An MPEG Standard for Rich Media Services

Total Page:16

File Type:pdf, Size:1020Kb

An MPEG Standard for Rich Media Services What’s New with MPEG? ded domain, service interfaces must leverage the online experience. Finally, because users pay for these services, they also expect a decent level of quality, efficiency, and readability. An MPEG The Moving Picture Experts Group (see the “Related Standards Organizations” sidebar on p. 64 for brief descriptions of MPEG and other groups involved in this effort) has specified Standard for Rich MPEG-4 part 20 (formally known as ISO/IEC 14496-20) as the new rich media standard dedi- cated to the mobile, embedded, and consumer electronics industries. MPEG-4 part 20 defines Media Services two binary formats: Lightweight Application Scene Representation (Laser) and Simple Aggregation Format (SAF). Laser enables a fresh Jean-Claude Dufourd and Olivier Avaro and active user experience on constrained net- Streamezzo works and devices based on enriched content, including audio, video, text, and graphics. It Cyril Concolato addresses the requirements of the end-to-end ENST rich media publication chain: ease of content cre- ation, optimized rich media data delivery, and enhanced rendering on all devices. As such, it ful- rich media service is a dynamic, inter- fills the need for an efficient open standard. Lightweight active collection of multimedia data Application Scene such as audio, video, graphics, and Key features and use cases Representation text. Services range from movies Four key features distinguish Laser from exist- (Laser) is the Moving enrichedA with vector graphic overlays and inter- ing technologies: Picture Expert activity (possibly enhanced with closed captions) Group’s solution for to complex multistep services with fluid interac- ❚ In Laser, graphic animations, audio, video, delivering rich media tion and different media types at each step. and text are packaged and streamed together. services to mobile, Demand for these services is rapidly increasing, Unlike existing mobile technologies that are resource-constrained spurred by the development of the next-genera- mostly aggregations of various components, devices. Laser tion mobile infrastructure and the generalization Laser’s design is based on a single, well- provides easy of TV content to new environments. However, defined, and deterministic component that content creation, despite long-lasting deployments and significant integrates all of the media (the same design optimized rich investment from various industries, mobile and, that made Macromedia Flash successful on media data delivery, more generally, embedded interactive services the Web). This integration ensures the rich- and enhanced (mobile Internet and interactive mobile TV, for ness and quality of the end-user experience. rendering on all example) have failed to reach the masses. In addi- devices. tion to conjectural (such as economic) and struc- ❚ Laser provides full-screen interactivity with all tural (such as a lack of compelling business streams. It uses vector graphic technology so models) problems, current technologies (see the users can easily fit content to the screen size. related sidebar on p. 63) have failed to provide an Laser therefore provides optimal content dis- effective user experience. play despite high variations in screen resolu- Using rich media services is more challenging tion. In addition, it can use virtually all pixels in embedded devices than on PCs, where various as elements of the user interface, letting users interfaces are available and homogeneously design rich and user-friendly interfaces. implemented (such as a mouse or keyboard), and ergonomic concepts have been tested and vali- ❚ Laser efficiently delivers real-time content over dated. On the move, when it’s not always easy to constrained networks. More specifically, it interact and time is limited, users expect to be delivers media content in packaged pieces, let- one click away from the information they need. ting the device display a piece as it’s received In addition, end users are accustomed to quality (as opposed to download-and-play mecha- Web interfaces, so to be successful in the embed- nisms). Laser generalizes the streaming con- 60 1070-986X/05/$20.00 © 2005 IEEE (a) (b) (c) Figure 1. Laser-based ceptalready in place for audio and video Interactive mobile TV rich media services: datato scene description and rich media. As Interactive mobile TV (see Figure 1b) aggre- (a) rich media portal, such, content providers can design services to gates multiple rich media use cases, from inter- (b) interactive mobile keep some information of interest on the active mosaic, electronic program guide, and TV, and (c) interactive screen at all times. voting to personalized newscast. All of these screen saver. applications require a system that can provide ❚ Finally, Laser delivers rich media service at deterministic rendering and behavior of rich rates from 10 kilobits per second (Kbps) using media content (including audiovisual, text, vector graphic compression and dynamic graphics, and images, along with streamed TV scene updates. This drastically reduces end and radio channels) in the