. 219 Image.TTF .............................. 219 12.26.1 Image.TTF.Face ....................... 220 12.26.2 Image.TTF.FaceInstance .................. 221 12.27Image.XFace ............................. 221 Image.XFace ............................. 221 CONTENTS 9 13 Protocols 223 Protocols .................................
Recommended publications
  • Government Open Systems Interconnection Profile Users' Guide, Version 2
    NIST Special Publication 500-192 [ Computer Systems Government Open Systems Technology Interconnection Profile Users' U.S. DEPARTMENT OF COMMERCE National Institute of Guide, Version 2 Standards and Technology Tim Boland Nisr NATL INST. OF STAND & TECH R.I.C, A111D3 71D7S1 NIST PUBLICATIONS --QC- 100 .U57 500-192 1991 C.2 NIST Special Publication 500-192 . 0)0 Government Open Systems Interconnection Profile Users' Guide, Version 2 Tim Boland Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Supersedes NIST Special Publication 500-163 October 1991 U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director Reports on Computer Systems Technology The National Institute of Standards and Technology (NIST) has a unique responsibility for conriputer systems technology within the Federal government. NIST's Computer Systems Laboratory (CSL) devel- ops standards and guidelines, provides technical assistance, and conducts research for computers and related telecommunications systems to achieve more effective utilization of Federal information technol- ogy resources. CSL's responsibilities include development of technical, management, physical, and ad- ministrative standards and guidelines for the cost-effective security and privacy of sensitive unclassified information processed in Federal computers. CSL assists agencies in developing security plans and in improving computer security awareness training. This Special Publication 500 series reports CSL re- search and guidelines to Federal agencies as well as to organizations in industry, government, and academia. National Institute of Standards and Technology Special Publication 500-192 Natl. Inst. Stand. Technol. Spec. Publ. 500-192, 166 pages (Oct. 1991) CODEN: NSPUE2 U.S.
    [Show full text]
  • Joint Force Quarterly 97
    Issue 97, 2nd Quarter 2020 JOINT FORCE QUARTERLY Broadening Traditional Domains Commercial Satellites and National Security Ulysses S. Grant and the U.S. Navy ISSUE NINETY-SEVEN, 2 ISSUE NINETY-SEVEN, ND QUARTER 2020 Joint Force Quarterly Founded in 1993 • Vol. 97, 2nd Quarter 2020 https://ndupress.ndu.edu GEN Mark A. Milley, USA, Publisher VADM Frederick J. Roegge, USN, President, NDU Editor in Chief Col William T. Eliason, USAF (Ret.), Ph.D. Executive Editor Jeffrey D. Smotherman, Ph.D. Production Editor John J. Church, D.M.A. Internet Publications Editor Joanna E. Seich Copyeditor Andrea L. Connell Associate Editor Jack Godwin, Ph.D. Book Review Editor Brett Swaney Art Director Marco Marchegiani, U.S. Government Publishing Office Advisory Committee Ambassador Erica Barks-Ruggles/College of International Security Affairs; RDML Shoshana S. Chatfield, USN/U.S. Naval War College; Col Thomas J. Gordon, USMC/Marine Corps Command and Staff College; MG Lewis G. Irwin, USAR/Joint Forces Staff College; MG John S. Kem, USA/U.S. Army War College; Cassandra C. Lewis, Ph.D./College of Information and Cyberspace; LTG Michael D. Lundy, USA/U.S. Army Command and General Staff College; LtGen Daniel J. O’Donohue, USMC/The Joint Staff; Brig Gen Evan L. Pettus, USAF/Air Command and Staff College; RDML Cedric E. Pringle, USN/National War College; Brig Gen Kyle W. Robinson, USAF/Dwight D. Eisenhower School for National Security and Resource Strategy; Brig Gen Jeremy T. Sloane, USAF/Air War College; Col Blair J. Sokol, USMC/Marine Corps War College; Lt Gen Glen D. VanHerck, USAF/The Joint Staff Editorial Board Richard K.
