Typograf Manual

Total Page:16

File Type:pdf, Size:1020Kb

Typograf Manual Typograf User Guide Typograf Fontmanager © Neuber Software © A. & M. Neuber Software GmbH 2 Typograf Table of Contents Part I Features of Typograf 7 Part II Working with Typograf 9 Wor.k..i.n.g.. .w..i.t..h. .F..o..n..t.s. ............................................................................................................ 9 ..V..i.e..w..i.n..g. .F..o..n..t.s. ............................................................................................................. 9 ....S..o.r..t.i.n..g. .F..o..n..t.s. ............................................................................................................ 10 ....V..i.e.w...i.n.g.. .f.o..n..t. .p..r.o..p..e.r..t.i.e..s. ............................................................................................. 10 ....V..i.e.w...i.n.g.. .m...e..t.r.i.c.. .d.a..t.a.. .a..n..d. .t..y.p..e.. .c.l.a..s.s..i.f.i.c.a..t.i.o..n.. ................................................................ 10 ....V..i.e.w...i.n.g.. .k..e..r.n..i.n.g.. .p..a..i.r.s. ................................................................................................ 11 ....V..i.e.w...i.n.g.. .a.. .c.h..a..r.a..c.t..e.r.. .s.e..t. ............................................................................................. 11 ....V..i.e.w...i.n.g.. .a.. .k..e.y..b..o.a..r.d.. .l.a..y.o..u..t. ......................................................................................... 11 ....V..i.e.w...i.n.g.. .b..o..d.y.. .t.e..x..t. .o..r. .m...a.x..i.m...i.z.e..d.. .c.h..a..r.a..c.t..e.r..s. .(.z..o..o.m...). ..................................................... 11 ....L..o.a..d..i.n..g. .a..n..d.. .u.n..l.o..a.d..i.n..g.. .f.o..n.t..s. ...................................................................................... 12 ....I.n..s.t.a..l.l.i.n.g.. .a..n..d. .u..n..i.n..s.t.a..l.l.i.n.g.. .f.o..n..t.s.. ................................................................................. 12 ....C..o..p.y..i.n..g.,.. .m..o..v..i.n..g. .a..n..d.. .d.e..l.e..t.i.n..g. .f..o.n..t. .f..i.le..s.. ..................................................................... 12 ....F..i.n.d..i.n..g.. .a. .f..o.n..t. ........................................................................................................... 13 ....F..i.n.d..i.n..g.. .f.o..n.t.. .d.u..p..l.i.c.a..t.e..s. .............................................................................................. 13 ....F..i.n.d..i.n..g.. .s.i.m...i.l.a.r.. .f.o..n.t..s. ................................................................................................. 13 ....C..o..m..p..a..r.i.n..g.. .f.o..n.t..s. ....................................................................................................... 14 Pri.n.t..i.n.g.. ........................................................................................................................... 15 ....P..r.i.n..t.i.n..g. .s..e..v.e..r.a..l. .f.o..n..t.s. .p..e..r. .p..a..g.e.. .................................................................................. 15 ....P..r.i.n..t.i.n..g. .a.. .f.o..n..t. .s..a.m...p..l.e. .(..s.a..m...p.l.e.. .p..a.g..e..). ......................................................................... 15 ....P..r.i.n..t.i.n..g. .t..h.e.. .c..h.a..r.a..c..t.e..r. .s.e..t. .o..f. .a.. .f.o..n..t. ............................................................................ 15 ....P..r.i.n..t.i.n..g. .t..h.e.. .k..e..y.b..o..a.r..d. .l.a..y.o..u..t. .o..f. .a.. .f.o..n..t. ........................................................................ 16 ....P..r.i.n..t.i.n..g. .f..o.n..t.s.. .f.r.o..m... .t.h..e.. .d.a..t.a..b..a..s.e.. .o..r. .f.r.o..m... .f.o..n..t. .g..r.o..u.p..s.. ................................................. 16 ....C..h..a.n..g..i.n..g. .p..r.i.n..t.e..r. .s..e..t.t.i.n..g..s. .a..n..d. .p..a..p..e.r.. .s.i.z..e. .................................................................... 17 ....C..h..a.n..g..i.n..g. .t..h.e.. .m...a..r.g..i.n.s.. ............................................................................................... 17 Set.s.. .a..n.d.. .D..a..t.a..b..a.s..e.. ........................................................................................................... 18 ....W...h..y. .d..o.. .I. .n.e..e..d.. .S.e..t.s.. .a..n.d.. .D..a..t.a..b..a.s..e..?. ............................................................................. 18 ....M..a..n..a..g.i.n..g.. .f.o..n..t.s. .i.n.. .S..e..t.s. .............................................................................................. 