007-2006-100 Contributors

Total Page:16

File Type:pdf, Size:1020Kb

007-2006-100 Contributors Indigo Magic™ Desktop Integration Guide Document Number 007-2006-100 CONTRIBUTORS Written by Beth Fryer, Jed Hartman, Ken Jones, and Pete Sullivan Illustrated by Beth Fryer and Seth Katz Edited by Christina Cary Production by Derrald Vogt, Cindy Stief, and Linda Rae Sande Engineering contributions by Bob Blean, Susan Dahlberg, Susan Ellis, John Krystynak, Chandra Pisupati, Jack Repenning, CJ Smith, Dave Story, Steve Strasnick, Rebecca Underwood, Steve Yohanan, and Betsy Zeller St Peter’s Basilica image courtesy of ENEL SpA and InfoByte SpA. Disk Thrower image courtesy of Xavier Berenguer, Animatica. © Copyright 1994, 1995, 1996 Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94039-7311. Silicon Graphics, the Silicon Graphics logo, and IRIS are registered trademarks and IRIS, IRIS GL, IRIS IM, IRIS InSight, IRIS ViewKit, IRIX, GoldenGate, IconSmith, Indigo Magic, the Graphics Library, OpenGL, Open Inventor, and RapidApp are trademarks of Silicon Graphics, Inc. Apple is a registered trademark and Apple Quicktime is a trademark of Apple Computer, Inc. Kodak is a trademark of Eastman Kodak Company. Microsoft is a registered trademark of Microsoft Corporation. Motif and OSF/Motif are trademarks of the Open Software Foundation. PostScript is a registered trademark of Adobe Systems, Inc. Solaris is a registered trademark and Sun and SunOS are trademarks of Sun Microsystems, Inc. Wavefront is a trademark of Wavefront Technologies. X Window System is a trademark of the Massachusetts Institute of Technology. Indigo Magic™ Desktop Integration Guide Document Number 007-2006-100 Contents List of Examples xv List of Figures xvii List of Tables xix About This Guide xxi What This Guide Contains xxi How to Use This Guide xxi What You Should Know Before Reading This Guide xxi Suggested Reading xxii Font Conventions in This Guide xxiii Integrating an Application Into the Indigo Magic Desktop Environment: An Introduction xxv About the Indigo Magic Desktop Environment xxv Implementation Strategies and Toolkits xxvii Implementation Checklist xxviii Using ViewKit and RapidApp xxix Integrating an Application xxxii PART I Getting the Right Look and Feel 1. Getting the Right Look and Feel: An Overview 5 About the Indigo Magic Look and Feel 5 Getting the Right Look and Feel: The Basic Steps 6 iii Contents 2. Getting the Indigo Magic Look 9 3. Using Schemes 13 Schemes Overview 13 Why You Should Use Schemes 14 Basic Scheme Concepts 14 Using Schemes in Your Application 15 Turning on Schemes for Your Application 15 Special Considerations for Programming with Schemes 16 Assigning Non-Default Colors and Fonts to Widgets 17 Directly Accessing Colors and Fonts 18 Pre-Defined Scheme Resources and Symbolic Values 21 Extending a Scheme to Support New Colors 24 Scheme File Organization 24 How to Extend a Scheme 25 Testing Your Application with Schemes 27 Creating New Schemes 27 Hard-Coding a Scheme for an Application 28 4. Using the Silicon Graphics Enhanced Widgets 31 Using the SGI Enhanced Widgets 31 Using the Widget Demos 31 Location of Widget Demos 32 Instructions for Building the Widget Demos 32 The Enhanced Widgets 33 The File Selection Box Widget 33 The Scale (Percent Done Indicator) Widget 35 The Text and TextField Widgets 36 The Mixed-Model Programming Widgets 37 iv Contents The SGI Enhanced Widgets 38 The Color Chooser Widget 39 The Dial Widget 44 The Thumbwheel Widget 46 The Drop Pocket Widget 49 The Finder Widget 51 The Graph Widget 54 The Springbox Widget 55 The Grid Widget 56 HTML Viewer Component 60 Overview of the HTML Viewer Components 62 Viewer Components 62 Supported Tags and Attributes 63 5. Window, Session, and