Xar File Format Specification

Total Page:16

File Type:pdf, Size:1020Kb

Xar File Format Specification Xar Format Specification An open standard file format for vector graphics on the Web. Abstract The Xar file format, previously known as the Flare file format, is an ultra-compact, open, vector graphic format. It is also the native graphics format for Xara X application (and also its predecessors such as CorelXARA). This document describes the format in detail and provides information for third parties interested in converting to or from this graphics format. Why another vector graphics format? The Xar file format is not new. It dates back nearly ten years and so it predates more recent formats such as SVG. It is not designed to compete with SVG, but Xar files are considerably simpler to understand (the SVG spec is 700 pages) and more compact (often one tenth the size). However the primary reason for the existence of the open file format specification is to enable third parties to read and write the Xara X native files. Background The Xar vector graphic structure is that of modern vector programs, based on the Adobe Postscript rendering model, but with additional features. The graphic primitives are broadly similar to those available in Postscript, PDF and SVG. However Xara X, and thus the .xar file format, support more advanced graphic primitives and effects, for example a greater range of graduated fill types, graduated transparency, feathered vector shapes (soft edges), soft shadows and more. These enable the talented artist to create highly realistic and more ‘painterly’ effects with Xara X than is possible with traditional vector graphics solutions. See http://www.xara.com/gallery/ The format is designed so that rendering can be started before the entire file is available. The format is extendible, with a degree of forwards and backwards compatibility (this means older version of the software can still read files produced by newer version of the authoring software – they simply ignore the objects or parts they do not understand). Part of the reason for this compactness is that Xar files are binary, rather than plain text as is SVG (which is XML). But with the recent movement towards a binary XML format, in - 1 - order to overcome the verbose nature of XML (and SVG), it seems things might come full circle. On the other hand Xara X offers a plain text variant of the .xar file (file extension .wix) which can help in understanding the structure of .xar files. Status of this Document This format was previously known as the Flare format but is now called Xar format. This document has been updated to describe the format as implemented by versions of XaraX up to and including Xara Xtreme 3.0. Change log This log lists all updates made to this specification from 1 November 2004. Date Change Description 2nd November 2004 Added Change Log page (Gerry Iles) Updated definition of MATRIX structure and transformation functions in description of Transformed Path records 4th November 2004 Removed broken links from TAG_VARIABLEWIDTHFUNC, (Gerry Iles) TAG_STROKEDEFINITION and TAG_STROKEAIRBRUSH in Appendix A and labelled them as not currently used. 3rd December 2004 Clarified description of path verb values. (Gerry Iles) Added download link for XarLib library. 11th January 2005 Moved download link for XarLib library. (Gerry Iles) Added download link for XPFilter archive. Updated the guidelines for implementors. 13th January 2005 New XaraX import/export filters page. (Gerry Iles) Moved link to XPFilter archive. 25th February 2005 Added detailed description of transparency types. (Gerry Iles) 30th June 2005 Corrected values for line cap and line join attributes. (Gerry Iles) Corrected order of coordinates in all bitmap and fractal fill and transparency attributes. Added note about inversion of alpha in 32 bpp RGBA PNGs. - 2 - 4th July 2005 Replaced diagrams of fill attributes. (Gerry Iles) Added bevel type descriptions and examples. Added more detail to XPE bitmap definition records. Added copyright and usage requirements to XarLib sections and XaraX filter sections. 1st Nov 2005 Details of Xara Xtreme group transparency. (Phil Martin) 4th Nov 2005 Edited general descriptions and background material to be more (Charles Moir) up-to-date. Expanded description of embedded bitmap records and XPE Expanded description of Import / Export filters / converters 10th Nov 2005 Added details of object bounds record. (Gerry Iles) Added descriptions of bitmap effects 23rd Nov 2005 Expanded details of effect attributes, live effects, locked effects, (Phil Martin) feather effects and group transparency. Updated Contents table. 1st December 2005 Fixed TAG_PATH_FLAGS and TAG_PATH_RELATIVE descriptions to not include a count of the items in the record. 4th January 2006 Improved description of colour component values. Improved description of path record variants. 