19 Creating a.. .n..e..w.. .S..e..t.................................................................................................................................... 19 Deleting a. .S.e..t............................................................................................................................................. 19 Adding fon.t..s.. .t.o.. .a.. .S..e..t................................................................................................................................. 19 Deleting fo..n..t..s. .f..r.o..m... .a.. .S..e..t.......................................................................................................................... 19 Loading Se..t.s.. .o..r.. .i.n..d..i.v..i.d..u..a..l .f..o..n..t.s................................................................................................................ 20 Showing or.. .h..i.d..i.n..g.. .t..h..e.. .S.e..t.. .m...a..n..a..g..e..r. .o..n.. .t..h..e.. .t..a..s.k..b..a..r................................................................................. 20 Finding fon..t..s.. .i.n.. .S.e..t..s.................................................................................................................................. 20 Viewing pr..o..p..e..r.t..i.e..s.. .o..f. .S..e..t.s.. .o..r.. .f.o..n..t..s......................................................................................................... 21 Copying Se..t..s. .o..r.. .f.o..n..t..s................................................................................................................................ 21 Sharing Se.t..s. .o..n.. .y..o..u..r.. .n..e..t..w..o..r..k................................................................................................................... 21 Changing t..h..e.. .f.o..l.d..e..r.. .o..f. .S..e..t.s.. .d..a..t..a.............................................................................................................. 23 ....M..a..n..a..g.i.n..g.. .y.o..u..r. .f.o..n..t. .l.i.b..r.a..r.y. .w...i.t.h.. .t.h..e. .d..a..t.a..b..a.s..e.. ............................................................. 24 Creating a.. .n..e..w.. .d..a..t..a..b..a..s..e.. .f.o..l.d..e..r............................................................................................................... 24 Deleting a. .d..a..t.a..b..a..s..e.. .f.o..l.d..e..r........................................................................................................................ 24 Adding fon.t..s.. .t.o.. .a.. .d..a..t..a..b..a..s..e.. .f.o..l.d..e..r............................................................................................................ 24 Deleting fo..n..t.. .e..n..t.r..i.e..s.. .f.r..o..m.. .a.. .d..a..t..a..b..a..s..e.. .f.o..l.d..e..r.......................................................................................... 25 © Neuber Software Contents 3 Loading fo.n..t..s.. .f.r..o..m.. .a.. .d..a..t..a..b..a..s..e.. .f.o..l.d..e..r...................................................................................................... 25 Finding fon..t..s.. .i.n.. .t.h..e.. .d..a..t..a..b..a..s..e................................................................................................................... 25 Changing P..r..o..p..e..r..t.i.e..s.. .o..f. .f..o..n..t.s.. .e..n..t..r.y.. .o..r.. .f.o..l.d..e..r.......................................................................................... 25 Copying fo..n..t.s.. .o..r.. .d..a..t.a..b..a..s..e.. .f.o..l.d..e..r.. .i.n..s.i.d..e.. .t..h..e.. .d..a..t..a..b..a..s.e............................................................................ 26 Exporting .f..o..n..t.s.......................................................................................................................................... 26 Displaying. .a.. .f.o..n..t.. .s.a..m...p..l.e.. .i.n..s.t..e..a..d.. .o..f. .t..h..e.. .f.o..n..t.. .n..a..m...e.................................................................................. 26 Part III Customizing Typograf 28 Cha..n..g..i.n.g.. .t.h..e.. .s.a..m...p..le.. .t.e..x..t. .i.n.. .t.h..e.. .f.o..n.t.. .li.s..t. ........................................................................... 28 Dis.p..l.a.y..i.n..g. .f..o.n..t. .n..a..m...e. .o..r. .f..i.le.. .n..a..m..e.. .b..e..lo..w.. .t..h.e.. .s..a.m...p..l.e. .t..e.x..t. .................................................... 28 Cha..n..g..i.n.g.. .t.h..e.. .f.o..n..t. .s.i.z..e.. .i.n. .t..h.e.. .f.o..n..t. .l.i.s.t.. ............................................................................... 28 Cha..n..g..i.n.g.. .t.h..e.. .n..u.m...b..e..r. .o..f. .c.o..l.u..m..n..s.. ...................................................................................... 28 Cha..n..g..i.n.g.. .t.h..e.. .c.o..l.o..r. .a..n.d.. .b..a..c.k..g..r.o..u.n..d.. .o..f. .f.o..n..t.s. ....................................................................... 29 Cho..o..s.i.n..g.. .w..h..i.c.h.. .f.o..n..t. .t.y..p..e.s.. .a..r.e.. .d.i.s..p..la..y..e.d.
