Virtualviewer®

Total Page:16

File Type:pdf, Size:1020Kb

Virtualviewer® VirtualViewer® V4.8 VirtualViewer® HTML5 for Java Client Administrator’s Guide An online version of this manual contains information on the latest updates to Vir- tualViewer. To find the most recent version of this manual, please visit the online ver- sion at www.virtualviewer.com or download the most recent version from our website at www.snowbound.com/support/manuals.html. Important Note: Most recent additions to VirtualViewer HTML5 are in the included 4.8 Release Notes. DOC-0168-01 1 Copyright Information While Snowbound® Software believes the information included in this publication is correct as of the publication date, information in this document is subject to change without notice. UNLESS EXPRESSLY SET FORTH IN A WRITTEN AGREEMENT SIGNED BY AN AUTHORIZED REPRESENTATIVE OF SNOWBOUND SOFTWARE CORPORATION MAKES NO WARRANTY OR REPRESENTATION OF ANY KIND WITH RESPECT TO THE INFORMATION CONTAINED HEREIN, INCLUDING WARRANTY OF MERCHANTABILITY AND FITNESS FOR A PURPOSE, NON-INFRINGEMENT, OR THOSE WHICH MAY BE IMPLIED THROUGH COURSE OF DEALING OR CUSTOM OF TRADE. WITHOUT LIMITING THE FOREGOING, CUSTOMER UNDERSTANDS THAT SNOWBOUND DOES NOT WARRANT THAT CUSTOMER’S OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE, THAT ALL DEFECTS IN THE SOFTWARE WILL BE CORRECTED, OR THAT THE RESULTS OF THE SOFTWARE WILL BE ERROR-FREE. Snow- bound Software Corporation assumes no responsibility or obligation of any kind for any errors contained herein or in connection with the furnishing, performance, or use of this document. Software described in Snowbound documents (a) is the property of Snowbound Software Corporation or the third party, (b) is furnished only under license, and (c) may be copied or used only as expressly permitted under the terms of the license. All contents of this manual are copyrighted by Snowbound Software Corporation. The information contained herein is the exclusive property of Snowbound Software Corporation and shall not be copied, transferred, photocopied, translated on paper, film, electronic media, or computer-readable form, or otherwise reproduced in any way, without the express written permission of Snowbound Soft- ware Corporation. Microsoft, MS, MS-DOS, Windows, Windows NT, and SQL Server are either trademarks or registered trademarks of Microsoft Cor- poration in the United States and/or other countries. Adobe, the Adobe logo, Acrobat, and the Acrobat logo are trademarks of Adobe Systems Incorporated. Sun, Sun Microsystems, the Sun Logo, and Java are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. iText Copyright (c) 1998-2016 iText Group NV, Authors: Bruno Lowagie, Paulo Soares, et al iText® is a registered trademark of iText Group NV. Kakadu JPEG2000©, is copyrighted by Dr. David Taubman, and is proprietary to NewSouth Innovations, Pty. Ltd, Australia. Aspose™, Aspose.Cells© (copyrighted 2003), Aspose.Words© (copyrighted 2003), and Aspose.Slides© (copyrighted 2004), are all proprietary to Aspose Software, Pty. Ltd, Australia. United States Government Restricted Rights The Software is provided with RESTRICTED RIGHTS. Use, duplication or disclosure by the United States Government is subject to restrictions as set forth under subparagraph (c)(1)(ii) of The Rights in Technical Data and Computer Software clause of DFARS 252.227 –19 or subparagraphs (c)(i) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227 – 19 as applic- able. The Manufacturer is Snowbound Software Corporation, 309 Waverley Oaks Rd., Suite 401, Waltham, MA 02452, USA. All other trademarks and registered trademarks are the property of their respective holders. Manual Title: Snowbound Software VirtualViewer® HTML5 for Java Client Administrator’s Guide Part Number: DOC-0168-02 Revision: 01 VirtualViewer® HTML5 for Java Release Number: 4.8 VirtualViewer® Release Number: 4.8 Printing Date: July 2017 Published by Snowbound Software Corporation. 