MCC Users Manual
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Stickybrain™ User's Guide
STICKYBRAIN™ USER’S GUIDE CHRONOS LLC MAY 12, 2005 1 LICENSE AGREEMENT, COPYRIGHTS, & TRADEMARKS PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE CHRONOS SOFTWARE. BY USING THE CHRONOS SOFTWARE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, DO NOT INSTALL OR USE THE SOFTWARE. IF YOU DO NOT AGREE TO THE TERMS OF THE LICENSE, YOU MAY RETURN THE CHRONOS SOFTWARE TO THE PLACE WHERE YOU OBTAINED IT FOR A REFUND. IF THE CHRONOS SOFTWARE WAS ACCESSED ELECTRONICALLY, CLICK "DISAGREE/DECLINE". FOR CHRONOS SOFTWARE INCLUDED WITH YOUR PURCHASE OF HARDWARE, YOU MUST RETURN THE ENTIRE HARDWARE/SOFTWARE PACKAGE IN ORDER TO OBTAIN A REFUND. IMPORTANT NOTE: This software may be used to reproduce materials. It is licensed to you only for reproduction of non-copyrighted materials, materials in which you own the copyright, or materials you are authorized or legally permitted to reproduce. If you are uncertain about your right to copy any material, you should contact your legal advisor. 1. General. The software, documentation and any supporting documents accompanying this License whether on disk, in read only memory, on any other media or in any other form (collectively the "Chronos Software") are licensed, not sold, to you by Chronos LLC ("Chronos") for use only under the terms of this License, and Chronos reserves all rights not expressly granted to you. The rights granted herein are limited to Chronos' and its licensors' intellectual property rights in the Chronos Software and do not include any other patents or intellectual property rights. -
Openstep User Interface Guidelines
OpenStep User Interface Guidelines 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. Part No: 802-2109-10 A Sun Microsystems, Inc. Business Revision A, September 1996 1996 Sun Microsystems, Inc. 2550 Garcia Avenue, Mountain View, California 94043-1100 U.S.A. All rights reserved. Portions Copyright 1995 NeXT Computer, Inc. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX® system, licensed from UNIX System Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. Third-party font software, including font technology in this product, is protected by copyright and licensed from Sun's suppliers. This product incorporates technology licensed from Object Design, Inc. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS Sun, Sun Microsystems, the Sun logo, SunSoft, the SunSoft logo, Solaris, SunOS, and OpenWindows are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. -
CIS Apple Macos 10.12 Benchmark
CIS Apple macOS 10.12 Benchmark v1.1.0 - 09-06-2018 Terms of Use Please see the below link for our current terms of use: https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/ 1 | P a g e Table of Contents Terms of Use ........................................................................................................................................................... 1 Overview .................................................................................................................................................................. 7 Intended Audience ........................................................................................................................................... 7 Consensus Guidance ........................................................................................................................................ 7 Typographical Conventions ......................................................................................................................... 8 Scoring Information ........................................................................................................................................ 8 Profile Definitions ............................................................................................................................................ 9 Acknowledgements ...................................................................................................................................... 10 Recommendations ............................................................................................................................................ -
Tinkertool System 6 Reference Manual Ii
Documentation 0632-1969/2 TinkerTool System 6 Reference Manual ii Version 6.99, July 21, 2021. US-English edition. MBS Documentation 0632-1969/2 © Copyright 2003 – 2021 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, macOS, iCloud, and FireWire are registered trademarks of Apple Inc. Intel is a registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Broadcom is a registered trademark of Broadcom, Inc. Trademarks or service marks are used for identification purposes only. -
Xerox® Phaser 3320DN/3320DNI System Administrator Guide ©2012 Xerox Corporation
