Setting up Your Carbon Application to Use the Services Menu

Total Page:16

File Type:pdf, Size:1020Kb

Setting up Your Carbon Application to Use the Services Menu Setting Up Your Carbon Application to Use the Services Menu December 10, 2003 Simultaneously published in the United Apple Computer, Inc. States and Canada. © 2002, 2004 Apple Computer, Inc. Even though Apple has reviewed this manual, All rights reserved. APPLE MAKES NO WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH RESPECT TO THIS MANUAL, No part of this publication may be ITS QUALITY, ACCURACY, MERCHANTABILITY, OR FITNESS FOR A reproduced, stored in a retrieval system, or PARTICULAR PURPOSE. AS A RESULT, THIS transmitted, in any form or by any means, MANUAL IS SOLD ªAS IS,º AND YOU, THE mechanical, electronic, photocopying, PURCHASER, ARE ASSUMING THE ENTIRE RISK AS TO ITS QUALITY AND ACCURACY. recording, or otherwise, without prior IN NO EVENT WILL APPLE BE LIABLE FOR written permission of Apple Computer, Inc., DIRECT, INDIRECT, SPECIAL, INCIDENTAL, with the following exceptions: Any person OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY DEFECT OR is hereby authorized to store documentation INACCURACY IN THIS MANUAL, even if on a single computer for personal use only advised of the possibility of such damages. and to print copies of documentation for THE WARRANTY AND REMEDIES SET personal use provided that the FORTH ABOVE ARE EXCLUSIVE AND IN LIEU OF ALL OTHERS, ORAL OR WRITTEN, documentation contains Apple’s copyright EXPRESS OR IMPLIED. No Apple dealer, agent, notice. or employee is authorized to make any modification, extension, or addition to this The Apple logo is a trademark of Apple warranty. Computer, Inc. Some states do not allow the exclusion or limitation of implied warranties or liability for Use of the “keyboard” Apple logo incidental or consequential damages, so the (Option-Shift-K) for commercial purposes above limitation or exclusion may not apply to you. This warranty gives you specific legal without the prior written consent of Apple rights, and you may also have other rights which may constitute trademark infringement and vary from state to state. unfair competition in violation of federal and state laws. No licenses, express or implied, are granted with respect to any of the technology described in this document. Apple retains all intellectual property rights associated with the technology described in this document. This document is intended to assist application developers to develop applications only for Apple-labeled or Apple-licensed computers. Every effort has been made to ensure that the information in this document is accurate. Apple is not responsible for typographical errors. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014 408-996-1010 Apple, the Apple logo, Aqua, Carbon, Cocoa, Mac, and Mac OS are trademarks of Apple Computer, Inc., registered in the United States and other countries. Finder is a trademark of Apple Computer, Inc. Java and all Java-based trademarks are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Contents Chapter 1 Introduction to Application Services 7 Who Should Read This Document? 7 Organization of This Document 7 See Also 8 Chapter 2 Application Services Concepts 9 Types of Application Services 9 Installation Paths for Services 11 Items in the Services Menu 12 Services Properties 12 What Happens When a Service Is Invoked 14 Chapter 3 Application Services Tasks 17 Using a Service 17 Declaring Services Events 17 Specifying the Data Types Used by Your Application 18 Handling Copy and Paste Events 20 Installing a Carbon Event Handler 24 Providing a Service 24 Adding the NSServices Property to the Information Property List 25 Making Sure There's a Bundle Identifier Property 26 Handling the Service Perform Event 26 Installing a Carbon Event Handler 33 Registering the Service 33 Appendix A Carbon Events for Services 35 Event Classes and Kinds 35 Event Parameters for Services Events 35 Document Revision History 37 3 © 2002, 2004 Apple Computer, Inc. All Rights Reserved. CONTENTS 4 © 2002, 2004 Apple Computer, Inc. All Rights Reserved. Tables, Figures, and Listings Chapter 2 Application Services Concepts 9 Figure 2-1 Make Sticky is a processor service 10 Figure 2-2 Open URL is a processor service 10 Figure 2-3 Grab is a provider service 11 Figure 2-4 The Wolf Facts document after a screenshot has been inserted 11 Figure 2-5 The NSServices property for the Grab application 14 Chapter 3 Application Services Tasks 17 Figure 3-1 Three services provided by SimplerText 28 Figure 3-2 Text provided by the service requestor 30 Figure 3-3 Giving text to the service requestor 31 Figure 3-4 Modified text returned to the service requestor 33 Listing 3-1 Declaring an EventTypeSpec structure for services events 18 Listing 3-2 Declaring an EventTypeSpec structure for a variety of Carbon events 18 Listing 3-3 Declaring the data types used in an application 19 Listing 3-4 Supplying the data types used by your application 19 Listing 3-5 Handling a copy event 21 Listing 3-6 Handling a paste