309 Waverley Oaks Road Suite 401 Waltham, MA 02452 USA phone: 617-607-2000 fax: 617-607-2002 ©1996 - 2017 by Snowbound Software Corporation. All rights reserved. 2 Table of Contents Getting Started 19 System Requirements 19 Content Server 19 Servlet Container 19 Server Java Version 19 Client Browser Versions 19 Performance Testing Requirements 20 Validation Minimum Requirements 20 Performance Minimum Requirements 20 Performance Recommended Requirements 20 Determining Memory Requirements 21 Determining Memory Needed for the Number of Users and Pages Viewed in Vir- tualViewer® HTML5 22 Exceptions to Supported File Formats and Platforms 23 Licensing 23 What to Expect in an Evaluation Version of VirtualViewer® HTML5 24 What to Expect in a Production Version of VirtualViewer® HTML5 24 Installing the Production Version of VirtualViewer® HTML5 25 Installing 25 Verifying 27 Running VirtualViewer® HTML5 in a Browser 27 Verifying that the Sample Documents Work in VirtualViewer® HTML5 28 3 Verifying that Your Documents Work in VirtualViewer® HTML5 29 Using VirtualViewer® HTML5 31 The Image Controls Toolbar 31 Load Local Files with Upload Document 31 Exporting a Document 32 Exporting a Document with Annotations 32 Emailing a Document 34 Printing 34 Printing with or without Annotations 35 Zooming 35 Rubber Band Zoom 35 Magnifier 36 Page Controls 36 Fit-to-Page 36 Continuous Scrolling 36 Picture Controls 37 Crop Page Selection 38 User Preference 40 Display Document and Page Properties 43 The Annotation Toolbar 44 Creating Annotations 44 Editing a Filled Annotation 45 Editing a Line Annotation 46 Copying and Pasting an Annotation 47 4 Editing a Sticky Note Annotation 48 Using Text Edit Annotations 49 Search Annotation Text 50 Annotation Commenting 51 Annotation Indicators and Navigation 53 Saving Annotations 55 Deleting Annotations 55 Annotation Information 55 Using Image Rubber Stamp Annotations 56 The Pages and Documents Panels 57 Hiding the Pages and Documents Panel 57 Split Screen View 58 Document Notes 60 Creating Document Notes 61 Editing Document Notes 62 Printing Document Notes 62 Select Pages from the Thumbnails Panel 63 Substitute Image Thumbnails 65 Extract and Append Page Ranges 66 Bookmarks 66 Creating Bookmarks 67 Viewing Bookmarks 68 Text Searching 69 Setting the Default Colors 70 5 Pattern Based Text Searching 71 Additional Notes 73 Working with Redactions 73 Redaction Information Warning Message 73 Redaction Areas 74 Redacting by Selecting Text 75 Search and Redact 76 Save Document As, Export Document, Email Document and Prints 76 Page Manipulations with Redactions 76 Annotation Redaction Tagging 77 Tag Search Results 78 Disabling Redaction Tags for Export, Print, Email, or Saving As 80 Page Manipulations 81 Manipulating Page Order using Thumbnails 82 Page Manipulations 82 Selecting a Page 82 Loading the Page Manipulation Context Menu 82 Cutting, Copying, Deleting and Inserting Pages 83 Dragging and Dropping Pages 83 Additional Notes 84 Saving Page Manipulations 85 Copy to New Document 85 Rotate Specific Pages 87 Page Manipulations Across Multiple Browser Sessions 87 6 Customization 89 System Configuration 89 Configuring web.xml 89 Retrieval Servlet 89 Upload Servlet 90 Defining the Servlet Paths 90 Servlet Tags for web.xml 90 Customizing the User Interface 105 Configuring the Pages and Document Panel Display 106 availableDocuments 107 viewedDocuments 108 specifiedDocuments 108 Config.js Parameters 109 Descriptions of Config.js Parameters 109 Config.js Parameters 109 Hiding the Pages and Documents Panel 125 Disabling Page Manipulations 125 Disabling Copy to New Document 126 