Muuglines the Manitoba UNIX User Group Newsletter
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Complete Issue 40:3 As One
TUGBOAT Volume 40, Number 3 / 2019 General Delivery 211 From the president / Boris Veytsman 212 Editorial comments / Barbara Beeton TEX Users Group 2019 sponsors; Kerning between lowercase+uppercase; Differential “d”; Bibliographic archives in BibTEX form 213 Ukraine at BachoTEX 2019: Thoughts and impressions / Yevhen Strakhov Publishing 215 An experience of trying to submit a paper in LATEX in an XML-first world / David Walden 217 Studying the histories of computerizing publishing and desktop publishing, 2017–19 / David Walden Resources 229 TEX services at texlive.info / Norbert Preining 231 Providing Docker images for TEX Live and ConTEXt / Island of TEX 232 TEX on the Raspberry Pi / Hans Hagen Software & Tools 234 MuPDF tools / Taco Hoekwater 236 LATEX on the road / Piet van Oostrum Graphics 247 A Brazilian Portuguese work on MetaPost, and how mathematics is embedded in it / Estev˜aoVin´ıcius Candia LATEX 251 LATEX news, issue 30, October 2019 / LATEX Project Team Methods 255 Understanding scientific documents with synthetic analysis on mathematical expressions and natural language / Takuto Asakura Fonts 257 Modern Type 3 fonts / Hans Hagen Multilingual 263 Typesetting the Bangla script in Unicode TEX engines—experiences and insights Document Processing / Md Qutub Uddin Sajib Typography 270 Typographers’ Inn / Peter Flynn Book Reviews 272 Book review: Hermann Zapf and the World He Designed: A Biography by Jerry Kelly / Barbara Beeton 274 Book review: Carol Twombly: Her brief but brilliant career in type design by Nancy Stock-Allen / Karl -
Agda User Manual Release 2.6.3
Agda User Manual Release 2.6.3 The Agda Team Sep 23, 2021 Contents 1 Overview 3 2 Getting Started 5 2.1 What is Agda?..............................................5 2.2 Installation................................................7 2.3 ‘Hello world’ in Agda.......................................... 13 2.4 A Taste of Agda............................................. 14 2.5 A List of Tutorials............................................ 22 3 Language Reference 25 3.1 Abstract definitions............................................ 25 3.2 Built-ins................................................. 27 3.3 Coinduction............................................... 40 3.4 Copatterns................................................ 42 3.5 Core language.............................................. 45 3.6 Coverage Checking............................................ 48 3.7 Cubical.................................................. 51 3.8 Cumulativity............................................... 65 3.9 Data Types................................................ 66 3.10 Flat Modality............................................... 69 3.11 Foreign Function Interface........................................ 70 3.12 Function Definitions........................................... 75 3.13 Function Types.............................................. 78 3.14 Generalization of Declared Variables.................................. 79 3.15 Guarded Cubical............................................. 84 3.16 Implicit Arguments........................................... -
Fulf Illrent Or the Degree of I
FLORIDA S1 THE COLOPHOIP: I Submitted to th Florida State I: fulf illrent or the degree of I Approv Chapter I. HISTORY ABD DWELOP"P . 4 11. EDITORS AND COloeRIBUTORS. 28 111. FORMAT.. 50 Iv. COm... I... 60 SUWEURY.. ................e... 81 APmIX0.. 85 BIBLIOGRAPHY.. 87 WTRODUCT ION Onme tulit punctum qui miscuit utile dulci Lectorem delectando pariterque monendo Horace's statement in Ars Poetiea that "he has gained every vote who has mingled profit uith pleasure by delighting the reader at once and inatructhg him'' is as timely in the twentieth century as it was in his Own age. It is delightful to read for pleaaare and instruction at the ame time, but only rarely does the reader find mate- rial that satisfies him equally on both oomts. Too often is presented 'more matter uith less art" or form with too little substance. A happy combination conducive to both pleasure and instruction, however, may be found in -The +rter 3. This magazine, which for thirteen years provided readers with entertain- ing articles concerning bibliography, book illustration, and fine printing, was able to survive the depression, yet was unable to be continued during the period when the nation uas preparing for war. A detailed conaideration of its history and an evaluation of ita contenta is the burden of the paper, 1Tranalation by Wickham, The Oxf ord Dletionars or notations (2d ed.; London: Oxford University Presa, 19533), 1 2 a project which would seem appropriate in the training of a librarian in that the evaluation and selection of maganinea is a part of almost every librmian's dntfes and is of as much importance aa the aelection of books. -