13th June 2006 Removed Plugin Filter specific information. (Gerry Iles) 24th July 2006 Added details of documents containing multiple spreads TAG_CURRENTATTRIBUTES_PHASE2, TAG_SPREAD_PHASE2 and TAG_PRINTERSETTINGS_PHASE2. Added notes about attribute optimisation in Xara programs. Added details of TAG_SPREAD_FLASHPROPS 2nd August 2006 Modified note concerning use of path record variants. 2nd August 2006 Added details of TAG_DOCUMENTINFORMATION record. 8th August 2006 Changed names of bitmap object records from TAG_(CONTONE)BITMAP_OBJECT to TAG_NODE_(CONTONED)BITMAP to match source code. - 3 - 10th August 2006 Corrected bitmap definition records to use Unicode string for bitmap name. 4th September 2006 Corrected values for winding rule attribute. 19th October 2006 Corrected descriptions of simple ellipse and rectangle records. 9th January 2007 Added details of new records: TAG_DEFINEBITMAP_PNG_REAL TAG_CLIPVIEW_PATH TAG_TEXT_STRING_POS TAG_TEXT_LINESPACE_LEADING TAG_TEXT_TAB TAG_TEXT_LEFT_INDENT TAG_TEXT_FIRST_INDENT TAG_TEXT_RIGHT_INDENT TAG_TEXT_RULER TAG_TEXT_STORY_HEIGHT_INFO TAG_TEXT_STORY_LINK_INFO TAG_TEXT_STORY_TRANSLATION_INFO Added details of new flags in TAG_SPREADINFORMATION. 19th July 2007 Various spelling and grammatical errors corrected. 14th September 2007 Added details of new records: TAG_TEXT_SPECIAL_HYPHEN TAG_TEXT_SOFT_RETURN TAG_TEXT_SPACE_BEFORE TAG_TEXT_SPACE_AFTER TAG_TEXT_EXTRA_TT_FONT_DEF TAG_TEXT_EXTRA_ATM_FONT_DEF TAG_TEXT_EXTRA_FONT_INFO Added details to various other record descriptions, in particular TAG_TEXT_RULER and TAG_FONT_DEF_XXX. Copyright Copyright 1997-2007 Xara Group Ltd. Permission is granted to reproduce this specification in complete and unaltered form. Excerpts may be printed with the following notice: "excerpted from the Xar format - 4 - specification." No notice is required in software that follows this specification; notice is only required when reproducing or excerpting from the specification itself. - 5 - Contents Abstract...............................................................................................................................1 Background.........................................................................................................................1 Status of this Document......................................................................................................2 Change log..........................................................................................................................2 Copyright............................................................................................................................4 Contents..................................................................................................................................6 Introduction ..........................................................................................................................14 Why a new format? ..........................................................................................................14 Bitmaps are dumb.........................................................................................................14 Are current Vector formats the answer?.......................................................................15 Xar format - one step beyond .......................................................................................16 What the Xar format can't do (yet)...............................................................................16 Design goals .....................................................................................................................16 Design background...........................................................................................................17 Xar format overview.............................................................................................................18 Feature List...................................................................................................................18 Feature notes.................................................................................................................19 Current Implementations..............................................................................................19 Technical overview...........................................................................................................20 Records .........................................................................................................................20 Record families.............................................................................................................20 Streams and Compression ............................................................................................21
Recommended publications
  • My Sons Postponed to March 18-19 Artist Series Please: Return Those Books!