Configuring Text Rubber Stamp Annotations 126 Configuring Image Rubber Stamp Annotations 127 Configuring the Magnifier 129 Configuring Default Annotation Values 129 Configuring the Annotations Checkbox 130 Configuring Email Documents 130 7 Localization 131 Localization Files 131 Converting Terms 132 Supporting Accents/Special Characters 132 Force a Specific Language 133 Using Keyboard Shortcuts 134 Customizing VirtualViewer® HTML5 through JavaScript API Methods 136 JavaScript API Descriptions 137 Document Methods for Setting, Printing, Exporting, and Saving 146 getDocumentId() 146 getClientInstanceId() 147 setClientInstanceId(id) 147 setDocumentId(id) 148 setSendDocumentCompletedHandler(fn) 148 setDocumentIdGenerator(fn) 149 setSaveDocumentCompletedHandler(fn) 149 setExportDocumentNameGenerator(fn) 149 setDocumentId(id) 150 getDisplayName() 150 getProperty(key, value) 150 setProperty(key, value) 151 emailDocument() 151 exportDocument() 152 getPageCount() 154 8 printDocument() 154 printDocumentLocal() 155 printDocumentServer() 155 reloadDocumentModel() 156 saveDocument() 156 saveAllDocuments(sync) 158 setImageLoadCompletedHandler(Function) 158 setImageLoadRequestedHandler(Function) 159 sendDocument() 159 removeDocumentFromCache() 159 Interacting with Document Pages within the Viewer 161 splitScreen() 161 undoSplitScreen() 161 addPageToSelection() 161 closeTab(tabNumber) 162 copySelectionToNewDocument(newDocumentId) 162 copySelection() 162 collapseAllStickyNotes() 162 countPagesForDocument() 163 cutSelection(delPages, showAlert, callback) 163 cutSelectionToNewDocument(newId) 164 cropPageClient(top, left, bottom, right, page) 164 removeAllCrop() 164 removeCropOnPage(page) 164 9 despeckleImage() 164 enterGuideMode() 165 enterPanMode() 165 enterSelectTextMode() 165 getActiveTab() 165 getBrightness() 166 getContrast() 166 getGamma() 166 getPageNumber() 166 getPageProperties() 167 getPagePropertyByCaption() 167 getPagePropertyByFieldId() 167 hideImageInfo()
Recommended publications
  • How to Hack a Turned-Off Computer Or Running Unsigned
    HOW TO HACK A TURNED-OFF COMPUTER, OR RUNNING UNSIGNED CODE IN INTEL ME Contents Contents ................................................................................................................................ 2 1. Introduction ...................................................................................................................... 3 1.1. Intel Management Engine 11 overview ............................................................................. 4 1.2. Published vulnerabilities in Intel ME .................................................................................. 5 1.2.1. Ring-3 rootkits.......................................................................................................... 5 1.2.2. Zero-Touch Provisioning ........................................................................................... 5 1.2.3. Silent Bob is Silent .................................................................................................... 5 2. Potential attack vectors ...................................................................................................... 6 2.1. HECI ............................................................................................................................... 6 2.2. Network (vPro only)......................................................................................................... 6 2.3. Hardware attack on SPI interface ..................................................................................... 6 2.4. Internal file system .........................................................................................................
    [Show full text]
  • Issue #63, July 2000 Starting Our SIXTH Year in Publishing!