    [Show full text]
  • Package 'Passport'
    Package ‘passport’ November 7, 2020 Type Package Title Travel Smoothly Between Country Name and Code Formats Version 0.3.0 Description Smooths the process of working with country names and codes via powerful parsing, standardization, and conversion utilities arranged in a simple, consistent API. Country name formats include multiple sources including the Unicode Common Locale Data Repository (CLDR, <http://cldr.unicode.org/>) common-sense standardized names in hundreds of languages. Depends R (>= 3.1.0) Imports stats, utils Suggests covr, dplyr, DT, gapminder, ggplot2, jsonlite, knitr, mockr, rmarkdown, testthat, tidyr License GPL-3 | file LICENSE URL https://github.com/alistaire47/passport, https://alistaire47.github.io/passport/ BugReports https://github.com/alistaire47/passport/issues Encoding UTF-8 LazyData true RoxygenNote 7.1.1 VignetteBuilder knitr NeedsCompilation no Author Edward Visel [aut, cre] (<https://orcid.org/0000-0002-2811-6254>) Maintainer Edward Visel <[email protected]> Repository CRAN Date/Publication 2020-11-07 07:30:03 UTC 1 2 as_country_code R topics documented: as_country_code . .2 as_country_name . .3 codes . .5 country_format . .6 nato .............................................7 order_countries . .8 parse_country . 10 Index 12 as_country_code Convert standardized country names to country codes Description as_country_code converts a vector of standardized country names or codes to country codes Usage as_country_code(x, from, to = "iso2c", factor = is.factor(x)) Arguments x A character, factor, or numeric vector of country names or codes from Format from which to convert. See Details for more options. to Code format to which to convert. Defaults to "iso2c"; see codes for more options. factor If TRUE, returns factor instead of character vector. Details as_country_code takes a character, factor, or numeric vector of country names or codes to translate into the specified code format.
    [Show full text]
  • Magensa Qwickpin, Generation/Verification of PIN Offset
    Magensa QwickPIN Generation/Verification of PIN Offset Programmer’s Reference Manual March 18, 2021 Document Number: D998200466-11 REGISTERED TO ISO 9001:2015 Magensa, LLC I 1710 Apollo Court I Seal Beach, CA 90740 I Phone: (562) 546-6400 I Technical Support: (888) 624-8350 www.magtek.com Copyright © 2006 - 2021 MagTek, Inc. Printed in the United States of America INFORMATION IN THIS PUBLICATION IS SUBJECT TO CHANGE WITHOUT NOTICE AND MAY CONTAIN TECHNICAL INACCURACIES OR GRAPHICAL DISCREPANCIES. CHANGES OR IMPROVEMENTS MADE TO THIS PRODUCT WILL BE UPDATED IN THE NEXT PUBLICATION RELEASE. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS, ELECTRONIC OR MECHANICAL, FOR ANY PURPOSE, WITHOUT THE EXPRESS WRITTEN PERMISSION OF MAGTEK, INC. MagTek®, MagnePrint®, and MagneSafe® are registered trademarks of MagTek, Inc. Magensa™ is a trademark of MagTek, Inc. DynaPro™ and DynaPro Mini™, are trademarks of MagTek, Inc. ExpressCard 2000 is a trademark of MagTek, Inc. IPAD® is a trademark of MagTek, Inc. IntelliStripe® is a registered trademark of MagTek, Inc. AAMVA™ is a trademark of AAMVA. American Express® and EXPRESSPAY FROM AMERICAN EXPRESS® are registered trademarks of American Express Marketing & Development Corp. D-PAYMENT APPLICATION SPECIFICATION® is a registered trademark to Discover Financial Services CORPORATION MasterCard® is a registered trademark and PayPass™ and Tap & Go™ are trademarks of MasterCard International Incorporated. Visa® and Visa payWave® are registered trademarks of Visa International Service Association. MAS-CON® is a registered trademark of Pancon Corporation. Molex® is a registered trademark and PicoBlade™ is a trademark of Molex, its affiliates, related companies, licensors, and/or joint venture partners.