Fonts, Typefaces, and IP Protection: Getting to Just Right Emily N
Journal of Intellectual Property Law Volume 21 | Issue 2 Article 4 April 2014 Fonts, Typefaces, and IP Protection: Getting to Just Right Emily N. Evans Follow this and additional works at: https://digitalcommons.law.uga.edu/jipl Part of the Intellectual Property Law Commons Recommended Citation Emily N. Evans, Fonts, Typefaces, and IP Protection: Getting to Just Right, 21 J. Intell. Prop. L. 307 (2014). Available at: https://digitalcommons.law.uga.edu/jipl/vol21/iss2/4 This Notes is brought to you for free and open access by Digital Commons @ Georgia Law. It has been accepted for inclusion in Journal of Intellectual Property Law by an authorized editor of Digital Commons @ Georgia Law. Please share how you have benefited from this access For more information, please contact [email protected]. Evans: Fonts, Typefaces, and IP Protection: Getting to Just Right NOTES FONTS, TYPEFACES, AND IP PROTECTION: GETTING TO JUST RIGHT Emily N Evan? TABLE OF CONTENTS 1. IN TRO D UCTIO N .........................................................................................309 II. BACKGROUND ................................................................................. 310 A. TYPEFACE TERMINOLOGY ................................;................................ 310 B. HISTORY OF TYPEFACE .......:............................................................... 311 1. Development of the FirstTypefaces and Fonts ...................................311 2. Talking A bout Type .........................................................................312 3. -
Minted Font List PDF
2021 FONT LIST & POINT SIZE/STROKE MINIMUM GUIDE click on the category name to jump to that section NEW FONTS 1 SANS SERIF 2–13 SLAB SERIF 14–16 SERIF 17–28 MULTI-STYLE 29–46 CONDENSED 47–51 SCRIPT 52–87 HAND-DRAWN 88–110 DECORATIVE / DISPLAY 111–122 OTHER 123–125 UNABLE TO LICENSE 126 FONT LIST - POINT SIZE AND STROKE MINIMUM GUIDE NEW FONTS APRILA LIGHT | REGULAR | MEDIUM | SEMIBOLD | BOLD | EXTRA BOLD | BLACK | 9 pt minimum font size The quick brown fox jumps over the lazy dog. BELLAMONA | 18 pt minimum font size The quick brown fox jumps over the lazy dog. BRITTISH SHORTHAIR REGULAR | 16 pt minimum font size The quick brown fox jumps over the lazy dog. DIDONESQUE BOLD ITALIC | 8 pt minimum font size The quick brown fox jumps over the lazy dog. KG ALL OF ME | 9 pt minimum font size The quick brown fox jumps over the lazy dog. MIGHTY MOUNTAIN REGULAR | SINGLE | 12 pt minimum font size The quick brown fox jumps over the lazy dog. RODETTA REGULAR | 8 pt minimum font size The quick brown fox jumps over the lazy dog. RODETTA ROSSIE SCRIPT | 12 pt minimum font size T he quick brown fox jumps over the lazy dog. SANTA FE SPRING | 13 pt minimum font size The quick brown fox jumps over the lazy dog. SWEET APRICOT | 13 pt minimum font size The quick brown fox jumps over the lazy dog. TT RAMILLAS BOLD | 8 pt minimum font size The quick brown fox jumps over the lazy dog. UPDATED 6.23.21 | 1 FONT LIST - POINT SIZE AND STROKE MINIMUM GUIDE SANS SERIF ABEL REGULAR | 8 pt minimum font size The quick brown fox jumps over the lazy dog. -
LATEX Metalogox Package V1.00 — 2019/01/20
The LATEX metalogox package v1.00 — 2019/01/20 © 2019 Brian Dunn [email protected] Automatically adjusts the TEX logo and related, depending on the font. Font Default metalogox Latin Modern LATEX 2" LATEX 2" Erewhon LATEX 2" LATEX 2" Libre Caslon LATEX 2" LATEX 2" IM Fell English LATEX 2" LATEX 2" Coelacanth LATEX 2" LATEX 2" Alegreya LATEX 2" LATEX 2" Helvetica LATEX 2" LATEX 2" Antiqua LATEX 2" LATEX 2" Abstract The metalogox package extends the metalogo package to automatically adjust the appearance of the logos TEX, LATEX, LATEX 2",X LE ATEX, and LuaLATEX, depending on the font detected or the option given to metalogox. Most of the serif and sans fonts listed at The LATEX Font Catalogue are sup- ported. metalogox 2 Contents 1 Introduction3 2 Using the metalogox package3 3 Code5 3.1 Required packages.............................5 3.2 Package options..............................5 3.2.1 Common synonyms........................ 