Desk Management 69 Window, Session, and Desk Management Overview 69 Window Management 69 Session Management 70 Desk Management 74 Further Reading on Window and Session Management 75 Implementing an Application Model 75 Implementing the “Single Document, One Primary” Model 76 Implementing the “Single Document, Multiple Primaries” Model 76 Implementing the “Multiple Document, Visible Main” Model 76 Implementing the “Multiple Document, No Visible Main” Model 77 Interacting With the Window and Session Manager 78 Creating Windows and Setting Decorations 79 Handling Window Manager Protocols 85 Setting the Window Title 89 Controlling Window Placement and Size 90 v Contents 6. Customizing Your Application’s Minimized Windows 95 Some Different Sources for Minimized Window Images 95 Creating a Minimized Window Image: The Basic Steps 96 Using mediarecorder to Get an RGB Format Image 97 Resizing the RGB Image Using imgworks 99 Setting the Minimized Window Label 99 Changing the Minimized Window Image 100 7. Interapplication Data Exchange 103 Data Exchange Overview 103 Primary Transfer Model Overview 104 Clipboard Transfer Model Overview 105 Interaction Between the Primary and Clipboard Transfer Models 106 Implementing the Primary Transfer Model 107 Data Selection 107 Requests for the Primary Selection 108 Loss of the Primary Selection 109 Inserting the Primary Selection 109 Implementing the Clipboard Transfer Model 110 Cut Actions 110 Copy Actions 112 Requests for the Clipboard Selection 112 Paste Actions 112 Loss of the Clipboard Selection 113 Supported Target Formats 113 Data Conversion Service 117 The Converter Registry 118 The GoldenGate API 118 vi Contents 8. Monitoring Changes to Files and Directories 121 FAM Overview 121 Theory of Operation 122 FAM Libraries and Include Files 122 The FAM Interface 123 Opening and Closing a FAM Connection 123 Monitoring a File or Directory 124 Suspending, Resuming, and Canceling Monitoring 125 Detecting Changes to Files and Directories 126 FAM Examples 131 Using FAM 132 Waiting for File Changes 133 Polling for File Changes 136 9. Providing Online Help With SGIHelp 141 Overview of SGIHelp 141 The Help Viewer 142 The SGIHelp Library and Include File 143 Help Document Files 144 Application Helpmap Files 144 The SGIHelp Interface 144 Initializing the Help Session 144 Displaying a Help Topic 146 Displaying the Help Index 147 Implementing Help in an Application 148 Constructing a Help Menu 149 Implementing a Help Button 150 Providing Context-Sensitive Help 151 Application Helpmap Files 153 Helpmap File Conventions 154 Helpmap File Format 154 Widget Hierarchies in the Helpmap File 157 vii Contents Writing the Online Help 159 Overview of Help Document Files 159 Viewing the Sample Help Document Files 160 Creating a Help Document File 161 Preparing to Build the Online Help 161 Building the Online Help 163 Finding and Correcting Build Errors 163 Producing the Final Product 165 Creating the Installable Subsystem 165 Incorporating the Help Subsystem into an Installable Product 165 Incorporating the Help Subsystem into a Product With a Custom Installation Script 166 Bibliography of SGML References 166 10. Handling Users’ System Preferences 171 Handling the Mouse Double-Click Speed Setting 171 Using the Default Viewer and Editor Utilities Panel 172 Selecting Utilities and Their Values 173 Setting the Preferred Text Editor 173 PART II Creating Desktop Icons 11. Creating Desktop Icons: An Overview 179 About Indigo Magic Desktop Icons 179 Checklist for Creating an Icon 181 Creating an Icon: The Basic Steps Explained in Detail 182 Step One: Tagging Your Application 183 Step Two: Drawing a Picture of Your Icon 183 Step Three: Programming Your Icon 184 Step Four: Compiling the