Version 1.0 February 2012 Xerox® Phaser 3320DN/3320DNI System Administrator Guide ©2012 Xerox Corporation. XEROX® and XEROX and Design® are trademarks of Xerox Corporation in the United States and/or other countries. Document version 1.0: February 2012 Table of Contents 1Introduction Who should use this Guide? . .8 Machine Overview. .9 Product Configurations . .9 Control Panel Overview . 10 2 Machine Connection Machine Parts and Connection Ports . 12 Front View . 12 Rear View . 13 Initial Connection . 13 Administrator Access . 14 Wireless Connectivity (Phaser 3320DNI) . 14 Configure Ethernet Settings . 15 Print a Configuration Report . 16 Install the Additional Memory Card (Optional) . 16 CentreWare Internet Services . 18 3 Network Installation TCP/IP. 24 Configure Static IPv4 Addressing at the Machine . 24 Configure Dynamic IPv4 Addressing at the Machine . 25 Configure TCP/IP Settings using Internet Services . 26 Unix . 29 HP-UX Client (Version 10.x) . 29 Solaris 2.x . 30 SCO . 32 Linux CUPS. 33 Linux LPR via PrintTool. 34 Linux LPRng . 35 4 Printer Drivers Overview . 38 Windows - Installing Driver. 39 Macintosh - Installing Driver . 41 Linux - Installing Drivers . 43 Installing the SmartPanel . 43 Installing the Printer Setting Utility . 43 Xerox Phaser 3320DN/3320DNI 3 System Administrator Guide Unix - Installing Drivers . 45 Setting up the printer . 45 Uninstalling the printer driver package . 46 Sharing your Machine Locally . 47 Windows . 47 Macintosh. 48 Windows Printing. 49 LPR Printing . 49 Internet Printing Protocol (IPP) Port. 52 Raw TCP/IP Printing (Port 9100) . 54 USB Printing. 55 Configure the Windows Printer Driver . 56 Manual Printer Driver Configuration . 56 Apple Mac . 58 TCP/IP Printing (OSX) . -
Mac OS X Desktop.Pdf
Apple Training Series Mac OS X Support Essentials v10.6 Kevin M. White Apple Training Series: Mac OS X Support Essentials v10.6 Kevin M. White Copyright © 2010 by Apple Inc. Published by Peachpit Press. For information on Peachpit Press books, contact: Peachpit Press 1249 Eighth Street Berkeley, CA 94710 510/524-2178 510/524-2221 (fax) www.peachpit.com To report errors, please send a note to [email protected]. Peachpit Press is a division of Pearson Education. Apple Training Series Editor: Rebecca Freed Production Editors: Danielle Foster, Becky Winter Copyeditor: Peggy Nauts Tech Editor: Gordon Davisson Apple Editor: Shane Ross Proofreader: Suzie Nasol Compositor: Danielle Foster Indexer: Valerie Perry Cover design: Mimi Heft Cover illustrator: Kent Oberheu Notice of Rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. For infor- mation on getting permission for reprints and excerpts, contact [email protected]. Notice of Liability The information in this book is distributed on an “As Is” basis without warranty. While every precaution has been taken in the preparation of the book, neither the author nor Peachpit shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the computer software and hardware products described in it. Trademarks Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. -
Installation and User's Guide
GNUstep Installation and User’s Guide Version 0.6.5 February 8, 2000 Permissions Copyright (C) 1999-2000 Free Software Foundation. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions. Apple™, OpenStep™, and the Apple logo are trademarks of Apple Computers, Inc. registered in the U.S. and other countries. PostScript™, Display PostScript™ and Adobe™ are trademarks of Adobe Systems Incorporated and may be registered in certain jurisdictions. Other company and product names mentioned herein might be trademarks of their respective companies. About the Free Software Foundation The Free Software Foundation (FSF) is dedicated to eliminating restrictions on copying, redistribution, understanding, and modification of computer programs. We do this by promoting the development and use of free software in all areas of computing---but most particularly, by helping to develop the GNU operating system. Many organizations distribute whatever free software happens to be available. In contrast, the Free Software Foundation concentrates on development of new free software---and on making that software into a coherent system that can eliminate the need to use proprietary software. Besides developing GNU, FSF distributes copies of GNU software and manuals for a distribution fee, and accepts tax-deductible gifts to support GNU development. -
Using the Gnustep Appkit a Guide to Using Various Parts of the Gnustep Appkit for Application Development
Using the GNUstep AppKit A guide to using various parts of the GNUstep AppKit for application development Christopher Armstrong c 2005-2006 Christopher Armstrong. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2, as published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". This documentation is provided on an "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND USEFULNESS OF THE DOC- UMENTATION IS WITH YOU (THE LICENSEE). IN NO EVENT WILL THE COPYRIGHT HOLDERS BE LIABLE FOR DAMAGES, INCLUDING ANY DIRECT, INDIRECT, SPE- CIAL, GENERAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENTATION (INCLUDING BUT NOT LIMITED TO LOSS OF DATA, USE, OR PROFITS; PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES; OR BUSINESS INTERUPTION) HOWEVER CAUSED, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Table of Contents 1 Introduction ........................................... 1 1.1 Overview ..................................................................... 1 1.2 Implementation Details ........................................................ 1 1.2.1 Drag and Drop .......................................................... -
Parliant Phonevalet Users Guide