user interface. The sys- users’ waiting time compared to standard tem must allow fluid navigation through content Web-like approaches in which the system in a single application or service, as well as local resends the complete page even if only small or remote synchronized interaction for voting changes have been made. This functionality and personalization (for example, related menus is useful not only in low bit-rate networks or submenus, advertising, and content in the such as General Packet Radio Service, but also user profile or service subscription). in higher bit-rate networks in which rich media services can be sent at low rates, pre- Interactive screen saver serving bandwidth to improve audio and The interactive screen saver (illustrated in video quality. Figure 1c) is an instance of a larger class of appli- cations that receive content updates in the back- Three use cases demonstrate the new stan- ground (such as fixed or mobile convergent dard’s benefits. services). The screen saver uses mostly static datathat is, text, graphics, and images Rich media portal arranged with transitions similar to those in a In this application (see Figure 1a), a Laser slide show, with an element of randomness in engine enhances an existing Wireless Access the presentation. The server adds new elements Protocol (WAP) or Extensible Hypertext Markup and removes expired elements from the applica- Language (XHTML) service with rich media tion stored on the device. Developers should October–December 2005 much like Flash enhances Web sites. When a user design this application with care to avoid overuse accesses the WAP portal, a hyperlink provides of the device’s power resource. access to the site’s rich media part, giving the user a complete, deterministic, and consistent Technical aspects rich media experience. An intuitive interface Part 20 of the MPEG-4 standard consists of with a pop-up menu makes navigating the site two specifications: Laser, which specifies the simpler and the screen feel larger. Figure 1a coded representation of multimedia presenta- shows rich text with smallbut readableArabic tions for rich media services; and SAF, which fonts. At any time, a hyperlink can bring the user defines tools for fulfilling the requirements of back to the original portal. rich media service design at the interface 61 guaranteeing tight synchronization between the Application scene and the media assets composing the rich media presentation. MPEG-4 part 20 defines a Laser engine as the Scalable Vector Laser Graphics (SVG) extensions viewer for Laser presentations. Such an engine scene tree has rich media composition capabilities on top Audio Video Image Font ... of the capabilities common to classic multimedia Dynamic updates players. These composition capabilities are, as a result of the technology selection process, based Binary encoding on Scalable Vector Graphics (SVG) Tiny 1.1.1 The composition capabilities rely on the use of an Simple Aggregation Format (SAF) SVG scene tree and are enhanced with key fea- tures for mobile services, such as binary encod- Transport ing, dynamic updates, state-of-the-art font representation, and the stable features of the Network upcoming SVG Tiny 1.2 specification (described in the “Current Technologies” sidebar), includ- Figure 2. Laser engine between scene representation and transport ing audio and video support. Figure 2 illustrates architecture. mechanisms. the Laser engine architecture. Laser SVG scene tree. Laser uses an SVG scene tree In Laser, a multimedia presentation is a col- at its core. It imports composition primitives lection of a scene description and media (zero, from the World Wide Web Consortium’s (W3C) one, or more). A media is an individual content specifications (all of SVG Tiny 1.1, some of SVG item of the following type: image (still picture), 1.1, and Synchronized Multimedia Integration video (moving picture), audio, and by extension, Language, or SMIL, version 2) and uses the SVG font data. A scene description consists of text, rendering model to present the scene tree. Laser graphics, animation, interactivity, and spatial specifies hyperlinking capabilities, audio and and temporal layout. video media embedding, vector graphics repre- A Laser scene description specifies four aspects sentations, animation, and interactivity features. of a presentation: Scene tree extensions. After selecting SVG as ❚ how the scene elements (media or graphics) Laser’s core technology, MPEG identified several are organized spatially (for example, the visu- areas needing extensions to allow the develop- al elements’ spatial layout); ment of efficient services: ❚ how the scene elements are organized tempo- ❚ Because SVG Tiny doesn’t have clipping, rally (for example, if and how they’re syn- MPEG added simple axis-aligned rectangular chronized, or when they start or end); clipping to let developers create such com- mon user interface widgets as ticker tapes and ❚ how users interact with the elements in the simple transitions. scene (for example, when a user clicks on an image); and ❚ SVG lacks a restricted, nonresampling rotation for video and images and a full-screen mode, ❚ how changes occur in a scene.