    Issue #63, July 2000 Starting our SIXTH year in publishing! 64a Page 1 Wed, Jul 2000 Cover by: Bill Perry [email protected] Published by My Mac Productions 110 Burr St., Battle Creek, MI 49015-2525 Production Staff Tim Robertson • [email protected] Publisher / Creator / Owner Editor-in-Chief Adam Karneboge • [email protected] Webmaster / Contributing Editor Roger Born • [email protected] Website Edior Barbara Bell • [email protected] Director, Public Relations •Jobs & Woz • Inspiration Artwork Created by: •Mike Gorman• [email protected] •Bill Perry• [email protected] •Tim Robertson• [email protected] •Adam Karneboge• [email protected] This Publication was created with: DOCMaker v4.8.4 http://www.hsv.tis.net/~greenmtn & Adobe Acrobat 4.0 http://www.adobe.com 64a Page 2 Wed, Jul 2000 Other Tools: Adobe Photoshop 5.5, 5.0.1 ColorIt! 4.0.1 BBEdit Lite ClarisWorks 5.0 Microsoft Word 98 GraphicConverter Snapz Pro 2.0 SimpleText Netscape Communicator 4.6.1 Internet Explorer 4.5 Eudora Pro 4.0.2 FileMaker Pro 4.0v3 QuickKeys 4.0 and the TitleTrack CD Player (To keep us sane!) Website hosted by Innovative Technologies Group Inc. http://www.inno-tech.com My Mac Magazine ® 1999-2000 My Mac Productions. All Rights Reserved. 64a Page 3 Wed, Jul 2000 http://www.inno-tech.com http://www.smalldog.com http://www.megamac.com 64a Page 4 Wed, Jul 2000 Advertising in My Mac = Good Business Sense! With over 500,000 website visits a month and thousands of email subscribers, You just can't go wrong! Send email to [email protected] for information.
    [Show full text]
  • Intel Management Engine Deep Dive
    Intel Management Engine Deep Dive Peter Bosch About me Peter Bosch ● CS / Astronomy student at Leiden University ● Email : [email protected] ● Twitter: @peterbjornx ● GitHub: peterbjornx ● https://pbx.sh/ About me Previous work: ● CVE-2019-11098: Intel Boot Guard bypass through TOCTOU attack on the SPI bus (Co-discovered by @qrs) Outline 1. Introduction to the Management Engine Operating System 2. The Management Engine as part of the boot process 3. Possibilities for opening up development and security research on the ME Additional materials will be uploaded to https://pbx.sh/ in the days following the talk. About the ME About ME ● Full-featured embedded system within the PCH ○ 80486-derived core ○ 1.5MB SRAM ○ 128K mask ROM ○ Hardware cryptographic engine ○ Multiple sets of fuses. ○ Bus bridges to PCH global fabric ○ Access to host DRAM ○ Access to Ethernet, WLAN ● Responsible for ○ System bringup ○ Manageability ■ KVM ○ Security / DRM ■ Boot Guard ■ fTPM ■ Secure enclave About ME ● Only runs Intel signed firmware ● Sophisticated , custom OS ○ Stored mostly in SPI flash ○ Microkernel ○ Higher level code largely from MINIX ○ Custom filesystems ○ Custom binary format ● Configurable ○ Factory programmed fuses ○ Field programmable fuses ○ SPI Flash ● Extensible ○ Native modules ○ JVM (DAL) Scope of this talk Intel ME version 11 , specifically looking at version 11.0.0.1205 Platforms: ● Sunrise Point (Core 6th, 7th generation SoC, Intel 100, 200 series chipset) ● Lewisburg ( Intel C62x chipsets ) Disclaimer ● I am in no way affiliated with Intel Corporation. ● All information presented here was obtained from public documentation or by reverse engineering firmware extracted from hardware found “in the wild”. ● Because this presentation covers a very broad and scarcely documented subject I can not guarantee accuracy of the contents.