event 22 Listing 3-7 Getting the Carbon event parameter for the event kind kEventServicePerform 26 Listing 3-8 Getting data from the service requestor 29 Listing 3-9 Giving data to the service requestor 30 Listing 3-10 Modifying data from the service requestor 31 Appendix A Carbon Events for Services 35 Table A-1 Event classes and kinds used by application services 35 Table A-2 Carbon event parameters for service events 36 5 © 2002, 2004 Apple Computer, Inc. All Rights Reserved. TABLES, FIGURES, AND LISTINGS 6 © 2002, 2004 Apple Computer, Inc. All Rights Reserved. CHAPTER 1 Introduction to Application Services Application services give applications an open-ended way to extend each other's functionality by allowing them to: ■ Provide services to other applications ■ Access functionality provided by other applications An application that provides a service advertises the operation it can perform on a particular type of dataÐfor example, encryption of text, optical character recognition of a bitmapped image, or generating text such as a message of the day. Any application that signs up to use services automatically accesses the advertised functionality through its Services menu. An application doesn't need to know in advance what operations are available; it merely needs to indicate the types of data it uses, and the Services menu makes available the operations that apply to those types of data. Who Should Read This Document? This document describes how application services work, shows some typical Services menus, and provides instructions on how you can use services in your application. You should read this document if you are an application developer and want to provide your application's services to other applications or make services from other applications available to your application. Before you read this document, you should be familiar with information property lists. You need to know what they are and how to add properties to a list. Carbon developers should also know how to write and install Carbon event handlers. Organization of This Document This document is organized as follows: ■ ªApplication Services Conceptsº (page 9), discusses the types of services, the Services menu, services properties, and what happens when a service is invoked. Who Should Read This Document? 7 © 2002, 2004 Apple Computer, Inc. All Rights Reserved. CHAPTER 1 Introduction to Application Services ■ ªApplication Services Tasksº (page 17), provides instructions on how to set up your application to use services provided by other applications and how to provide your services to other applications. ■ ªCarbon Events for Servicesº (page 35), describes the Carbon event classes, kinds, and event parameters defined for services events. See Also ■ Aqua Human Interface Guidelines in User Experience Documentation provides guidelines on naming menu items and designing the interface for a services application. ■ Handling Carbon Events in Carbon Events & Other Input Documentation describes how to implement Carbon events in your application. ■ System Overview in Mac OS X Documentation contains information on property lists and how they are used in Mac OS X. ■ Learning Carbon, available through O'Reilly and Associates, contains information on writing and using Carbon event handlers as well as information on how to set up and use property lists. 8 See Also © 2002, 2004 Apple Computer, Inc. All Rights Reserved. CHAPTER 2 Application Services Concepts This chapter provides an overview of the Services menu and describes how application services are provided and accessed. It also shows typical examples of the services available to, or provided by, applications in Mac OS X. Types of Application Services Mac OS X offers two types of services: ■ Processor. This type of service acts on data. A processor service acts on the current selection and then sends it to the service. For example, if a user selects an email address in a TextEdit document, and then chooses Mail > Mail To from the Services menu, Mail copies the person's address, launches the Mail application, and pastes the address into the To field of a new email message. ■ Provider. This type of service gives data to the calling application. For example, if a user chooses Grab > Screen from the Services menu, the Grab application opens, takes a screenshot, then returns the screenshot (TIFF data in this case) to the calling application. The calling application (such as TextEdit) is responsible for pasting the data into the active document. Let's take a look at a few examples. Figure 2-1 (page 10) shows the Services menu from the TextEdit application. Make Sticky is an example of a processor service. The Make Sticky command takes the current selection in the TextEdit document, opens a new Stickies document, and then pastes the selection into the Stickies document. Types of Application Services 9 © 2002, 2004 Apple Computer, Inc. All Rights Reserved. CHAPTER 2 Application Services Concepts Figure 2-1 Make Sticky is a processor service Figure 2-2 (page 10) shows another example of a processor service.