    [Show full text]
  • Attracting, Recruiting, and Retaining Successful Cyberspace Operations Officers Cyber Workforce Interview Findings
    C O R P O R A T I O N Attracting, Recruiting, and Retaining Successful Cyberspace Operations Officers Cyber Workforce Interview Findings Chaitra M. Hardison, Leslie Adrienne Payne, John A. Hamm, Angela Clague, Jacqueline Torres, David Schulker, John S. Crown For more information on this publication, visit www.rand.org/t/RR2618 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0101-4 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2019 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface Cybersecurity is one of the most serious economic and national security challenges we face as a nation.
    [Show full text]
  • ISO Types 1-6: Construction Code Descriptions
    ISO Types 1-6: Construction Code Descriptions ISO 1 – Frame (combustible walls and/or roof) Typically RMS Class 1 Wood frame walls, floors, and roof deck Brick Veneer, wood/hardiplank siding, stucco cladding Wood frame roof with wood decking and typical roof covers below: *Shingles *Clay/concrete tiles *BUR (built up roof with gravel or modified bitumen) *Single-ply membrane *Less Likely metal sheathing covering *May be gable, hip, flat or combination of geometries Roof anchorage *Toe nailed *Clips *Single Wraps *Double Wraps Examples: Primarily Habitational, max 3-4 stories ISO 2 – Joisted Masonry (JM) (noncombustible masonry walls with wood frame roof) Typically RMS Class 2 Concrete block, masonry, or reinforced masonry load bearing exterior walls *if reported as CB walls only, verify if wood frame (ISO 2) or steel/noncombustible frame roof (ISO 4) *verify if wood frame walls (Frame ISO 1) or wood framing in roof only (JM ISO 2) Stucco, brick veneer, painted CB, or EIFS exterior cladding Floors in multi-story buildings are wood framed/wood deck or can be concrete on wood or steel deck. Wood frame roof with wood decking and typical roof covers below: *Shingles *Clay/concrete tiles *BUR (built up roof with gravel or modified bitumen) *Single-ply membrane *Less Likely metal sheathing covering *May be gable, hip, flat or combination of geometries Roof anchorage *Toe nailed *Clips *Single Wraps *Double Wraps Examples: Primarily Habitational, small office/retail, max 3-4 stories If “tunnel form” construction meaning there is a concrete deck above the top floor ceiling with wood frame roof over the top concrete deck, this will react to wind forces much the same way as typical JM construction.
    [Show full text]
  • NAVY Safety & Occupational Health Manual OPNAV M-5100.23 of 5 Jun
    OPNAV M-5100.23 5 Jun 2020 NAVY SAFETY AND OCCUPATIONAL HEALTH MANUAL THIS PAGE INTENTIONALLY LEFT BLANK THIS PAGE INTENTIONALLY LEFT BLANK OPNAV M-5100.23 5 Jun 2020 TABLE OF CONTENTS SECTION A. SAFETY MANAGEMENT SYSTEM Chapter 1. INTRODUCTION A0101. Purpose……………………………………………………………………..... A1-2 A0102. Scope and Applicability……………………………………………………… A1-2 A0103. Definition of Terms………………………………………………………….. A1-4 A0104. Background…………………………………………………………………... A1-4 A0105. Discussion……………………………………………………………………. A1-5 A0106. Introduction to the Navy SMS Framework………………………………….. A1-6 A0107. Responsibilities………………………………………………………………. A1-7 Chapter 2. POLICY AND ORGANIZATIONAL COMMITMENT A0201. Introduction………………………………………………………………….. A2-1 A0202. Methodology………………………………………………………………… A2-1 A0203. Organizational Commitment and Accountability…………………………… A2-3 A0204. Appointment of SMS Personnel……………………………………………… A2-4 Chapter 3. RISK MANAGEMENT A0301. Introduction………………………………………………………………….. A3-1 A0302. Methodology………………………………………………………………… A3-1 A0303. Error Tolerance……………………………………………………………… A3-1 A0304. Principles…………………………………………………………………..... A3-2 A0305. Requirements………………………………………………………………… A3-3 Chapter 4. ASSURANCE A0401. Introduction………………………………………………………………….. A4-1 A0402. Methodology………………………………………………………………… A4-1 A0403. Requirements……………………………………………………..................... A4-1 A0404. Continuous Improvement………………………………………………….… A4-2 A0405. Management Review……………………………………………………….... A4-2 Chapter 5. PROMOTION A0501. Introduction………………………………………………………………….. A5-1