Source Files 189 Step Five: Installing Your Application in the Icon Catalog 190 Step Six: Restarting the Desktop 191 Step Seven: Updating Your Installation Process 191 viii Contents 12. Using IconSmith 195 About IconSmith 196 Where to Install Your Completed Icon 196 Some Definitions 197 Starting IconSmith 198 IconSmith Menus 199 IconSmith Windows 200 Drawing With IconSmith 200 Drawing Paths 202 Drawing Filled Shapes 202 Deleting 203 Keeping the 3-D Look 204 Drawing for All Scales 204 Sharing Design Elements 205 Templates 206 Selecting 206 Partial 207 Deselect Fragments 207 Select Next 208 Select All 208 Transformations 208 Scale 209 Scale X and Y 209 Rotate 209 Shear Y 210 Concave Polygons 210 Constraints: Gravity (Object) Snap and Grid Snap 211 Controlling the Grid 212 Controlling Gravity 212 Icon Design and Composition Conventions 213 Importing Generic Icon Components (Magic Carpet) 213 Icon Size 214 Selecting Colors 214 ix Contents Advanced IconSmith Techniques 215 Drawing a Circle 215 Drawing an Oval 217 Isometric Circles 218 13. File Typing Rules 225 A Table of the FTRs With Descriptions 226 Naming File Types: The TYPE Rule 227 Categorizing File Types: The SUPERTYPE Rule 228 Matching File Types With Applications: The MATCH Rule 229 Matching Tagged Files 230 Matching Files Without the tag Command 231 Matching Non-Plain Files: The SPECIALFILE Rule 235 Adding a Descriptive Phrase: The LEGEND Rule 235 Setting FTR Variables: The SETVAR Rule 236 Programming Open Behavior: The CMD OPEN Rule 237 Programming Alt-Open Behavior: The CMD ALTOPEN Rule 238 Programming Drag and Drop Behavior: The CMD DROP and DROPIF Rules 239 Mapping Names: The MAP Rule 242 Programming Print Behavior: The CMD PRINT Rule 242 Adding Menu Items: The MENUCMD Rule 243 Getting the Icon Picture: The ICON Rule 244 Creating a File Type: An Example 246 Open an FTR File for scribble 246 Add the Rules to the scribble FTR File 247 Name the scribble FTR File and Put It in the Appropriate Directory 250 The scribble FTRs 251 x Contents 14.
Recommended publications
  • 4010, 237 8514, 226 80486, 280 82786, 227, 280 a AA. See Anti-Aliasing (AA) Abacus, 16 Accelerated Graphics Port (AGP), 219 Acce
    Index 4010, 237 AIB. See Add-in board (AIB) 8514, 226 Air traffic control system, 303 80486, 280 Akeley, Kurt, 242 82786, 227, 280 Akkadian, 16 Algebra, 26 Alias Research, 169 Alienware, 186 A Alioscopy, 389 AA. See Anti-aliasing (AA) All-In-One computer, 352 Abacus, 16 All-points addressable (APA), 221 Accelerated Graphics Port (AGP), 219 Alpha channel, 328 AccelGraphics, 166, 273 Alpha Processor, 164 Accel-KKR, 170 ALT-256, 223 ACM. See Association for Computing Altair 680b, 181 Machinery (ACM) Alto, 158 Acorn, 156 AMD, 232, 257, 277, 410, 411 ACRTC. See Advanced CRT Controller AMD 2901 bit-slice, 318 (ACRTC) American national Standards Institute (ANSI), ACS, 158 239 Action Graphics, 164, 273 Anaglyph, 376 Acumos, 253 Anaglyph glasses, 385 A.D., 15 Analog computer, 140 Adage, 315 Anamorphic distortion, 377 Adage AGT-30, 317 Anatomic and Symbolic Mapper Engine Adams Associates, 102 (ASME), 110 Adams, Charles W., 81, 148 Anderson, Bob, 321 Add-in board (AIB), 217, 363 AN/FSQ-7, 302 Additive color, 328 Anisotropic filtering (AF), 65 Adobe, 280 ANSI. See American national Standards Adobe RGB, 328 Institute (ANSI) Advanced CRT Controller (ACRTC), 226 Anti-aliasing (AA), 63 Advanced Remote Display Station (ARDS), ANTIC graphics co-processor, 279 322 Antikythera device, 127 Advanced Visual Systems (AVS), 164 APA. See All-points addressable (APA) AED 512, 333 Apalatequi, 42 AF. See Anisotropic filtering (AF) Aperture grille, 326 AGP. See Accelerated Graphics Port (AGP) API. See Application program interface Ahiska, Yavuz, 260 standard (API) AI.