Recommended publications
  • Stickybrain™ User's Guide
    STICKYBRAIN™ USER’S GUIDE CHRONOS LLC MAY 12, 2005 1 LICENSE AGREEMENT, COPYRIGHTS, & TRADEMARKS PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE CHRONOS SOFTWARE. BY USING THE CHRONOS SOFTWARE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, DO NOT INSTALL OR USE THE SOFTWARE. IF YOU DO NOT AGREE TO THE TERMS OF THE LICENSE, YOU MAY RETURN THE CHRONOS SOFTWARE TO THE PLACE WHERE YOU OBTAINED IT FOR A REFUND. IF THE CHRONOS SOFTWARE WAS ACCESSED ELECTRONICALLY, CLICK "DISAGREE/DECLINE". FOR CHRONOS SOFTWARE INCLUDED WITH YOUR PURCHASE OF HARDWARE, YOU MUST RETURN THE ENTIRE HARDWARE/SOFTWARE PACKAGE IN ORDER TO OBTAIN A REFUND. IMPORTANT NOTE: This software may be used to reproduce materials. It is licensed to you only for reproduction of non-copyrighted materials, materials in which you own the copyright, or materials you are authorized or legally permitted to reproduce. If you are uncertain about your right to copy any material, you should contact your legal advisor. 1. General. The software, documentation and any supporting documents accompanying this License whether on disk, in read only memory, on any other media or in any other form (collectively the "Chronos Software") are licensed, not sold, to you by Chronos LLC ("Chronos") for use only under the terms of this License, and Chronos reserves all rights not expressly granted to you. The rights granted herein are limited to Chronos' and its licensors' intellectual property rights in the Chronos Software and do not include any other patents or intellectual property rights.
    [Show full text]
  • Openstep User Interface Guidelines
    OpenStep User Interface Guidelines 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. Part No: 802-2109-10 A Sun Microsystems, Inc. Business Revision A, September 1996 1996 Sun Microsystems, Inc. 2550 Garcia Avenue, Mountain View, California 94043-1100 U.S.A. All rights reserved. Portions Copyright 1995 NeXT Computer, Inc. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX® system, licensed from UNIX System Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. Third-party font software, including font technology in this product, is protected by copyright and licensed from Sun's suppliers. This product incorporates technology licensed from Object Design, Inc. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS Sun, Sun Microsystems, the Sun logo, SunSoft, the SunSoft logo, Solaris, SunOS, and OpenWindows are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries.
    [Show full text]
  • Tinkertool System 6 Reference Manual Ii
    Documentation 0632-1969/2 TinkerTool System 6 Reference Manual ii Version 6.99, July 21, 2021. US-English edition. MBS Documentation 0632-1969/2 © Copyright 2003 – 2021 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, macOS, iCloud, and FireWire are registered trademarks of Apple Inc. Intel is a registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Broadcom is a registered trademark of Broadcom, Inc. Trademarks or service marks are used for identification purposes only.