    » LWA Darlings Don Colonial Garb for Minuet Ans^nsçhuetz, Bekkdal, Jensen and Ladw ig Lib*.Ire Honored at Traditional Banquet A dainty Mozart minuet intro-1 duced Lawrence college’s four Best tian. president of the Spanish Loved senior women at the annual club. « colonial banquet last Monday eve­ Tekla Bekkedal as vice-president ning in the dining hall of the First of the Student Christian association, Congregational church. Chosen for the Best Loved honor this year and is active in the International were Mary Anschuetz, Tekla Bek- Relations club, the German club kedal, Mary Ellen Jensen and Joan tind on The Lawrentian staff. She Ladwig. Complete with powdered wras chosen for membership in hair, they were dressed in tradi­ Sigrna, underclass scholastic group, tional colonial costumes of George and is now a counselor to freshman and Martha Washington and James women. and Dolly Madison. Miss Jensen is yico-president and The best loved tradition, which Pled*e mistress of Alpha Chi Ome- has been observed for more than 20 *?a- ^lcr social sorority, and also is years, is sponsored by the Lawrencei^fHiated w'ith Sigma Alpha Iota, Women’s association, under the so- professional music sorority. A music Cial chairmanship this year of Viv- major, she sings in the college con- ia n Grady and Betty Wheeler. V iv - cert choir and plays in several in- ia n was toastmistress for the ban- strumental groups. Last fall she was quet and Mrs. Kenneth Davis, Ap-¡chosen attendant to the homecom- pleton. a Best Loved in 1947, gave ¡ ‘ " 8 queen and she has also served a toast to the new electees and pre- as a counselor to freshman women, tented them with small bracelets on! Best Loved banquets are not behalf of last year’s group.
    [Show full text]
  • The Ark Handbook
    The Ark Handbook Matt Johnston Henrique Pinto Ragnar Thomsen The Ark Handbook 2 Contents 1 Introduction 5 2 Using Ark 6 2.1 Opening Archives . .6 2.1.1 Archive Operations . .6 2.1.2 Archive Comments . .6 2.2 Working with Files . .7 2.2.1 Editing Files . .7 2.3 Extracting Files . .7 2.3.1 The Extract dialog . .8 2.4 Creating Archives and Adding Files . .8 2.4.1 Compression . .9 2.4.2 Password Protection . .9 2.4.3 Multi-volume Archive . 10 3 Using Ark in the Filemanager 11 4 Advanced Batch Mode 12 5 Credits and License 13 Abstract Ark is an archive manager by KDE. The Ark Handbook Chapter 1 Introduction Ark is a program for viewing, extracting, creating and modifying archives. Ark can handle vari- ous archive formats such as tar, gzip, bzip2, zip, rar, 7zip, xz, rpm, cab, deb, xar and AppImage (support for certain archive formats depends on the appropriate command-line programs being installed). In order to successfully use Ark, you need KDE Frameworks 5. The library libarchive version 3.1 or above is needed to handle most archive types, including tar, compressed tar, rpm, deb and cab archives. To handle other file formats, you need the appropriate command line programs, such as zipinfo, zip, unzip, rar, unrar, 7z, lsar, unar and lrzip. 5 The Ark Handbook Chapter 2 Using Ark 2.1 Opening Archives To open an archive in Ark, choose Open... (Ctrl+O) from the Archive menu. You can also open archive files by dragging and dropping from Dolphin.
    [Show full text]
  • How Do You Download Driver Fron 7 Zip Download Arduino and Install Arduino Driver
    how do you download driver fron 7 zip Download Arduino and install Arduino driver. You can direct download the latest version from this page: http://arduino.cc/en/Main/Software, When the download finishes, unzip the downloaded file. Make sure to preserve the folder structure. Double-click the folder to open it. There should be a few files and sub-folders inside. Connect Seeeduino to PC. Connect the Seeeduino board to your computer using the USB cable. The green power LED (labeled PWR) should go on. Install the driver. Installing drivers for the Seeeduino with window7. Plug in your board and wait for Windows to begin its driver installation process. After a few moments, the process will fail. Open the Device Manager by right clicking “My computer” and selecting control panel. Look under Ports (COM & LPT). You should see an open port named "USB Serial Port" Right click on the "USB Serial Port" and choose the "Update Driver Software" option. Next, choose the "Browse my computer for Driver software" option. Finally, select the driver file named "FTDI USB Drivers", located in the "Drivers" folder of the Arduino Software download. Note: the FTDI USB Drivers are from Arduino. But when you install drivers for other Controllers, such as Xadow Main Board, Seeeduino Clio, Seeeduino Lite, you need to download corresponding driver file and save it. And select the driver file you have downloaded. The below dialog boxes automatically appears if you have installed driver successfully. You can check that the drivers have been installed by opening the Windows Device Manager. Look for a "USB Serial Port" in the Ports section.