    [Show full text]
  • Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم
    Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم اﻻنسيابية Prepared by Omar Mejbel Hammad Aljouani ((401320142)) Supervisor Dr. Hebah H. O. Nasereddin Dr. Abdulkareem O. Ibadi Master Thesis Submitted in Partial Fulfillment of the Requirements of the Master Degree in Computer Science Department of Computer Science Faculty of Information Technology Middle East University Amman - Jordan January - 2016 II ((بسم هللا الرحمن الرحيم(( ّ يَ ْر ف عَََللاَهَا ّل ذي نََآ مَ هنواَ م ْن هك ْمََ وَا ّلَ ذي نََ} ه ه ْ ْ {أَوتواَال عل مََ دَ ر جات ))صدق هللا العظيم(( II III IV Acknowledgment I utilize this opportunity to thank everyone helped me reach this stage and everyone who encourage me during performing this thesis. I want to thank Dr. Hebah H. O. Nasereddin for her guidance and supervision during writing this thesis. Extended thanks are also for my family and friends who encourage me during writing this thesis. I also want to thank everyone who believes that the knowledge is right for everyone. The greatest thank ever to assistant prof. Abdulkareem O. Ibadi, the head of software engineering department at Baghdad College for economic sciences. V Dedication اهدي خﻻصة جهدي العلمي المتواضع الى : قرة عيني الرسول محمد عليه افضل الصﻻة واتم التسليم ...... وطني العراق الجريح .................................... اخي الشهيد الحاضر الغائب صهيب ................... والدي ووالدتي واختي رفاق دربي ومسيرتي ............... كل من كان له بصمة بجهدي العلمي هذا............. كل الشهداء الذين استشهدوا برصاص الغدر والخيانة ...... كل من كان يدعي لي ويوجهني ويتمنى لي الخير ......... جامعة بغداد أخص بها كلية التربية ابن الهيثم ....... اﻻعدادية المركزية للبنين .................. VI Table of Contents AUTHORIZATION STATEMENT ..........................................................
    [Show full text]
  • ADA Adoption Handbook: a Program Manager's Guide, Version
    Technical Report CMU/SEI-92-TR-029 ESC-TR-92-029 Ada Adoption Handbook: A Program Manager's Guide Version 2.0 William E. Hefley John T. Foreman Charles B. Engle, Jr. John B. Goodenough October 1992 Technical Report CMU/SEI-92-TR-029 ESC-TR-92-029 October 1992 Ada Adoption Handbook: A Program Manager's Guide Version 2.0 AB William E. Hefley SEI Services John T. Foreman Defense Advanced Research Projects Agency Charles B. Engle, Jr. Florida Institute of Technology John B. Goodenough Real-Time Systems Program Unlimited distribution subject to the copyright. Software Engineering Institute Carnegie Mellon University Pittsburgh, Pennsylvania 15213 This report was prepared for the SEI Joint Program Office HQ ESC/AXS 5 Eglin Street Hanscom AFB, MA 01731-2116 The ideas and findings in this report should not be construed as an official DoD position. It ispublished in the interest of scientific and technical information exchange. FOR THE COMMANDER (signature on file) Thomas R. Miller, Lt Col, USAF SEI Joint Program Office This work is sponsored by the U.S. Department of Defense. Copyright© 1992 by Carnegie Mellon University. Permission to reproduce this document and to prepare derivative works from this document for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works. Requests for permission to reproduce this document or to prepare derivative works of this document for external and commercial use should be addressed to the SEI Licensing Agent. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS.