Recommended publications
  • Sig Process Book
    A Æ B C D E F G H I J IJ K L M N O Ø Œ P Þ Q R S T U V W X Ethan Cohen Type & Media 2018–19 SigY Z А Б В Г Ґ Д Е Ж З И К Л М Н О П Р С Т У Ф Х Ч Ц Ш Щ Џ Ь Ъ Ы Љ Њ Ѕ Є Э І Ј Ћ Ю Я Ђ Α Β Γ Δ SIG: A Revival of Rudolf Koch’s Wallau Type & Media 2018–19 ЯREthan Cohen ‡ Submitted as part of Paul van der Laan’s Revival class for the Master of Arts in Type & Media course at Koninklijke Academie von Beeldende Kunsten (Royal Academy of Art, The Hague) INTRODUCTION “I feel such a closeness to William Project Overview Morris that I always have the feeling Sig is a revival of Rudolf Koch’s Wallau Halbfette. My primary source that he cannot be an Englishman, material was the Klingspor Kalender für das Jahr 1933 (Klingspor Calen- dar for the Year 1933), a 17.5 × 9.6 cm book set in various cuts of Wallau. he must be a German.” The Klingspor Kalender was an annual promotional keepsake printed by the Klingspor Type Foundry in Offenbach am Main that featured different Klingspor typefaces every year. This edition has a daily cal- endar set in Magere Wallau (Wallau Light) and an 18-page collection RUDOLF KOCH of fables set in 9 pt Wallau Halbfette (Wallau Semibold) with woodcut illustrations by Willi Harwerth, who worked as a draftsman at the Klingspor Type Foundry.
    [Show full text]
  • Faux Hands for Calligraphy Imitating Non-European Script
    Faux Hands for Calligraphy Imitating Non-European Script THL Helena Sibylla – [email protected] As scribes in the SCA, we’re all familiar with a variety of European scripts from the Middle Ages. We’ve probably all dabbled at least a bit with calligraphic hands like Uncial, Carolingian Minuscule, Early Gothic, or Batarde. While many people in the SCA choose to portray European personas, there are an increasing number of people exploring non-European areas such as Islam and China. Beyond that, there are other scripts that exist around the main core of European writing that fit other personas such as Greek or Norse. If you have a scroll assignment for a person where a medieval European hand just won’t be suitable, there are a couple of options. One is to plug your text into a translation program and then writing in the original language. However, this runs the risk of someone who actually knows the language finding unintentional errors created by the translation software, which doesn’t always understand the quirks and idioms found in non-English languages. Creating a script with the look of a foreign hand that fits the culture of the recipient’s persona has the advantage of allowing the scribe to still write in English while creating a visual effect that is dramatically different from the typical SCA scroll. In addition to the examples provided here, I strongly recommend that you spend some time researching the script of the culture you’re planning to emulate. You will want to consider issues of punctuation and accent marks, as well as decorative letters, and upper and lower cases (if they are used).
    [Show full text]
  • National Diploma in Calligraphy Helpful Hints for FOUNDATION Diploma Module A
    National Diploma in Calligraphy Helpful hints for FOUNDATION Diploma Module A THE LETTERFORM ANALYSIS “In A4 format make an analysis of the letter-forms of an historical manuscript which reflects your chosen basic hand. Your analysis should include x-height, letter formation and construction, heights of ascenders and descenders, etc. This can be in the form of notes added to enlarged photocopies of a relevant historical manuscript, together with your own lettering studies” At this first level, you will be working with one basic hand only and its associated capitals. This will be either Foundational (Roundhand) in which case study the Ramsey Psalter, or Formal Italic, where you can study a hand by Arrighi or Francisco Lucas, or other fine Italian scribe. Find enlarged detailed illustrations from ‘Historical Scripts by Stan Knight, or A Book of Scripts, by A Fairbank, or search the internet. Stan Knight’s book is the ‘bible’ because the enlargements are clear and at least 5mm or larger body height – this is the ideal. Show by pencil lines & measurements on the enlargement how you have worked out the pen angle, nib-widths, ascender & descender heights and shape of O, arch formations etc, use a separate sheet to write down this information, perhaps as numbered or bullet points, such as: 1. Pen angle 2. 'x'height 3. 'o'form 4, 5,6 Number of strokes to each letter, their order, direction: - make a general observation, and then refer the reader to the alphabet (s) you will have written (see below), on which you will have added the stroke order and directions to each letter by numbered pencil arrows.