    [Show full text]
  • Breaking Antivirus Software Joxean Koret, COSEINC 44CON, 2014
    Breaking Antivirus Software Joxean Koret, COSEINC 44CON, 2014 Breaking antivirus software Introduction Attacking antivirus engines Finding vulnerabilities Exploiting antivirus engines Antivirus vulnerabilities Conclusions Recommendations Antivirus Engines Common features of AV engines: Written in C/C++. Signatures based engine + heuristics. On-access scanners. Command line/GUI on-demand scanners. Support for compressed file archives. Support for packers. Support for miscellaneous file formats. Advanced common features: Packet filters and firewalls. Drivers to protect the product, anti-rootkits, etc... Anti-exploiting toolkits. Antivirus products or engines An antivirus engine is just the core, the kernel, of an antivirus product. Some antivirus engines are used by multiple products. For example, BitDefender is the most widely used antivirus kernel. It's used by so many products like QiHoo360, G-Data, eScan, F-Secure, etc... Most “big” antivirus companies have their own engine but not all. And some companies, like F-Secure, integrate 3rd party engines in their products. In general, during this talk I will refer to AV engines, to the kernels, except when specified the word “product”. Attack surface Fact: installing an application in your computer makes you a bit more vulnerable. You just increased your attack surface. If the application is local: your local attack surface increased. If the application is remote: your remote attack surface increased. If your application runs with the highest privileges, installs kernel drivers, a packet filter and tries to handle anything your computer may do... Your attack surface dramatically increased. Myths and reality Antivirus propaganda: “We make your computer safer with no performance penalty!” “We protect against unknown zero day attacks!”.
    [Show full text]
  • Win Big with [Insert Open Source App Here] Win Big with Open Source
    Win Big with [Insert Open Source App Here] Win Big With Open Source Introductions Dave Nevala – Lukins & Annis Jerry Askew – Askew Network Solutions Win Big With Open Source No Licensing Headaches High Quality – peer reviewed Paid Support Available If you want a feature, add it! OSS can’t be discontinued or sold Win Big With Open Source KeePass – Password Manager Zotero – Web Research Manager 7-Zip – Fast Archiver Truecrypt – Disk Encryption PDF Creator Ntop – Network Analyzer Prey – Loss Prevention Win Big With KeePass What is KeePass? Password Management Database Strong Password Generator Hot-key login Obfuscation techniques Multi-platform Download for free http://keepass.info/ Win Big With KeePass Password Database Strong Encryption Can be opened with single password Win Big With KeePass Why KeePass? No need for PostIt notes, slips of paper, etc. Easy to have unique strong passwords Turn off auto form fill Win Big With KeePass Ports KeePassPPC & KeePassSD – PassDrop - iPhone/iPad PocketPC KeePassDroid – Android 7Pass - Windows Phone KeePassMobile - J2ME MiniKeePass - iPhone/iPad KeePassJ2ME - J2ME SyncPass - iPhone/iPad KeePassBB – BlackBerry iKeePass - iPhone/iPad KeePassBB2 – BlackBerry MyKeePass - iPhone/iPad Export to Keyring - Palm OS KyPass - iPhone/iPad KeePassX - Linux / Mac OS X Win Big With KeePass Share with multiple devices Portable version (run from folder) Keep database on flash drive or dropbox Win Big With KeePass Alternatives Last pass (requires to be online) KeePassX (requires to be online) 1Password (Mac and Linux)
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • Xara Web Designer 10 9
    www.xara.com 2 Contents Contents First Page 1 Purchasing and unlocking Xara Web Designer 10 9 What is new in Xara Web Designer 10? 9 Web Authoring & Publishing 10 Tools 13 Content 14 Other Minor Enhancements 15 Web Designer vs Web Designer Premium 16 Introduction 20 What makes Web Designer 10 so special? 20 A Website in a Few Steps 21 Getting Help 22 Document info 22 Support 22 Tooltips 25 About Xara Web Designer 10 25 Getting Started 26 Program Layout 26 Objects On The Page 29 Object Based Web Design 29 The Selector Tool 30 Website Toolbar 32 Creating a website 32 Previewing Your Website 33 Using Templates, Clipart & Widgets 34 Website Colors 36 Website Backgrounds 41 The Designs Gallery 42 The Online Content Catalog 43 Photos 45 Text 49 Page Size 53 Saving Your Work. Creating A Website 54 Stretchy Objects 55 Links, Buttons & Navigation Bars 55 Groups 58 Contents 3 Drawing Tools 60 Right-click menus 66 Layers, Mouseover (Rollover) & Pop-ups 66 Creating Buttons, Banners And Other Web Graphics 71 Publishing Your Website 72 Document handling 74 Starting a new document 74 Opening an existing document 74 The Xara Web Designer 10 window 75 Opening a second window 78 Changing the zoom value 79 Sliding the document within the window 81 Changing the page size 81 Multiple pages in the document 82 Saving the document 85 Support folders 85 Closing the document 86 Automatic Backups 87 On-screen grid 89 Rulers 90 View quality 91 The constrain key 91 Galleries 93 Undo and Redo 101 Object Handling 102 The Selector Tool 102 Moving objects 105 Removing