    [Show full text]
  • X Window System Version 6.4.2 Release Notes
    X Window System Version 6.4.2 Release Notes October 2000 0890298-6.4.2 READREAD MEME BEFOREBEFORE INSTALLINGINSTALLING THISTHIS PRODUCTPRODUCT Copyright Copyright 2000 by Concurrent Computer Corporation. All rights reserved. This publication or any part thereof is intended for use with Concurrent Computer Corporation products by Concurrent Computer Corporation personnel, customers, and end–users. It may not be reproduced in any form without the written permission of the publisher. Disclaimer The information contained in this document is subject to change without notice. Concurrent Computer Corporation has taken efforts to remove errors from this document, however, Concurrent Computer Corporation’s only liability regarding errors that may still exist is to correct said errors upon their being made known to Concurrent Computer Corporation. Concurrent Computer Corporation assumes no responsibility for the use or reliability of software if used on equipment that is not supplied by Concurrent Computer Corporation. License The software described in this document is furnished under a license, and it can be used or copied only in a manner permitted by that license. Any copy of the described software must include any copyright notice, trademarks or other legends or credits of Concurrent Computer Corporation and/or its suppliers. Title to and ownership of the described software and any copies thereof shall remain in Concurrent Computer Corporation and/or its suppliers. The licensed software described herein may contain certain encryptions or other devices which may prevent or detect unauthorized use of the Licensed Software. Temporary use permitted by the terms of the License Agreement may require assistance from Concurrent Computer Corporation.
    [Show full text]
  • No Slide Title
    Embedded Systems Class overview, Embedded systems introduction, Raspberry Pi, Linux OS, X-windows, Window manager, Desktop Environment Prof. Myung-Eui Lee (A-405) [email protected] Embedded Systems 1-1 KUT Embedded Systems Class Overview ⚫ Embedded Systems Class Operations » Past : 3 (credit) -2 (lecture) -2 (practice) » Now : 3 (credit) -1 (lecture) -1 (design) -2 (practice) » Future : 4 (credit) -2 (lecture) -2 (design) -0 (practice) ⚫ PBL : Problem or Project Based Learning » Problem : 4 problems » Project : 2 projects ⚫ 4 hours Class » 1 hour (lecture) + 1 hour (lecture or design) + 2 hours (practice) ▪ 1 hour (lecture) + 1 hour (lecture or design) : me ▪ 2 hours (practice) : Ph.D Park ⚫ Target Board : Raspberry Pi 3 » ARM + Linux Embedded Systems 1-2 KUT Embedded Systems Class Overview ⚫ Class Grade : » Mid Term Exam : 15 % [30 %] » Final Term Exam : 15 % [30 %] » Peer Evaluation : 10 % (Project #1 : 5% + Project #2 : 5%) » Project #1 Evaluation : 10 % » Project #2 Evaluation : 15 % » Experimental Lab. : 20 % [20 %] » Class Participation : 15 % [20 %] » Social Problem (Project #2) Optional : +5 % ⚫ Lecture Notes: http://microcom.koreatech.ac.kr Embedded Systems 1-3 KUT Embedded Systems ⚫ Definition of embedded system » Embedded system = H/W + S/W ▪ H/W = CPU + Memory + I/O ▪ S/W = Device driver + OS (or non OS) + Application program » Any electronic system that uses a CPU chip, but that is not a general-purpose workstation, desktop or laptop computer. » In embedded systems, the software typically resides in memory device, such as a flash memory or ROM chip. In contrast to a general-purpose computer that loads its programs into RAM each time. » Sometimes, single board and rack mounted general-purpose computers are called "embedded computers" if used to control.