    [Show full text]
  • Xerox® Phaser 3320DN/3320DNI System Administrator Guide ©2012 Xerox Corporation
    Version 1.0 February 2012 Xerox® Phaser 3320DN/3320DNI System Administrator Guide ©2012 Xerox Corporation. XEROX® and XEROX and Design® are trademarks of Xerox Corporation in the United States and/or other countries. Document version 1.0: February 2012 Table of Contents 1Introduction Who should use this Guide? . .8 Machine Overview. .9 Product Configurations . .9 Control Panel Overview . 10 2 Machine Connection Machine Parts and Connection Ports . 12 Front View . 12 Rear View . 13 Initial Connection . 13 Administrator Access . 14 Wireless Connectivity (Phaser 3320DNI) . 14 Configure Ethernet Settings . 15 Print a Configuration Report . 16 Install the Additional Memory Card (Optional) . 16 CentreWare Internet Services . 18 3 Network Installation TCP/IP. 24 Configure Static IPv4 Addressing at the Machine . 24 Configure Dynamic IPv4 Addressing at the Machine . 25 Configure TCP/IP Settings using Internet Services . 26 Unix . 29 HP-UX Client (Version 10.x) . 29 Solaris 2.x . 30 SCO . 32 Linux CUPS. 33 Linux LPR via PrintTool. 34 Linux LPRng . 35 4 Printer Drivers Overview . 38 Windows - Installing Driver. 39 Macintosh - Installing Driver . 41 Linux - Installing Drivers . 43 Installing the SmartPanel . 43 Installing the Printer Setting Utility . 43 Xerox Phaser 3320DN/3320DNI 3 System Administrator Guide Unix - Installing Drivers . 45 Setting up the printer . 45 Uninstalling the printer driver package . 46 Sharing your Machine Locally . 47 Windows . 47 Macintosh. 48 Windows Printing. 49 LPR Printing . 49 Internet Printing Protocol (IPP) Port. 52 Raw TCP/IP Printing (Port 9100) . 54 USB Printing. 55 Configure the Windows Printer Driver . 56 Manual Printer Driver Configuration . 56 Apple Mac . 58 TCP/IP Printing (OSX) .
    [Show full text]
  • Installation and User's Guide
    GNUstep Installation and User’s Guide Version 0.6.5 February 8, 2000 Permissions Copyright (C) 1999-2000 Free Software Foundation. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions. Apple™, OpenStep™, and the Apple logo are trademarks of Apple Computers, Inc. registered in the U.S. and other countries. PostScript™, Display PostScript™ and Adobe™ are trademarks of Adobe Systems Incorporated and may be registered in certain jurisdictions. Other company and product names mentioned herein might be trademarks of their respective companies. About the Free Software Foundation The Free Software Foundation (FSF) is dedicated to eliminating restrictions on copying, redistribution, understanding, and modification of computer programs. We do this by promoting the development and use of free software in all areas of computing---but most particularly, by helping to develop the GNU operating system. Many organizations distribute whatever free software happens to be available. In contrast, the Free Software Foundation concentrates on development of new free software---and on making that software into a coherent system that can eliminate the need to use proprietary software. Besides developing GNU, FSF distributes copies of GNU software and manuals for a distribution fee, and accepts tax-deductible gifts to support GNU development.
    [Show full text]
  • Using the Gnustep Appkit a Guide to Using Various Parts of the Gnustep Appkit for Application Development
    Using the GNUstep AppKit A guide to using various parts of the GNUstep AppKit for application development Christopher Armstrong c 2005-2006 Christopher Armstrong. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2, as published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". This documentation is provided on an "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND USEFULNESS OF THE DOC- UMENTATION IS WITH YOU (THE LICENSEE). IN NO EVENT WILL THE COPYRIGHT HOLDERS BE LIABLE FOR DAMAGES, INCLUDING ANY DIRECT, INDIRECT, SPE- CIAL, GENERAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENTATION (INCLUDING BUT NOT LIMITED TO LOSS OF DATA, USE, OR PROFITS; PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES; OR BUSINESS INTERUPTION) HOWEVER CAUSED, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Table of Contents 1 Introduction ........................................... 1 1.1 Overview ..................................................................... 1 1.2 Implementation Details ........................................................ 1 1.2.1 Drag and Drop ..........................................................
    [Show full text]
  • Parliant Phonevalet Users Guide
    PhoneValet 6.0.2 User’s Guide Copyright 2002-2009 Parliant Corporation. All Rights Reserved. All trade names referenced herein are either trademarks or registered trademarks of their respective companies. Table of Contents Address Book Dialing ............................................................................................ 23 Overview....................................................................................2 Clipboard Dialing ................................................................................................... 24 Installation ................................................................................2 AppleScript dialing................................................................................................. 24 Running PhoneValet for the First Time ................................................................... 2 Call Logging ............................................................................ 24 Multiple Line Configurations .................................................................................... 4 Caller ID ................................................................................................................ 25 Voice Mail..................................................................................4 Dialing Numbers from the Call Log........................................................................ 25 Reading the Call Log............................................................................................. 25 Configuring Voice Mail............................................................................................