    [Show full text]
  • Production Guide 13G.Book
    DOC1® Suite 4 Production Guide Issue 13g Copyright ©2004 Group 1 Software Europe Ltd. All rights reserved. This publication and the software described in it is supplied under license and may only be used or copied in accordance with the terms of such license. The information in this publication is provided for information only, is subject to change without notice, and should not be construed as a commitment by Group 1 Software. To the fullest extent permitted by applicable laws Group 1 Software excludes all warranties, representations and undertakings (express or implied) in relation to this publication and assumes no liability or responsibility for any errors or inaccuracies that may appear in this publication and shall not be liable for loss or damage of any kind arising from its use. Except as permitted by such license, reproduction of any part of this publication by mechanical, electronic, recording means or otherwise, including fax transmission, without the express permission of Group 1 Software is prohibited to the fullest extent permitted by applicable laws. Nothing in this notice shall limit or exclude Group 1 Software's liability in respect of fraud or for death or personal injury arising from its negligence. Statutory rights of the user, if any, are unaffected. *TALO Hyphenators and Spellers are used. Developed by TALO B.V., Bussum, Netherlands Copyright © 1998 *TALO B.V., Bussum, NL *TALO is a registered trademark ® Encryption algorithms licensed from Unisys Corp. under U.S. Patent No. 4,558,302 and foreign counterparts. Security algorithms Copyright © 1991-1992 RSA Data Security Inc. Base 14 fonts and derivations Copyright 1981–1983, 1989, 1993 Heidelberger Druckmaschinen AG.
    [Show full text]
  • The Strangeness Magnetic Moment of the Proton in the Chiral Quark Model
    The Strangeness Magnetic Moment of the Proton in the Chiral Quark Model L. Hannelius, D.O. Riska Department of Physics, University of Helsinki, 00014 Finland and L. Ya. Glozman Institute for Theoretical Physics, University of Graz, A-8019 Graz, Austria Abstract The strangeness magnetic moment of the proton is shown to be small in the chiral quark model. The dominant loop contribution is due to kaons. The K∗ loop contributions are proportional to the difference between the strange and light constituent quark masses or −2 mK∗ and therefore small. The loop fluctuations that involve radiative transitions between K∗ mesons and kaons are small, when the cut-off scale in the loops is taken to be close to the chiral symmetry restoration scale. The net loop amplitude contribution to the strangeness magnetic moment of the proton is about −0.05, which falls within the uncertainty range of arXiv:hep-ph/9908393v2 24 Aug 1999 the experimental value. 0 1. Introduction The recent finding by the SAMPLE collaboration that the strangeness magnetic moment s 2 2 of the proton is small, and possibly even positive [1] (GM (Q = 0.1 GeV )=0.23 ± 0.37) was unexpected in view of the fact that the bulk of the many theoretical predictions for this quantity are negative, and outside of the experimental uncertainty range (summaries are given e.g. in refs. [2, 3, 4]). A recent lattice calculation gives −0.36 ± 0.20 for this quantity [5], thus reaffirming the typical theoretical expectation, while remaining outside of the uncertainty range of the empirical value.
    [Show full text]
  • Document Conversion Technical Manual Version: 10.3.0
    Kofax Communication Server KCS Document Conversion Technical Manual Version: 10.3.0 Date: 2019-12-13 © 2019 Kofax. All rights reserved. Kofax is a trademark of Kofax, Inc., registered in the U.S. and/or other countries. All other trademarks are the property of their respective owners. No part of this publication may be reproduced, stored, or transmitted in any form without the prior written permission of Kofax. Table of Contents Chapter 1: Preface...................................................................................................................................... 7 Purpose...............................................................................................................................................7 Third Party Licenses................................................................................................................7 Usage..................................................................................................................................................7 Feature Comparison (Links Versus TWS)......................................................................................... 8 Conversion Tools................................................................................................................................ 8 Imgio.......................................................................................................................................10 File Formats......................................................................................................................................10
    [Show full text]
  • An Introduction to Morphos
    An Introduction to MorphOS Updated to include features to version 1.4.5 May 14, 2005 MorphOS 1.4 This presentation gives an overview of MorphOS and the features that are present in the MorphOS 1.4 shipping product. For a fully comprehensive list please see the "Full Features list" which can be found at: www.PegasosPPC.com Why MorphOS? Modern Operating Systems are powerful, flexible and stable tools. For the most part, if you know how to look after them, they do their job reasonably well. But, they are just tools to do a job. They've lost their spark, they're boring. A long time ago computers were fun, it is this background that MorphOS came from and this is what MorphOS is for, making computers fun again. What is MorphOS? MorphOS is a fully featured desktop Operating System for PowerPC CPUs. It is small, highly responsive and has very low hardware requirements. The overall structure of MorphOS is based on a new modern kernel called Quark and a structure divided into a series of "boxes". This system allows different OS APIs to be used along side one another but isolates them so one cannot compromise the other. To make sure there is plenty of software to begin with the majority of development to date has been based on the A- BOX. In the future the more advanced Q-Box shall be added. Compatibility The A-Box is an entire PowerPC native OS layer which includes source and binary compatibility with software for the Commodore A500 / A1200 etc.