    [Show full text]
  • The Virtualization Cookbook for SLES 10
    z/VM and Linux on IBM System z: The Virtualization Cookbook for z/VM 6.2 RHEL 6.2 and SLES 11 SP2 A “cookbook” for installing and customizing z/VM 6.2, RHEL 6.2 and SLES 11 SP2 on the mainframe Michael MacIsaac Brad Hinson Marian Gasparovic . Contents Preface . xi Parts of this book . xi Summary of changes in the July 2012 version . xi Summary of changes in the January 2012 version . xii Conventions . xiii Operating system releases used . xiii The team that wrote this book . xiii Special thanks . xiii Comments welcome. xiv Part 1. Introduction and z/VM . 1 Chapter 1. Introduction to z/VM and Linux . 1 1.1 What is virtualization? . 3 1.2 A philosophy adopted in this book . 4 1.3 Choices and decisions made in this book . 4 1.4 Single System Image design. 4 1.5 Infrastructure design . 5 1.6 Usability tests performed. 6 Chapter 2. Planning . 7 2.1 Planning for an SSI and LGR . 7 2.1.1 Hints and Tips . 7 2.1.2 Need for ECKD DASD . 9 2.2 Bill of materials . 9 2.2.1 Hardware resources . 9 2.2.2 Software resources . 9 2.2.3 Networking resources . 10 2.3 z/VM conventions . 10 2.3.1 Volume labeling convention . 10 2.3.2 Backup file naming convention . 11 2.3.3 The command retrieve convention . 11 2.4 Disk planning. 12 2.5 Memory planning. 13 2.6 Password planning . 13 2.7 Planning worksheets . 14 2.7.1 z/VM resources used in this book .
    [Show full text]
  • Bonus Chapter B Programming for X
    Bonus Chapter B Programming for X In this chapter and the next, we’ll take a look at writing programs to run in the usual Linux graphical environment, the XWindow System or X, http://www.x.org/Xorg.html. Modern UNIX systems and nearly all Linux distributions are shipped with a version of X. We’ll be concentrating on the programmer’s view of X, and we’ll assume that you are already comfortable with configuring, running, and using X on your system. We’ll cover ❑ X concepts ❑ X Windows managers ❑ X programming model ❑ Tk—its widgets, bindings, and geometry managers In the next chapter, we’ll move on to the GTK+ toolkit, which will allow us to program user interfaces in C for the GNOME system. What Is X? X was created at MIT as a way of providing a uniform environment for graphical programs. Nowadays it should be fair to assume that if you’ve used computers, you’ve come across either Microsoft Windows, X, or Apple MacOS before, so you’ll be familiar with the general concepts underlying a graphical user interface, or GUI. Unfortunately, although a Windows user might be able to navigate around the Mac interface, it’s a different story for programmers. Each windowing environment on each system is programmed differently. The ways that the display is handled and the programs communicate with the user are different. Although each system provides the programmer with the ability to open and manipulate windows on the screen, the functions used will be different. Writing applications that can run on more than one system (without using additional toolkits) is a daunting task.
    [Show full text]
  • Common Desktop Environment 1.0 Programmer's Overview
    Common Desktop Environment 1.0 Programmer’s Overview This edition of the Common Desktop Environment Advanced User’s and System Administrator’s Guide applies to AIX Version 4.2, and to all subsequent releases of these products until otherwise indicated in new releases or technical newsletters. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the United States Government is subject to the restrictions set forth in DFARS 252.227-7013 (c)(1)(ii) and FAR 52.227-19. THIS PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. The code and documentation for the DtComboBox and DtSpinBox widgets were contributed by Interleaf, Inc. Copyright 1993, Interleaf, Inc. Copyright 1993, 1994, 1995 Hewlett-Packard Company Copyright 1993, 1994, 1995 International Business Machines Corp. Copyright 1993, 1994, 1995 Sun Microsystems, Inc. Copyright 1993, 1994, 1995 Novell, Inc. All rights reserved. This product and related documentation are protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form by any means without prior written authorization. All rights reserved. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the United States Government is subject to the restrictions set forth in DFARS 252.227-7013 (c)(1)(ii) and AR 52.227-19. Part 1 —Common Desktop Environment Architectural Overview 1. Architectural Overview. 1 Conceptual Overview. 1 Data Interaction GUIs. 2 Multiuser Collaboration. 3 Desktop Management.