    [Show full text]
  • English, and Identify the Glosses and Headings As Modern English Or Latin
    e ENRICH Schema — A Reference Guide edited by Lou Burnard October 2008 e ENRICH Schema ii edited by Lou Burnard Contents 1 Manuscript Description Metadata 1 1.1 Phrase-level Elements ................................... 6 1.1.1 Origination ...................................... 6 1.1.2 Material ........................................ 7 1.1.3 Watermarks and Stamps ............................... 7 1.1.4 Dimensions ...................................... 8 1.1.5 References to Locations within a Manuscript .................... 10 1.1.6 Names of Persons, Places, and Organizations .................... 12 1.1.7 Catchwords, Signatures, Secundo Folio ........................ 13 1.1.8 Heraldry ........................................ 14 1.2 e Manuscript Identifier ................................. 14 1.3 e Manuscript Heading .................................. 18 1.4 Intellectual Content .................................... 19 1.4.1 e <msItem> Element ................................ 20 1.4.2 Authors and Titles ................................... 22 1.4.3 Rubrics, Incipits, Explicits, and Other Quotations from the Text .......... 23 1.4.4 Filiation ........................................ 24 1.4.5 Text Classification ................................... 24 1.4.6 Languages and Writing Systems ........................... 24 1.5 Physical Description .................................... 25 1.5.1 Object Description .................................. 26 1.5.2 Writing, Decoration, and Other Notations ...................... 30 1.5.3 Bindings, Seals, and Additional
    [Show full text]
  • JAF Herb Specimen © Just Another Foundry, 2010 Page 1 of 9
    JAF Herb specimen © Just Another Foundry, 2010 Page 1 of 9 Designer: Tim Ahrens Format: Cross platform OpenType Styles & weights: Regular, Bold, Condensed & Bold Condensed Purchase options : OpenType complete family €79 Single font €29 JAF Herb Webfont subscription €19 per year Tradition ist die Weitergabe des Feuers und nicht die Anbetung der Asche. Gustav Mahler www.justanotherfoundry.com JAF Herb specimen © Just Another Foundry, 2010 Page 2 of 9 Making of Herb Herb is based on 16th century cursive broken Introducing qualities of blackletter into scripts and printing types. Originally designed roman typefaces has become popular in by Tim Ahrens in the MA Typeface Design recent years. The sources of inspiration range course at the University of Reading, it was from rotunda to textura and fraktur. In order further refined and extended in 2010. to achieve a unique style, other kinds of The idea for Herb was to develop a typeface blackletter were used as a source for Herb. that has the positive properties of blackletter One class of broken script that has never but does not evoke the same negative been implemented as printing fonts is the connotations – a type that has the complex, gothic cursive. Since fraktur type hardly ever humane character of fraktur without looking has an ‘italic’ companion like roman types few conservative, aggressive or intolerant. people even know that cursive blackletter As Rudolf Koch illustrated, roman type exists. The only type of cursive broken script appears as timeless, noble and sophisticated. that has gained a certain awareness level is Fraktur, on the other hand, has different civilité, which was a popular printing type in qualities: it is displayed as unpretentious, the 16th century, especially in the Netherlands.
    [Show full text]
  • Rotunda ROM Magazine Subject Index V. 1 (1968) – V. 42 (2009)
    Rotunda ROM Magazine Subject Index v. 1 (1968) – v. 42 (2009) 2009.12.02 Adam (Biblical figure)--In art: Hickl-Szabo, H. "Adam and Eve." Rotunda 2:4 (1969): 4-13. Aesthetic movement (Art): Kaellgren, P. "ROM answers." Rotunda 31:1 (1998): 46-47. Afghanistan--Antiquities: Golombek, L. "Memories of Afghanistan: as a student, our writer realized her dream of visiting the exotic lands she had known only through books and slides: thirty-five years later, she recalls the archaeoloigical treasures she explored in a land not yet ruined by tragedy." Rotunda 34:3 (2002): 24-31. Akhenaton, King of Egypt: Redford, D.B. "Heretic Pharoah: the Akhenaten Temple Project." Rotunda 17:3 (1984): 8-15. Kelley, A.L. "Pharoah's temple to the sun: archaeologists unearth the remains of the cult that failed." Rotunda 9:4 (1976): 32-39. Alabaster sculpture: Hickl-Szabo, H. "St. Catherine of Alexandria: memorial to Gerard Brett." Rotunda 3:3 (1970): 36-37. Keeble, K.C. "Medieval English alabasters." Rotunda 38:2 (2005): 14-21. Alahan Manastiri (Turkey): Gough, M. "They carved the stone: the monastery of Alahan." Rotunda 11:2 (1978): 4-13. Albertosaurus: Carr, T.D. "Baby face: ROM Albertosaurus reveals new findings on dinosaur development." Rotunda 34:3 (2002): 5. Alexander, the Great, 356-323 B.C.: Keeble, K.C. "The sincerest form of flattery: 17th-century French etchings of the battles of Alexander the Great." Rotunda 16:1 (1983): 30-35. Easson, A.H. "Macedonian coinage and its Hellenistic successors." Rotunda 15:4 (1982): 29-31. Leipen, N. "The search for Alexander: from the ROM collections." Rotunda 15:4 (1982): 23-28.