    [Show full text]
  • April/May 2006 U.S
    Language | Technology | Business Industry Focus: Mobile Applications Embedded multilingual mobile applications Mobile applications for the Arabic market Chinese input on mobile devices Multilingual handwriting recognition technology Search engine marketing in multiple languages Open source: a model for innovation April/May 2006 U.S. $7.95 Canada $9.95 Getting Started Guide: Content Management 01 Cover #79 LW331-7.indd 1 4/10/06 8:02:59 AM 02-03 ads.indd 2 4/10/06 7:38:35 AM 0ODFVQPOBUJNFy -BOHVBHFTPGUXBSFXBTTMPXBOEEJTDPOOFDUFE 1FPQMFIBEUPQBZZFBSBGUFSZFBSGPSPMEUFDIOPMPHZ 5IFO-JPOCSJEHFPQFOFE'SFFXBZ /PX5.T HMPTTBSJFT BOESFQPSUTBSFBDDFTTFE UISPVHIUIF8FC"OEDMJFOUT 1.T BOEUSBOTMBUPST DPMMBCPSBUFJOTUBOUMZ 8IFSFXJMM'SFFXBZUBLFZPV 'BTU $POOFDUFE 'SFF XXX(FU0O5IF'SFFXBZDPN LB ad MLC free 31306 indd 1 3/17/06 1:19 PM 02-03 ads.indd 3 4/10/06 7:38:49 AM MultiLingual #79 Volume 17 Issue 3 April/May 2006 Editor-in-Chief, Publisher: Donna Parrish Managing Editor: Laurel Wagers IN THE GLOBAL MARKETPLACE, Translation Dept. Editor: Jim Healey Copy Editor: Cecilia Spence News: Kendra Gray, Becky Bennett Illustrator: Doug Jones Production: Sandy Compton Webmaster: Aric Spence Assistant: Shannon Abromeit Advertising Director: Jennifer Del Carlo Advertising: Kevin Watson, Bonnie Merrell Editorial Board Jeff Allen, Henri Broekmate, Bill Hall, Andres Heuberger, Chris Langewis, Ken Lunde, John O’Conner, Mandy Pet, Reinhard Schäler Advertising [email protected] www.multilingual.com/advertising 208-263-8178 Subscriptions, back issues, customer service [email protected] www.multilingual.com/subscribe With business moving at lightning speed, you need Submissions, letters the expertise of a partner experienced at navigating the [email protected] evolving global landscape. Our three decades of quality- Editorial guidelines are available at focused, advanced solutions have resulted in long-standing www.multilingual.com/editorialWriter client relationships.
    [Show full text]
  • IGOSS-Industry/Government Open Systems Specification
    NIST Special Publication 500-217 Computer Systems IGOSS-Industry/Government Technology Open Systems Specification U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Gerard Mulvenna, Editor Standards and Technology NIST RESEARCH INFORMATION NAT-L INST. OF STAND & TECH R.I.C. MAR 2 6 1996 "'^ NIST PUBLICATIONS CENTER QC 100 .U57 iO. 500-217 994 7he National Institute of Standards and Technology was established in 1988 by Congress to "assist industry in the development of technology . needed to improve product quality, to modernize manufacturing processes, to ensure product reliability . and to facilitate rapid commercialization ... of products based on new scientific discoveries." NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry's competitiveness; advance science and engineering; and improve public health, safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain custody of the national standards of measurement, and provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce, industry, and education with the standards adopted or recognized by the Federal Government. As an agency of the U.S. Commerce Department's Technology Administration, NIST conducts basic and applied research in the physical sciences and engineering and performs related services. The Institute does generic and precompetitive work on new and advanced technologies. NIST's research facilities are located
    [Show full text]
  • Download Guide
    Informatica® Big Data Quality 10.2.2 Content Guide Informatica Big Data Quality Content Guide 10.2.2 February 2019 © Copyright Informatica LLC 1998, 2019 This software and documentation are provided only under a separate license agreement containing restrictions on use and disclosure. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC. U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation is subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License. Informatica and the Informatica logo are trademarks or registered trademarks of Informatica LLC in the United States and many jurisdictions throughout the world. A current list of Informatica trademarks is available on the web at https://www.informatica.com/trademarks.html. Other company and product names may be trade names or trademarks of their respective owners. Portions of this software and/or documentation are subject to copyright held by third parties. Required third party notices are included with the product. The information in this documentation is subject to change without notice. If you find any problems in this documentation, report them to us at [email protected].
    [Show full text]