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • An Introduction to X Window Application Development
    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1992-03 An introduction to X Window application development. Rust, David Michael Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/23933 FV KNOX LIBRARY •Ud SCHOOL SivAL POSTGRADUATE SoNTEHEV.CAUFORN.AG^^ CURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE 1b. RESTRICTIVE MARKINGS REPORT SECURITY CLASSIFICATION UNCLASSIFIED a SECURITY CLASSIPICAT I6M AUTH6RITV 3. bisTRiBuTi6N7AVAlLABiUTY 6P REP5RT Approved for public release; b. dECLAssIFICATIoN/doWNgRADINg SCHEDULE distribution is unlimited PERFORMING ORGANIZATION REP6RT NUM&ER(S) 5. M6niT6Ring6Rgani2aTi6n rep6rT numbER(S) *. NAME 6F PERFORMING 6R6ANIZATI6N 6b OFFICE SYMBOL 7a. NAME 6E M6NIT6R1NG ORGANIZATION vdministrative Sciences Department (if applicable) Naval Postgraduate School Javal Postgraduate School AS :. ADDRESS (City, State, and ZIP Code) 7b. ADDRESS (City, State, and ZIP Code) /lonterey, CA 93943-5000 Monterey, CA 93943-5000 NAME OF FUNDING/SPONSORING 8b. OFFICE SYMBOL g PROCURE M E N T I NST RUMEN T ID E N T I FI CATION NUMBE R ORGANIZATION (if applicable) 6. ADDRESS (City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS PROGRAM 1 PR6JECT TTa^R" WoRkUNiT ELEMENT NO. NO. NO. ACCESSION NO. 1 . TITLE (Include Security Classification) ^N INTRODUCTION TO X WINDOW APPLICATION DEVELOPMENT (U) 2 PERSONAL AUTHOR(S) lust, David M. 3a. type of report 13b. time covered 14. DATE OF REPORT (Year, Month, Day) 16. PAGE COUNT Master's Thesis from 10/90 to 03/92 1992, March, 23 70 supplementary notation 6 The views expressed in this ^sis ^ those of the author md do not reflect the official policy or position of the Department of Defense or the United States Government.
    [Show full text]
  • Operációs Rendszerek III. Az X Window Rendszer Működése Kliens-Szerver Modell Használata
    Operációs rendszerek III. X WindowSystem Az X Window rendszer Grafikus alkalmazások felhasználói felületének megjelenítése. · 1983-84: a Massachusetts Institute of Technology- n (MIT, USA). · Azonos kezelői felületet különböző operációs rendszereken. · Működés: az alkalmazás és a kezelői felület szétválasztása. · Forráskódja publikus. (Elsősorban a UNIX rendszerek támogatják.) vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. X WindowSystem X munkahely X protokoll X szerver Távoli kliens képernyő képernyő alkalmazás vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. X WindowSystem vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. Az X Window rendszer működése Kliens-szerver modell használata. A szerver kezeli az ún. grafikus munkahelyet, melynek részei: · képernyő (ill. képernyők), · billentyűzet (alfanumerikus bemeneti eszköz), · egy grafikus bemeneti eszköz. A kliens egy grafikus kimenetű (általában vasárnianp, 2t00era5. novembkert ív) folyamDr.a Benyt.óBalázs 27. Operációs rendszerek III. Az X protokoll Az X protokoll •A rendszer magja az X protokoll: · Definiálja a kliens és a szerver együttműködésének módját. •A protokoll kétirányúaszinkron kommunikációt tesz lehetővé. vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. Az üzenetek típusai · Kérés (kliens küldi a szervernek). · Válasz (szerver küldi a kliensnek). · Esemény (szerver küldi a kliensnek). · Hiba (szerver küldi a kliensnek). vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. A hálózati kommunikáció mérséklése · Kliens: · üzenetek összegyűjtött csomagját küldi át · Szerver: · helyben kezel egyszerű eseményeket (pl. egérmozgatás). · szoftver erőforrásokat hoz létre · pl. palettát, grafikus környezetet, betűtípushoz tartozóleírást, stb. · erőforrás kezelése: · létrehozás kliens kérésére · a kliens folyamat egyszerű hivatkozással érhet el vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. X Windowrendszer működése Az X Window rendszer koncepciója Alapvető elem a grafikus, ún.