PhoneValet 6.0.2 User’s Guide Copyright 2002-2009 Parliant Corporation. All Rights Reserved. All trade names referenced herein are either trademarks or registered trademarks of their respective companies. Table of Contents Address Book Dialing ............................................................................................ 23 Overview....................................................................................2 Clipboard Dialing ................................................................................................... 24 Installation ................................................................................2 AppleScript dialing................................................................................................. 24 Running PhoneValet for the First Time ................................................................... 2 Call Logging ............................................................................ 24 Multiple Line Configurations .................................................................................... 4 Caller ID ................................................................................................................ 25 Voice Mail..................................................................................4 Dialing Numbers from the Call Log........................................................................ 25 Reading the Call Log............................................................................................. 25 Configuring Voice Mail............................................................................................ -
CIS Mac OS X Leopard (10.5.X) Benchmark
Mac OS X 10.5 Leopard Level 1 & 2 Benchmark Version 1.0 May 2008 Copyright ©2008, The Center for Internet Security http://www.cisecurity.org Editor: Allan Marcus [email protected] CIS Mac OS X Leopard (10.5.x) Benchmark Table of Contents Terms of Use Agreement ........................................................................................................................... 3 1) Introduction ........................................................................................................................................ 6 1.1) Document Layout ....................................................................................................................... 6 1.2) Intended Audience ..................................................................................................................... 6 1.3) Practical Application .................................................................................................................. 7 1.4) Security Levels Explained ......................................................................................................... 7 1.5) Precursor Technical Information ............................................................................................... 7 1.6) Basic Security Principles: .......................................................................................................... 8 2) Benchmark Elements ......................................................................................................................... 9 2.1) Installation -
The Operating Manual
THE OPERATING MANUAL Vision Laboratory Volen Center for Complex Systems Brandeis University, Waltham MA Robert Sekuler, Laboratory Director mailto:[email protected] September 2, 2018 1 Contents 1 Purpose of this document.3 2 Research projects.4 3 Research collaborators4 4 Current/recent publications4 5 Communication4 6 Transparency and Reproducibility5 7 Experimental subjects.6 8 Equipment.8 9 Coding/programming. 12 10 Experimental design. 24 11 Literature sources. 24 12 Document preparation. 25 13 Scientific meetings 32 14 Essential background info 33 15 Labspeak1. 38 1This coinage, labspeak, was suggested by Orwell’s coinage “newspeak” in his novel 1984. Unlike “newspeak”, though, labspeak is mean to facilitate and sharpen thought and communication, not subvert them. 2 1 Purpose of this document. This document is meant to ease newcomers’ integration into the operation of the Vision Laboratory located in Brandeis University’s Volen Center. The document presents a lot of information, but there may be only one truly essential thing for new lab members to know: ”If you are uncertain, ask.” To repeat: ”If you are uncertain, ask.” Corollaries to this advice? “If you’re working on a document and are unsure about how it’s progressing, ask someone else to read it.” “ If you’re working on a project and realize that you can use some advice, ask for it.” It’s simple: never hesitate to take advantage of fellow lab members’ knowledge, fresh eyes and advice. When you encounter something that you don’t know, or are not sure about, and have made a good faith effort to work out on your own, it only makes good sense to ask. -
CIS Apple OSX 10.11 Benchmark
CIS Apple OSX 10.11 Benchmark v1.1.0 - 11-04-2016 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security. 1 | P a g e Table of Contents Overview .................................................................................................................................................................. 7 Intended Audience ........................................................................................................................................... 7 Consensus Guidance ........................................................................................................................................ 7 Typographical Conventions ........................................................................................................................