Recommended publications
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • SGML As a Framework for Digital Preservation and Access. INSTITUTION Commission on Preservation and Access, Washington, DC
    DOCUMENT RESUME ED 417 748 IR 056 976 AUTHOR Coleman, James; Willis, Don TITLE SGML as a Framework for Digital Preservation and Access. INSTITUTION Commission on Preservation and Access, Washington, DC. ISBN ISBN-1-887334-54-8 PUB DATE 1997-07-00 NOTE 55p. AVAILABLE FROM Commission on Preservation and Access, A Program of the Council on Library and Information Resources, 1400 16th Street, NW, Suite 740, Washington, DC 20036-2217 ($20). PUB TYPE Reports Evaluative (142) EDRS PRICE MF01/PC03 Plus Postage. DESCRIPTORS *Access to Information; Computer Oriented Programs; *Electronic Libraries; *Information Retrieval; Library Automation; Online Catalogs; *Preservation; Standards IDENTIFIERS Digital Technology; *SGML ABSTRACT This report explores the suitability of Standard Generalized Markup Language (SGML) as a framework for building, managing, and providing access to digital libraries, with special emphasis on preservation and access issues. SGML is an international standard (ISO 8879) designed to promote text interchange. It is used to define markup languages, which can then encode the logical structure and content of any so-defined document. The connection between SGML and the traditional concerns of preservation and access may not be immediately apparent, but the use of descriptive markup tools such as SGML is crucial to the quality and long-term accessibility of digitized materials. Beginning with a general exploration of digital formats for preservation and access, the report provides a staged technical tutorial on the features and uses of SGML. The tutorial covers SGML and related standards, SGML Document Type Definitions in current use, and related projects now under development. A tiered metadata model is described that could incorporate SGML along with other standards to facilitate discovery and retrieval of digital documents.
    [Show full text]
  • Cumulus User Guide
    Cumulus 8.6 Client User Guide Copyright 2012, Canto GmbH. All rights reserved. Canto, the Canto logo, the Cumulus logo, and Cumulus are registered trade- marks of Canto, registered in the U.S. and other countries. Apple, Mac, Macintosh and QuickTime are registered trademarks of Apple Com- puter, Inc. , registered in the U.S. and other countries. Microsoft, Windows, Windows Vista, and Windows NT are either trademarks or registered trademarks of the Microsoft Corporation in the U.S. and other coun- tries. Other third-party product and company names mentioned in this document are trademarks or registered trademarks of their respective holders. Feedback? Tell us what you think about this manual. We welcome all of your comments and suggestions. Please e-mail comments to [email protected] or via fax at +49-30-390 48 555. CU-WC-861-MN-Z-1 3 Table of Contents Renaming Records . 27 Intro 7 Editing a Record’s Category Assignments . 28 Things You Can Do with Records . 28 Cumulus . 8 Things You Can Do with Assets . 29 This User Guide . 8 Categories . 29 Category Types. 30 Organization. 8 Creating Categories . 31 Cross-Platform Issues . 9 Custom Ordering of Categories. 32 User Interface Item Conventions. 9 Category Fields. 33 Cumulus Step by Step. 9 Category Information Window. 33 Your Experience . 9 Editing Category Information . 33 Categories and Auto-cataloging . 34 Understanding Cumulus . 10 Individual Category Tabs (optional) . 35 Assets . 10 Things You Can Do with Categories. 35 Catalogs . 10 Collections . 10 Information Window. 36 Categories . 10 • THE INFORMATION WINDOW....................................................................... 36 Records . 11 Sets and Templates .