16 3.2.2 Similar fonts............................ 17 3.3 Manual adjust selection.......................... 18 3.4 Font detection............................... 18 3.5 Option declaration............................. 25 3.6 Default settings............................... 25 3.7 Option trigger............................... 25 Change History and Index 26 metalogox 3 1 Introduction The rendering of the logos TEX, LATEX, LATEX 2",X LE ATEX, X TE EX, and LuaLATEX depends on the font, and in some cases the appearance of these logos may be improved with some minor adjustments of the positions of each of the elements. The metalogo package, by Andrew Gilbert Moschou, allows the user to specify these adjustments, but it is left to the user to determine the values to use. -
Complete Issue 33:1 As One
TUGBOAT Volume 33, Number 1 / 2012 General Delivery 2 TUG 2012 announcement 3 Ab epistulis / Steve Peter 3 Editorial comments / Barbara Beeton Don Knuth, reprise; An alternate view of CTAN; Linotype: The Film; Barriers to effective communication: Jean-luc Doumont; Kern it!; A wonderful use of old books; The Plantin-Moretus Museum in Antwerp 5 Hyphenation exception log / Barbara Beeton 7 In memoriam: Tony Siegman, 1931–2011 / Bruce Armbruster and Jeannie Howard Siegman Typography 8 Typographers’ Inn / Peter Flynn Fonts 11 Lucida OpenType fonts available from TUG / Karl Berry 12 The Amiri typeface / Khaled Hosny Bibliographies 13 Biber — the next generation backend processor for BibLATEX / Philip Kime Electronic Documents 16 X E LATEX and the PDF archivable format / Claudio Beccari LATEX 21 Avoid eqnarray! / Lars Madsen 26 The unknown picture environment / Claudio Beccari 33 The apa6 LATEX class: Challenges encountered updating to new requirements / Brian Beitzel 39 Glisterings: Timelines; Parsing a filename / Peter Wilson 43 Some LATEX2ε tricks and tips (V) / Luca Merciadri 46 LATEX3 news, issues 6–7 / LATEX Project Team Software & Tools 48 User-friendly web utilities for generating LATEX output and MetaPost graphics / Troy Henderson 53 TEX on Windows: MiKTEX or TEX Live? / Joseph Wright 54 Generating barcodes with LuaTEX / Patrick Gundlach 59 OpenType fonts in LuaTEX / Paul Isambert ConTEXt 86 ConTEXt: Updating the code base / Hans Hagen Graphics 98 Computing the area and winding number for a B´ezier curve / Bogusław Jackowski 102 Three-dimensional -
Strong Protection of Sensitive Textual Content of Mobile Applications
SchrodinText: Strong Protection of Sensitive Textual Content of Mobile Applications Ardalan Amiri Sani Computer Science Department University of California, Irvine [email protected] Abstract Keywords Many mobile applications deliver and show sensitive and Text protection; Mobile devices; UI safety; TrustZone; Vir- private textual content to users including messages, social tualization network posts, account information, and verification codes. All such textual content must only be displayed to the user 1. INTRODUCTION but must be strongly protected from unauthorized access There are millions of mobile applications today. The tex- in the device. Unfortunately, this is not the case in mobile tual content that many of these applications show to the devices today: malware that can compromise the operating user in their UI can contain extremely sensitive and pri- system, e.g., gain root or kernel privileges, can easily access vate information, such as social security number, bank ac- textual content of other applications. count information, private messages, passwords (in a pass- In this paper, we present SchrodinText, a system solution word vault), and verification codes used for two-factor au- for strongly protecting the confidentiality of application's se- thentication. Such content must only be displayed to the user lected UI textual content from a fully compromised operat- but must be otherwise protected against unauthorized access ing system. SchrodinText leverages a novel security monitor by malware. Indeed, Zhou et al. found 644 malware samples based on two hardware features on modern ARM processors: (in 27 families) that harvest \user's information, including virtualization hardware and TrustZone. Our key contribu- user accounts and short messages stored on the phones" [54].