    [Show full text]
  • Breaking Antivirus Software Joxean Koret, COSEINC SYSCAN 360, 2014
    Breaking Antivirus Software Joxean Koret, COSEINC SYSCAN 360, 2014 Breaking antivirus software n Introduction n Attacking antivirus engines n Finding vulnerabilities n Exploiting antivirus engines n Antivirus vulnerabilities n Conclusions n Recommendations Antivirus Engines n Common features of AV engines: n Written in C/C++. n Signatures based engine + heuristics. n On-access scanners. n Command line/GUI on-demand scanners. n Support for compressed file archives. n Support for packers. n Support for miscellaneous file formats. n Advanced common features: n Packet filters and firewalls. n Drivers to protect the product, anti-rootkits, etc... n Anti-exploiting toolkits. Antivirus products or engines n An antivirus engine is just the core, the kernel, of an antivirus product. n Some antivirus engines are used by multiple products. n For example, BitDefender is the most widely used antivirus kernel. n It's used by so many products like G-Data, eScan, F- Secure, etc... n Most “big” antivirus companies have their own engine but not all. And some companies, like F-Secure, integrate 3rd party engines in their products. n In general, during this talk I will refer to AV engines, to the kernels, except when specified the word “product”. Attack surface n Fact: installing an application in your computer makes you a bit more vulnerable. n You just increased your attack surface. n If the application is local: your local attack surface increased. n If the application is remote: your remote attack surface increased. n If your application runs with the highest privileges, installs kernel drivers, a packet filter and tries to handle anything your computer may do..
    [Show full text]
  • PSUMAC208-Intro to Packaging—Rusty Myers
    PSUMAC208: PACKAGING RUSTY MYERS • Penn State University, Systems Administrator;Classroom and Lab Computing OVERVIEW • What Are Packages • Why Use Packages • How to Use Packages • Demo Time QUICK AUDIENCE SURVEY • Created a Package? • Iceberg? PACKAGE INSTALLERS WHAT PACKAGES DO • User Installer.app /System/Library/ CoreServices/ • Installs Files & Applications • Run Scripts PACKAGE SETTINGS • Product Information Title, Description, Welcome, Read Me, License... • Package Properties: Package Identifier, Version... • Installation Properties System, Volume, & Authentication Requirements... • Install Operations Pre & Post flight, install, upgrade From: http://developer.apple.com/mac/library/documentation/DeveloperTools/Conceptual/SoftwareDistribution/Managed_Installs/Managed_Installs.html#//apple_ref/doc/uid/10000145i-CH6-SW9 Product information: Title Description Welcome file Read Me file License file Conclusion file Package properties: Package identifier Package version number Resource fork processing Installation properties: System requirements Volume requirements Authentication requirement Allowance for choosing an installation volume other than the boot volume Installation destination on the installation volume Relocation consent (the ability user may have to change the installation destination) Revert consent Directory-permissions overwrite Postinstallation process action Install operations: Preflight Preinstall/Preupgrade Postinstall/Postupgrade Postflight PACKAGE INSTALLERS WHAT ARE PACKAGES • File Directory or Flat File • Appears as single
    [Show full text]
  • R-Photo User's Manual
    User's Manual © R-Tools Technology Inc 2020. All rights reserved. www.r-tt.com © R-tools Technology Inc 2020. All rights reserved. No part of this User's Manual may be copied, altered, or transferred to, any other media without written, explicit consent from R-tools Technology Inc.. All brand or product names appearing herein are trademarks or registered trademarks of their respective holders. R-tools Technology Inc. has developed this User's Manual to the best of its knowledge, but does not guarantee that the program will fulfill all the desires of the user. No warranty is made in regard to specifications or features. R-tools Technology Inc. retains the right to make alterations to the content of this Manual without the obligation to inform third parties. Contents I Table of Contents I Start 1 II Quick Start Guide in 3 Steps 1 1 Step 1. Di.s..k.. .S..e..l.e..c..t.i.o..n.. .............................................................................................................. 1 2 Step 2. Fi.l.e..s.. .M..a..r..k.i.n..g.. ................................................................................................................ 4 3 Step 3. Re..c..o..v..e..r.y.. ...................................................................................................................... 6 III Features 9 1 File Sorti.n..g.. .............................................................................................................................. 9 2 File Sea.r.c..h.. ............................................................................................................................