    [Show full text]
  • Data Hiding and Detection in Office Open Xml (Ooxml) Documents
    DATA HIDING AND DETECTION IN OFFICE OPEN XML (OOXML) DOCUMENTS by Muhammad Ali Raffay A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science (MASc) in Electrical and Computer Engineering Faculty of Engineering and Applied Science University of Ontario Institute of Technology Oshawa, Ontario, Canada March, 2011 Copyright ©Muhammad Ali Raffay, 2011 Author’s Declaration I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. Muhammad Ali Raffay ii Abstract With the rapid development and popularity of information technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. One of the commonly used tactics, called steganography, is to hide information under a cover media so that except participants, no one else knows the existence of such information. Many techniques have been proposed for hiding data in images, videos and audios, but there is not much research devoted to data hiding in the popular MS Office documents which have recently adopted Office Open XML (OOXML) format. In this research, we first focus on identifying several data hiding techniques for OOXML documents. Then, we design and develop a fast detection algorithm based on the unique internal structure of OOXML documents, which contains multiple XML files, by using multi-XML query technique. Experimental results show the proposed detection algorithm outperforms the traditional one in terms of detection speed and completeness, where performance is the key to success of detecting hidden data in OOXML documents due to the fact that millions of documents are generated and transferred over the internet every day.
    [Show full text]
  • Documill Discovery Search - Find - Take Action
    Documill Discovery Search - Find - Take Action Documill Discovery Solution Summary 2015-08-22 All rights reserved. © 2015 Documill Slide 1 Documill Offering Visual Search Explorer Dynamo Discovery Document Discovery Document Organizer Document Publishing Discover, re-use and and Management share Ribbon Floating Embeddable Embeddable Embeddable Previewer Previewer browser UI browser UI browser UI Online Page Standalone MSOffice Standalone Viewer Composer browser UI Add-In browser UI Public and private APIs Preview Generation Dynamic Publishing Connect, crawl, index Documill Web Preview Server (DPS) Dynamo Renderer Discovery Public and private APIs Documill Core Document Processing Advanced Font Documill Engine Processing Engine All rights reserved. © 2015 Documill Slide 2 Documill Discovery Discovery is an enterprise search solution focused on cloud services. It includes: . Support for most important data sources . Data crawling . Enforcement of access controls . Processing content for indexing and previewing . Fast and scalable search index . Authentication . Localisation . Support and maintenance . Upgrades All rights reserved. © 2015 Documill Slide 3 Documill Discovery All rights reserved. © 2015 Documill Slide 4 Documill Discovery Integrated search solution for all the repositories where you store What? information, both in the cloud and behind the firewall. Any user who needs access to multiple data systems. Customer support, To whom? sales, product management … 1. Better customer service with faster information discovery Why? 2.
    [Show full text]
  • Rich Web Applications – Client Standards
    Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly Rich Web Applications – Client Standards Kevin E. Kelly [email protected] Part of the “Web 2.0” picture Kevin E. Kelly – Rich Web Applications – Client Standards Slide 1 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly Client Standards in the Real World Kevin E. Kelly – Rich Web Applications – Client Standards Slide 2 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly Agenda Introduction W3C Rich Web Activity Compound Documents WICD Issues Demo The Backplane Q&A Kevin E. Kelly – Rich Web Applications – Client Standards Slide 3 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly Introduction Work ➢ Co-op'ed at IBM ➢ US Air Force ➢ Automotive Embedded Startup ➢ Rational Software ➢ Acquired by IBM Standards ➢ Chair Compound Document Format Working Group, was also in the XForms Working Group ➢ Hypertext Coordination Working Group member ➢ HL7 Advisory Council Rep to the W3C Kevin E. Kelly – Rich Web Applications – Client Standards Slide 4 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly W3C Domains Architecture Domain ➢ DOM, XML, Internationalization, Web Services, URI Technology and Society Domain ➢ Patent Policy, Privacy, Semantic Web Ubiquitous Web Domain ➢ Device Independence, Mobile Web, Multimodal, Voice Browser Web Accessibility Initiative ➢ Web Accessibility, International Web Accessibility Interaction Domain ➢ Next Slide Kevin E. Kelly – Rich Web Applications – Client Standards Slide 5 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly W3C Interaction Domain Graphics Activity Style Activity ➢ SVG ➢ CSS ➢ WebCGM Synchronized Multimedia Activity HTML Activity ➢ SyMM (SMIL) ➢ HTML/XHTML ➢ Timed Text ➢ Hypertext Coordination Group XForms Activity Math Activity ➢ XForms ➢ Math (MathML) Rich Web Client Activity ➢ Next Slide Kevin E.