    [Show full text]
  • Scribe Attribution for Early Medieval Handwriting by Means of Letter Extraction and Classification and a Voting Procedure for La
    2014 22nd International Conference on Pattern Recognition Scribe attribution for early medieval handwriting by means of letter extraction and classification and a voting procedure for larger pieces Mats Dahllof¨ Dept of Linguistics and Philology and Dept of Information Technology, Division of Visual Information and Interaction, Uppsala University, Sweden E-mail: mats.dahllof@lingfil.uu.se Abstract—The present study investigates a method for the a discipline tend to be difficult to communicate, to reproduce, attribution of scribal hands, inspired by traditional palaeography and to validate (see Stokes [10]). By contrast, a computer- in being based on comparison of letter shapes. The system aided palaeography, making use of techniques inspired by was developed for and evaluated on early medieval Caroline those developed in forensic analysis of modern handwriting, minuscule manuscripts. The generation of a prediction for a page will be better equipped to characterize historical writing in image involves writing identification, letter segmentation, and precise and quantitative terms, and to work with models which letter classification. The system then uses the letter proposals to predict the scribal hand behind a page. Letters and sequences of can be objectively validated. connected letters are identified by means of connected component This paper describes a method for attributing pieces of labeling and split into letter-size pieces. The hand (and character) handwriting to scribes by extracting plausible letter candidates prediction makes use of a dataset containing instances of the from manuscript pages. The proposal is inspired by traditional letters b, d, p, and q, cut out from manuscript pages whose scribal origin is known.
    [Show full text]
  • I. ELECTRONIC DISCOVERY: DEFINITIONS and USES A. What
    I. ELECTRONIC DISCOVERY: DEFINITIONS AND USES A. What Is Electronic Discovery? Electronic discovery includes requests for and production of information that is stored in digital form.1 In short, electronic discovery is the discovery of electronic documents and data.2 Electronic documents include virtually anything that is stored on a computer such as e-mail, web pages, word processing files, and computer databases.3 Electronic records can be found on a wide variety of devices such as desktop and laptop computers, network servers, personal digital assistants and digital phones.4 Documents and data are "electronic" if they exist in a medium that can only be read by using computers such as cache memory, magnetic disks (for example computer hard drives or floppy disks), optical disks (for example DVDs or CDs), and magnetic tapes.5 Electronic discovery is frequently distinguished from traditional "paper discovery," which is the discovery of writings on paper that can be read without the assistance of computers.6 B. Why E-Discovery Can Be Valuable in Litigation With the advancement of technology, electronic discovery is not only valuable in litigation, it is essential. Electronic evidence is affecting virtually every investigation today whether it is criminal or civil.7 Usually, there are no longer "paper- trails" that establish who did what and when.8 Instead, electronic evidence is providing the clues to understanding what actually happened.9 Consider these statistics regarding the electronic evidence explosion: · "In 2002, the International Data Corporation estimated that 31 billion e-mails were sent daily. This number is expected to grow to 60 billion a day by 2006.
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations.