    [Show full text]
  • Forcepoint DLP Supported File Formats and Size Limits
    Forcepoint DLP Supported File Formats and Size Limits Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 This article provides a list of the file formats that can be analyzed by Forcepoint DLP, file formats from which content and meta data can be extracted, and the file size limits for network, endpoint, and discovery functions. See: ● Supported File Formats ● File Size Limits © 2021 Forcepoint LLC Supported File Formats Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 The following tables lists the file formats supported by Forcepoint DLP. File formats are in alphabetical order by format group. ● Archive For mats, page 3 ● Backup Formats, page 7 ● Business Intelligence (BI) and Analysis Formats, page 8 ● Computer-Aided Design Formats, page 9 ● Cryptography Formats, page 12 ● Database Formats, page 14 ● Desktop publishing formats, page 16 ● eBook/Audio book formats, page 17 ● Executable formats, page 18 ● Font formats, page 20 ● Graphics formats - general, page 21 ● Graphics formats - vector graphics, page 26 ● Library formats, page 29 ● Log formats, page 30 ● Mail formats, page 31 ● Multimedia formats, page 32 ● Object formats, page 37 ● Presentation formats, page 38 ● Project management formats, page 40 ● Spreadsheet formats, page 41 ● Text and markup formats, page 43 ● Word processing formats, page 45 ● Miscellaneous formats, page 53 Supported file formats are added and updated frequently. Key to support tables Symbol Description Y The format is supported N The format is not supported P Partial metadata
    [Show full text]
  • CORE 5.21 Supported Data Formats Rev.: 2020-Feb-04
    CORE 5.21 Supported Data Formats Revised: 2020-Feb-04 Contents 1 Supported Data Formats 3 1.1 Different Supported Formats in Updated Projects 3 1.2 Data Display 4 1.3 Archive Formats 4 1.4 Bloomberg Formats 6 1.5 Database Formats 7 1.6 Email Formats 8 1.7 Multimedia Formats 10 1.8 Presentation Formats 11 1.9 Raster Image Formats 13 1.10 Spreadsheet Formats 15 1.11 Text And Markup Formats 19 1.12 Vector Image Formats 20 1.13 Word Processing Formats 24 1.14 Other Formats 29 2 Terms of Use 31 CORE 5.21 - Supported Data Formats 2 1 Supported Data Formats 1 Supported Data Formats The CORE system supports indexing and retrieval, including conceptual search, for all data formats listed in this section. Note: Support of certain formats depends on the use case and must be assessed and set up by Customer Support. Additional formats to the ones listed here might be supported, but need testing for the specific use case and additional configuration. Note: The MIME types are assigned for mapping purposes within CORE only. They are usually, but not necessarily compatible with the official registry of media types maintained by IANA. 1.1 Different Supported Formats in Updated Pro- jects Projects created with versions prior to CORE 5.16/Axcelerate 5.10/Decisiv 8.0 use Oracle Outside In 8.5.1, which does not cover some recent data formats. To ensure con- sistent hash value computation, required, for example, for duplicate detection, this Oracle Outside In version is preserved for existing and new data sources.
    [Show full text]