    [Show full text]
  • The Operating Manual
    THE OPERATING MANUAL Vision Laboratory Volen Center for Complex Systems Brandeis University, Waltham MA Robert Sekuler, Laboratory Director mailto:[email protected] September 2, 2018 1 Contents 1 Purpose of this document.3 2 Research projects.4 3 Research collaborators4 4 Current/recent publications4 5 Communication4 6 Transparency and Reproducibility5 7 Experimental subjects.6 8 Equipment.8 9 Coding/programming. 12 10 Experimental design. 24 11 Literature sources. 24 12 Document preparation. 25 13 Scientific meetings 32 14 Essential background info 33 15 Labspeak1. 38 1This coinage, labspeak, was suggested by Orwell’s coinage “newspeak” in his novel 1984. Unlike “newspeak”, though, labspeak is mean to facilitate and sharpen thought and communication, not subvert them. 2 1 Purpose of this document. This document is meant to ease newcomers’ integration into the operation of the Vision Laboratory located in Brandeis University’s Volen Center. The document presents a lot of information, but there may be only one truly essential thing for new lab members to know: ”If you are uncertain, ask.” To repeat: ”If you are uncertain, ask.” Corollaries to this advice? “If you’re working on a document and are unsure about how it’s progressing, ask someone else to read it.” “ If you’re working on a project and realize that you can use some advice, ask for it.” It’s simple: never hesitate to take advantage of fellow lab members’ knowledge, fresh eyes and advice. When you encounter something that you don’t know, or are not sure about, and have made a good faith effort to work out on your own, it only makes good sense to ask.
    [Show full text]
  • Inside Mac OS X: System Overview Is Intended for Anyone Who Wants to Develop Software for Mac OS X
    Inside Mac OS X System Overview July 2002 Apple Computer, Inc. and TrueType are trademarks of THE WARRANTY AND REMEDIES SET © 2000–2002 Apple Computer, Inc. Apple Computer, Inc., registered in FORTH ABOVE ARE EXCLUSIVE AND All rights reserved. the United States and other countries. IN LIEU OF ALL OTHERS, ORAL OR WRITTEN, EXPRESS OR IMPLIED. No No part of this publication may be Carbon, Quartz, and Velocity Engine Apple dealer, agent, or employee is reproduced, stored in a retrieval are trademarks of Apple Computer, authorized to make any modification, system, or transmitted, in any form or Inc. extension, or addition to this warranty. by any means, mechanical, electronic, Enterprise Objects, Enterprise Objects photocopying, recording, or Framework, NeXT, Objective-C, and Some states do not allow the exclusion or otherwise, without prior written OpenStep are registered trademarks limitation of implied warranties or permission of Apple Computer, Inc., of NeXT Software, Inc., registered in liability for incidental or consequential with the following exceptions: Any the United States and other countries. damages, so the above limitation or person is hereby authorized to store Java and all Java-based trademarks exclusion may not apply to you. This documentation on a single computer are trademarks or registered warranty gives you specific legal rights, for personal use only and to print trademarks of Sun Microsystems, and you may also have other rights which copies of documentation for personal Inc., in the United States and other vary from state to state. use provided that the documentation countries. contains Apple’s copyright notice. Netscape Navigator is a trademark of The Apple logo is a trademark of Netscape Communications Apple Computer, Inc.