    [Show full text]
  • Technical Standard X/Open Common Desktop Environment (XCDE
    Technical Standard X/Open Common Desktop Environment (XCDE) Services and Applications NICAL H S C T A E N T D A R D [This page intentionally left blank] X/Open CAE Specification X/Open Common Desktop Environment (XCDE) Services and Applications X/Open Company Ltd. March 1995, X/Open Company Limited All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. X/Open CAE Specification X/Open Common Desktop Environment (XCDE) Services and Applications ISBN: 1-85912-074-1 X/Open Document Number: C323 Published by X/Open Company Ltd., U.K. Any comments relating to the material contained in this document may be submitted to X/Open at: X/Open Company Limited Apex Plaza Forbury Road Reading Berkshire, RG1 1AX United Kingdom or by Electronic Mail to: [email protected] ii X/Open CAE Specification Contents Chapter 1 Window Management Services..................................................... 1 1.1 Introduction ................................................................................................. 1 1.2 Data Formats................................................................................................ 2 Chapter 2 Workspace Management Services ............................................... 3 2.1 Introduction ................................................................................................. 3 2.2 Functions .....................................................................................................
    [Show full text]
  • Motif Reference Manual for Openmotif 2.3
    THE DEFINITIVE GUIDES TO THE X WINDOW SYSTEM VOLUME SIX B Motif Reference Manual for OpenMotif 2.3 Open Source Edition Based upon the manual writted by Antony Fountain and Paula Ferguson, O’Reilly and Associates Updated and Published by Peter Winston and the Technical Staff of Integrated Computer Solutions, Inc. Motif Reference Manual, Open Source Edition for OpenMotif version 2.3 Copyright ©2005 by Integrated Computer Solutions, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, v1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). December 2001 Copyright ©1993, 2000, 2001 by O’Reilly & Associates, Inc. and Antony Fountain. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, v1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). This is an updated version of the Motif Reference Manual, Open Source Edition for Motif 2.1, published by Imperial Software Technology in December 2001. The source files for this version of the document are available at http://www.motifzone.org. The source files for the Open Source Edition can be found at http://www.ist.co.uk/motif/motif_refs.html. A description of the modifications is contained in the Preface to the Open Source Edition. The Open Source Edition is a modified version of the Motif Reference Manual, Second Edition, published by O’Reilly & Associates in February 2000. The source files for the Second Edition can be found at http://www.oreilly.com/openbook/motif/.
    [Show full text]
  • Motif Programming Manual 1 Preface
    Motif Programming Manual 1 Preface...........................................................................................................................................................................1 1.1 The Plot..........................................................................................................................................................1 1.2 Assumptions...................................................................................................................................................2 1.3 How This Book Is Organized........................................................................................................................3 1.4 Related Documents........................................................................................................................................5 1.5 Conventions Used in This Book....................................................................................................................6 1.6 Obtaining Motif.............................................................................................................................................6 1.7 Obtaining the Example Programs..................................................................................................................7 1.7.1 FTP.................................................................................................................................................7 1.7.2 FTPMAIL......................................................................................................................................7
    [Show full text]