    [Show full text]
  • Download the Paper (PDF)
    WWW.VIRUSBULLETIN.COM/CONFERENCE 2019 LONDON 2 – 4 October 2019 STATIC ANALYSIS METHODS FOR DETECTION OF MICROSOFT OFFICE EXPLOITS Chintan Shah McAfee, India [email protected] ABSTRACT Despite recent advances in exploitation strategies and exploit mitigation techniques, fundamental infection vectors remain the same. It is critical to advance security solutions to inspect both new and known infection vectors in order to successfully mitigate targeted attacks. Apparently, the use of lure documents has become one of the most favoured attack strategies for infi ltrating target organizations. Recently, some of the most high impact attacks using this conventional technique have been uncovered by the security community. In this paper, we present an exploit detection tool that we built for the purpose of detecting malicious lure documents. This detection engine employs multiple binary stream analysis techniques for fl agging malicious Offi ce documents, supporting static analysis of RTF, Offi ce Open XML and Compound Binary File format (MS-CFB). The use, by attackers, of weaponized lure documents necessitates deeper inspection of these fi le formats at the perimeter. Object Linking and Embedding exposes a rich attack surface which has been abused by attackers over the past few years to hide malicious resources. For instance, OOXML fi les can be used to load OLE controls which can eventually facilitate remote code execution. Our proposed detection tool is built to extract embedded storage streams, OLE objects, etc. and apply binary stream analysis techniques over it, in addition to inspecting specifi c fi le sections and analysing embedded scripts, to identify malicious code. This detection tool had been tested over a wide set of in-the-wild exploits and variants.
    [Show full text]
  • Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia
    PROJECT REPORT Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia Matthew Hutchins Digital Preservation Tools Researcher 30 July 2012 Project Report Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia Published by Information Technology Division National Library of Australia Parkes Place, Canberra ACT 2600 Australia This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 2.1 Australia License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.1/au/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco California 94105 USA. 2│57 www.nla.gov.au 30 July 2012 Creative Commons Attribution-NonCommercial-ShareAlike 2.1 Australia Project Report Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia Summary 5 List of Recommendations 5 1 Introduction 8 2 Methods 9 2.1 Test Data Sets 9 2.1.1 Govdocs1 9 2.1.2 Selections from Prometheus Ingest 9 2.1.3 Special Selections 10 2.1.4 Selections from Pandora Web Archive 11 2.2 Focus of the Testing 11 2.3 Software Framework for Testing 12 2.4 Test Platform 13 3 File Format Identification Tools 13 3.1 File Format Identification 13 3.2 Overview of Tools Included in the Test 14 3.2.1 Selection Criteria 14 3.2.2 File Investigator Engine 14 3.2.3 Outside-In File ID 15 3.2.4 FIDO 16 3.2.5 Unix file Command/libmagic 17 3.2.6 Other
    [Show full text]
  • Metadefender Core V4.10.1
    MetaDefender Core v4.10.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Installing Metadefender Core on Ubuntu or Debian computers 15 Installing Metadefender Core on Red Hat Enterprise Linux or CentOS computers 15 Installing Metadefender Core on Windows computers 16 1.2. License Activation 16 1.3. Scan Files with Metadefender Core 17 2. Installing or Upgrading Metadefender Core 18 2.1. Recommended System Requirements 18 System Requirements For Server 18 Browser Requirements for the Metadefender Core Management Console 20 2.2. Installing Metadefender Core 20 Installation 20 Installation notes 21 2.2.1. Installing Metadefender Core using command line 21 2.2.2. Installing Metadefender Core using the Install Wizard 23 2.3. Upgrading MetaDefender Core 23 Upgrading from MetaDefender Core 3.x 23 Upgrading from MetaDefender Core 4.x 23 2.4. Metadefender Core Licensing 24 2.4.1. Activating Metadefender Core Licenses 24 2.4.2. Checking Your Metadefender Core License 30 2.5. Performance and Load Estimation 31 What to know before reading the results: Some factors that affect performance 31 How test results are calculated 32 Test Reports 32 Performance Report - Multi-Scanning On Linux 32 Performance Report - Multi-Scanning On Windows 36 2.6. Special installation options 41 Use RAMDISK for the tempdirectory 41 3.