    [Show full text]
  • Avaya Call Management System Release 15 Software Installation, Maintenance, and Troubleshooting Guide
    Avaya Call Management System Release 15 Software Installation, Maintenance, and Troubleshooting Guide February 2010 © 2010 Avaya Inc. All Rights Reserved. Preventing toll fraud "Toll fraud" is the unauthorized use of your telecommunications system by an Notice unauthorized party (for example, a person who is not a corporate employee, While reasonable efforts were made to ensure that the information in this agent, subcontractor, or is not working on your company's behalf). Be aware document was complete and accurate at the time of printing, Avaya Inc. can that there can be a risk of toll fraud associated with your system and that, if toll assume no liability for any errors. Changes and corrections to the information fraud occurs, it can result in substantial additional charges for your in this document might be incorporated in future releases. telecommunications services. Documentation disclaimer Avaya fraud intervention Avaya Inc. is not responsible for any modifications, additions, or deletions to If you suspect that you are being victimized by toll fraud and you need technical the original published version of this documentation unless such modifications, assistance or support, call Technical Service Center Toll Fraud Intervention additions, or deletions were performed by Avaya. Customer and/or End User Hotline at +1-800-643-2353 for the United States and Canada. For additional agree to indemnify and hold harmless Avaya, Avaya's agents, servants and support telephone numbers, see the Avaya Support Web site: employees against all claims, lawsuits, demands and judgments arising out of, http://www.avaya.com/support or in connection with, subsequent modifications, additions or deletions to this documentation to the extent made by the Customer or End User.
    [Show full text]
  • Nextstep Programming
    To my parents, Marvin and Marian, who have put up with my addiction to computers since before I could type. - Simson To Louise, Nina, and Timmy. - Michael vii Preface Welcome! This book is about programming computers running NeXTSTEP. It’s a no- nonsense, hands-on book that teaches programmers how to write applica- tion programs that take full advantage of NeXTSTEP, the operating envi- ronment from NeXT Computer Inc. Writing programs for NeXTSTEP is fundamentally different than writing programs for other computers, because NeXTSTEP represents a radical departure from conventional programming environments. One writes NeXTSTEP programs by building systems of related but distinct parts, or objects, and connecting them together to form an integrated whole. Confin- ing different aspects of a program to different pieces makes those pieces easier to design, implement, debug, and reuse. This is what is known as object-oriented programming. NeXTSTEP embodies the principles of object oriented programming from its user interface down to its very core. This greatly simplifies the task of interfacing application programs with the NeXTSTEP operating environ- ment. The downside is that it makes the NeXTSTEP environment very dif- ferent from the environments to which most programmers are accustomed: there’s a steep curve to climb when learning to program in this easy-to-pro- gram environment (sounds strange, but it’s true). We wrote this book out of frustration: at the time, there was no single book that explained step-by-step how to write programs for NeXTSTEP. Instead, a programmer trying to approach the platform was confronted by the NeXT technical documentation and the source-code for several dozen example programs.
    [Show full text]
  • SOHO Notes™ User Guide
    SOHO Notes™ User Guide Chronos Inc. February 10, 2011 1 © 2011 Chronos Inc. All rights reserved. Under the copyright laws, this user guide may not be copied, in whole or in part, without the written consent of Chronos. Your rights to the software are governed by the accompanying software license agreement. Every effort has been made to ensure that the information in this user guide is accurate. Chronos is not respon- sible for printing or clerical errors. Chronos Inc. www.chronosnet.com SOHO Notes, the SOHO Notes logo, and the Chronos logo are trademarks of Chronos Inc. Apple, iPhoto, Mac, Macintosh, Mac OS, iTunes, App Store, and Finder are trademarks of Apple Inc., registered in the U.S. and other countries. All other trademarks, registered trademarks, service names, product and/or brand names are the sole property of their respective owners. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Chronos assumes no responsibility with regard to the per- formance or use of these products. 2 Chapter 1—Welcome Upgrade Information 8 Learning to Use SOHO Notes 8 Chapter 2—Installation Install SOHO Notes 10 Uninstall SOHO Notes 10 Uninstall “SOHO Notes” and “SOHO Tags” From The MobileMe System Preference Pane 11 Chapter 3—Getting Started Personal Database 13 Getting Started 13 Helper Applications 14 Using Multiple Databases 14 Chapter 4—Using SOHO Notes Viewer Window 16 Tabs 18 Sorting 18 Searching 19 Chapter 5—Creating Notes Creating a Note 21 Kinds of Notes 21 Text,
    [Show full text]