    [Show full text]
  • Calligraphy Specimens Following Writing
    Calligraphy Specimens following Writing Manual by ADOLPH ZUNNER[?] printed by JOHANN CHRISTOPH WEIGEL or CHRISTOPH WEIGEL THE ELDER In German and Latin, manuscript on paper Germany (Nuremberg), c. 1713 20 folios on paper, complete [collation i20], unidentified watermark (bisected with center lacking, crest holding 3? bezants with ornate frame, initials M and F at bottom), foliation in modern pencil in upper recto corners, text written in various calligraphic scripts in black ink on recto only, no visible ruling and varied justification, sketched decorative evergreen boughs on f. 1 and calligraphic scrollwork throughout, minor flecking and staining, some original ink blots. CONTEMPORARY BINDING, brown (once red?) brocade paper with elegant mixed floral design and traces of gold embossing, pasted spine, abrasion and discoloration but wholly intact. Dimensions 150 x 190 mm. Calligraphic sample books from the Renaissance, such as this manuscript, are far less common than their printed exemplars; this charming booklet, designed for teaching writing to the young, appears to be one of a kind. This volume in its fine contemporary binding includes texts that display a scribe’s skill in writing different types of scripts. It is partially copied from writing master Adolph Zunner’s 1709 Kunstrichtige Schreib-Art printed in Nuremberg by famous publisher and engraver [Johann] Christoph Weigel. PROVENANCE 1. Written in Germany, in Nuremberg, in 1713 or shortly thereafter, with a title page reading Gründliche Unterweisung zu Fraktur – Canzley – und Current Schrifften der lieben Jugend zum Anfang des Schreibens und sondern Nuzen gestellet durch A. <A. or Z.?> in Nürnberg Zufinden bey Johann Christoph Weigel (A Thorough Instruction in Fraktur, Chancery, and Cursive Scripts, prepared for the especial utility of dear Youth in beginning to write by A.
    [Show full text]
  • SOPHIA BAUERIN, Child's Calligraphy Sample Book
    SOPHIA BAUERIN, Child’s Calligraphy Sample Book: ANONYMOUS, Drei junge Reisende (Three Young Travellers); ANONYMOUS, Der Menschenfreunde (The Philanthropist); arithmetic table In German, decorated manuscript on paper Germany, dated 1792 8 folios on paper (4 bifolios in a single quire), complete, with watermark: 2 crossed keys with 2-line stems, within a wreath that may contain letters or words, unidentified in the Bernstein database, and countermark: a banderole with ICL in simple serif script, similar contemporary countermark reading ‘ICL’ (same size and lettering but with a slightly different frame) is found in Berlin, Singakademie zu Berlin, SA 3343, where it is paired with a watermark labeled ‘Dresden’, first folio serves as a front cover with title and date in red and green blackletter script, surrounded by a painted baroque frame with a floral wreath, ff. 2-6 ruled in pencil, text written on recto only in long line, in two calligraphic scripts (f. 2 in German Kanzleischrift with first line in blackletter, ff. 3-6 in kurrent with first lines in Kanzleischrift) in black ink with large decorative initials in green, blue, and red, variable number of lines (7-12) and justification (90-130 x 180-185 mm.), generous margins contain decorative borders of filigree lozenges and swirls, f. 7 holds only a table of sums in 4 columns (11 lines), booksellers’s marks in pencil on f. 1v (‘8 Kr’) and f. 2 (‘142|69|5’). No binding; the quire is tacketed through the center fold with silk thread of twisted yellow, pink, blue, and green, with the folded edge at the head of the text and opening edge at bottom (i.e.
    [Show full text]
  • Archive and Compressed [Edit]
    Archive and compressed [edit] Main article: List of archive formats • .?Q? – files compressed by the SQ program • 7z – 7-Zip compressed file • AAC – Advanced Audio Coding • ace – ACE compressed file • ALZ – ALZip compressed file • APK – Applications installable on Android • AT3 – Sony's UMD Data compression • .bke – BackupEarth.com Data compression • ARC • ARJ – ARJ compressed file • BA – Scifer Archive (.ba), Scifer External Archive Type • big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games • BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools • BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE • bzip2 – (.bz2) • bld - Skyscraper Simulator Building • c4 – JEDMICS image files, a DOD system • cab – Microsoft Cabinet • cals – JEDMICS image files, a DOD system • cpt/sea – Compact Pro (Macintosh) • DAA – Closed-format, Windows-only compressed disk image • deb – Debian Linux install package • DMG – an Apple compressed/encrypted format • DDZ – a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games. • DPE – Package of AVE documents made with Aquafadas digital publishing tools. • EEA – An encrypted CAB, ostensibly for protecting email attachments • .egg – Alzip Egg Edition compressed file • EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab • ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document • ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system. • GHO (.gho, .ghs) – Norton Ghost • gzip (.gz) – Compressed file • IPG (.ipg) – Format in which Apple Inc.
    [Show full text]