    [Show full text]
  • An NCC Group Publication
    An NCC Group Publication Understanding Microsoft Word OLE Exploit Primitives: Exploiting CVE-2015-1642 Microsoft Office CTaskSymbol Use-After-Free Vulnerability Prepared by: Dominic Wang © Copyright 2015 NCC Group Contents 1 Abstract .......................................................................................................... 3 2 Introduction ..................................................................................................... 3 2.1 Microsoft Office Suite ................................................................................... 3 2.2 Object Linking & Embedding .......................................................................... 3 2.3 Prior Research ............................................................................................ 3 3 Background ...................................................................................................... 4 3.1 Open XML Format ........................................................................................ 4 3.2 OLE Automation .......................................................................................... 4 3.3 Template Structures .................................................................................... 4 3.4 Rich Text Format ........................................................................................ 5 4 Techniques ...................................................................................................... 6 4.1 Spraying the Heap ......................................................................................
    [Show full text]
  • White Paper on Rich Media Environment Technology Landscape Report Approved – 29 Mar 2011
    White Paper on Rich Media Environment Technology Landscape Report Approved – 29 Mar 2011 Open Mobile Alliance OMA-WP-Rich_Media_Environment-20110329-A 2011 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document. [OMA-Template-WhitePaper-20110101-I] OMA-WP-Rich_Media_Environment-20110329-A Page 2 (80) Use of this document is subject to all of the terms and conditions of the Use Agreement located at http://www.openmobilealliance.org/UseAgreement.html. Unless this document is clearly designated as an approved specification, this document is a work in process, is not an approved Open Mobile Alliance™ specification, and is subject to revision or removal without notice. You may use this document or any part of the document for internal or educational purposes only, provided you do not modify, edit or take out of context the information in this document in any manner. Information contained in this document may be used, at your sole risk, for any purposes. You may not use this document in any other manner without the prior written permission of the Open Mobile Alliance. The Open Mobile Alliance authorizes you to copy this document, provided that you retain all copyright and other proprietary notices contained in the original materials on any copies of the materials and that you comply strictly with these terms. This copyright permission does not constitute an endorsement of the products or services. The Open Mobile Alliance assumes no responsibility for errors or omissions in this document. Each Open Mobile Alliance member has agreed to use reasonable endeavors to inform the Open Mobile Alliance in a timely manner of Essential IPR as it becomes aware that the Essential IPR is related to the prepared or published specification.
    [Show full text]
  • Microsoft Word 10.0 Date: July 14, 2005 Author: Grace Carpenter
    Format Background Document: Microsoft Word 10.0 Date: July 14, 2005 Author: Grace Carpenter GDFR data Canonical identifierinfo:gdfr/fred/f/msword DescriptionMicrosoft Word 10.0 (DOC) Alias Type MIME Value application/msword Alias Type Informal identifier Value Microsoft Word XP/2002 Version10.0 Legal or recognized owner Name Microsoft Corporation Organization type Commercial (for-profit) entity Web site http://www.microsoft.com Relationship Type of relation May be encapsulated by target Target format identifier Type GDFR format identifier Value gdfr/fred/f/ole2cdf Target registry identifier Type GDFR registry identifier Value Fred Specification Document title Microsoft Word 97 Binary File Fomat Document type Article Publication date 1998 Access regime Unrestricted access Identifier Type URL: Uniform resource locator Value http://www.wotsit.org/search.asp?s=text Note This is an unofficial spec, purportedly from the MSDN Library, posted on a third- party site. However, it appears to be the only publicly available documentation on the Word format, and is also the most up-to-date. Signature Signature obligation Mandatory under certain conditions (see notes) External signature type File extension Signature value .doc Note Standard Word file extension Signature Signature obligation Mandatory under certain conditions (see notes) External signature type File extension Signature value .dot Note extension for file templates Signature Signature obligation Mandatory Signature position Fixed position (requires offset) Byte offset 0 Signature value 0xD0 0xCF 0x11 0xE0 0xA1 0xB1 0x1A 0xE1 Note This signature identifies an OLE Compound Document, which may or may not contain Word data Application Application name Microsoft Word Application version XP/2002 Application release date 2001 Vendor Name Microsoft Corporation Organization type Commercial (for-profit) entity Application's function Process type Creates objects in the format Application's function Process type Renders objects in the format Non-GDFR data 1.
    [Show full text]