    [Show full text]
  • Basics of Qcd Perturbation Theory
    BASICS OF QCD PERTURBATION THEORY Davison E. Soper* Institute of Theoretical Science University of Oregon, Eugene, OR 97403 ABSTRACT (•• i This is an introduction to the use of QCD perturbation theory, em- I phasizing generic features of the theory that enable one to separate short-time and long-time effects. I also cover some important classes of applications: electron-positron annihilation to hadrons, deeply in- elastic scattering, and hard processes in hadron-hadron collisions. •Supported by DOE Contract DE-FG03-96ER40969. © 1996 by Davison E. Soper. -15- 1 Introduction 2 Electron-Positron Annihilation and Jets A prediction for experiment based on perturbative QCD combines a particular In this section, I explore the structure of the final state in QCD. I begin with the calculation of Feynman diagrams with the use of general features of the theory. kinematics of e+e~ —> 3 partons, then examine the behavior of the cross section The particular calculation is easy at leading order, not so easy at next-to-leading for e+e~ —i- 3 partons when two of the parton momenta become collinear or one order, and extremely difficult beyond the next-to-leading order. This calculation parton momentum becomes soft. In order to illustrate better what is going on, of Feynman diagrams would be a purely academic exercise if we did not use certain I introduce a theoretical tool, null-plane coordinates. Using this tool, I sketch general features of the theory that allow the Feynman diagrams to be related to a space-time picture of the singularities that we find in momentum space.
    [Show full text]
  • Introduction to Storage and Software Systems for Data Analysis
    INTRODUCTION TO STORAGE AND SOFTWARE SYSTEMS FOR DATA ANALYSIS Bob Jacobsen University of California, Berkeley, USA Abstract The Storage and Software Systems for Data Analysis track discusses how HEP physics data is taken, processed and analyzed, with emphasis on the problems that data size and CPU needs pose for people trying to do experimental physics. The role of software engineering is discussed in the context of building large, robust systems that must at the same time be accessible to physicists. We include some examples of existing systems for physics analysis, and raise some issues to consider when evaluating them. This lecture is the introduction to those topics. 1. INTRODUCTION Many modern high-energy physics (HEP) experiments are done by collaborations of hundreds of people. Together, these groups construct and operate complex detectors, recording billions of events and terabytes of data, all toward the goal of “doing physics”. In this note, we provide an introduction to how we currently do this, and raise a number of issues to be considered when thinking about the new systems that are now being built. 2. SCALE OF THE EXPERIMENTS BaBar, CDF and D0 are examples of the large experiments now taking or about to take data in a collider environment. The collaborations that have built these experiments contain 300 to 600 members with varying levels of activity. Almost everybody is considered “familiar” with using computing to do their work, but only a small fraction of the collaboration can be considered as computing professionals. Some of these can even be considered world-class experts in large scale computing.
    [Show full text]
  • RICOH Infoprint XT for Windows
    RICOH InfoPrint XT for Windows Installing and Using Introducing InfoPrint XT 1 Installing and configuring InfoPrint XT 2 Version 3.4.0.0 InfoPrint Manager configuration tasks 3 RICOH ProcessDirector configuration tasks 4 Customizing InfoPrint XT 5 Copying and loading Xerox resources 6 Submitting Xerox jobs for data stream conversion 7 Transferring jobs with Download for z/OS 8 Troubleshooting InfoPrint XT 9 Conversion parameters for Xerox jobs 10 Messages 11 Return codes 12 InfoPrint XT Custom Color Collections 13 For information not in this manual, refer to the Help System in your product. Read this manual carefully and keep it handy for future reference. Note: Before using this information and the product it supports, read the information in the Notices section. Seventh Edition (June 2021) This edition applies to InfoPrint XT for Windows, Version 3.4.0.0, Program Number 5765-XTA, and to all subsequent releases and modifications until otherwise indicated in new editions. This edition replaces G550-1340-05. Internet Visit our home page: http://rpp.ricoh-usa.com/ You can send comments by e-mail to [email protected] or by mail to: Ricoh Company, Ltd. 6300 Diagonal Hwy 004 Boulder, CO 80301-9270 U.S.A. This product is or contains commercial computer software and commercial computer software documentation developed exclusively at private expense. As specified in Federal Acquisition Regulation 12.212 in the case of civilian agencies and Defense Federal Acquisition Regulation Supplement 227.7202 in the case of military agencies, use, duplication and disclosure by agencies of the U.S. Government shall solely be in accordance with the accompanying Software License Agreement in case of software products and in accordance with the licensing terms specified in the product's documentation in the case of hardware products.
    [Show full text]
  • Quarkxpress 8.0 Readme Ii
    QuarkXPress 8.0 ReadMe ii Contents QuarkXPress 8.0 ReadMe....................................................................................................3 System requirements.............................................................................................................4 Mac OS.....................................................................................................................................................4 Windows...................................................................................................................................................4 Installing: Mac OS................................................................................................................5 Performing a silent installation.................................................................................................................5 Preparing for silent installation....................................................................................................5 Installing.......................................................................................................................................5 Performing a drag installation..................................................................................................................5 Adding files after installation...................................................................................................................6 Installing: Windows..............................................................................................................7
    [Show full text]
  • Lepton Probes in Nuclear Physics
    L C f' - l ■) aboratoire ATIONAI FR9601644 ATURNE 91191 Gif-sur-Yvette Cedex France LEPTON PROBES IN NUCLEAR PHYSICS J. ARVIEUX Laboratoire National Saturne IN2P3-CNRS A DSM-CEA, CESaclay F-9I191 Gif-sur-Yvette Cedex, France EPS Conference : Large Facilities in Physics, Lausanne (Switzerland) Sept. 12-14, 1994 ££)\-LNS/Ph/94-18 Centre National de la Recherche Scientifique CBD Commissariat a I’Energie Atomique VOL LEPTON PROBES IN NUCLEAR PHYSICS J. ARVTEUX Laboratoire National Saturne IN2P3-CNRS &. DSM-CEA, CESaclay F-91191 Gif-sur-Yvette Cedex, France ABSTRACT 1. Introduction This review concerns the facilities which use the lepton probe to learn about nuclear physics. Since this Conference is attended by a large audience coming from diverse horizons, a few definitions may help to explain what I am going to talk about. 1.1. Leptons versus hadrons The particle physics world is divided in leptons and hadrons. Leptons are truly fundamental particles which are point-like (their dimension cannot be measured) and which interact with matter through two well-known forces : the electromagnetic interaction and the weak interaction which have been regrouped in the 70's in the single electroweak interaction following the theoretical insight of S. Weinberg (Nobel prize in 1979) and the experimental discoveries of the Z° and W±- bosons at CERN by C. Rubbia and Collaborators (Nobel prize in 1984). The leptons comprise 3 families : electrons (e), muons (jt) and tau (r) and their corresponding neutrinos : ve, and vr . Nuclear physics can make use of electrons and muons but since muons are produced at large energy accelerators, they more or less belong to the particle world although they can also be used to study solid state physics.
    [Show full text]