IDOL Keyview Filter SDK 12.4 C Programming Guide

Total Page:16

File Type:pdf, Size:1020Kb

IDOL Keyview Filter SDK 12.4 C Programming Guide KeyView Software Version 12.4 Filter SDK C Programming Guide Document Release Date: October 2019 Software Release Date: October 2019 Filter SDK C Programming Guide Legal notices Copyright notice © Copyright 2016-2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for updated documentation, visit https://www.microfocus.com/support-and-services/documentation/. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in. If you need an account, you can create one when prompted to sign in. To learn about the different access levels the portal uses, see the Access Levels descriptions. KeyView (12.4) Page 2 of 346 Filter SDK C Programming Guide Contents Part I: Overview of Filter SDK 11 Chapter 1: Introducing Filter SDK 12 Overview 12 Features 12 Platforms, Compilers, and Dependencies 13 Supported Platforms 13 Supported Compilers 14 Software Dependencies 14 Windows Installation 15 UNIX Installation 16 Package Contents 17 License Information 18 Enable Advanced Document Readers 18 Update License Information 18 Directory Structure 19 Chapter 2: Getting Started 21 Architectural Overview 21 Enhance Performance 23 File Caching 23 Filtering 23 Subfile Extraction 24 Memory Abstraction 24 Use the C-Language Implementation of the API 24 Input/Output Operations 25 Filtering in File Mode 25 Filtering in Stream Mode 26 Multithreaded Filtering 27 The Filter Process Model 28 Filter API 28 File Extraction API 28 Persist the Child Process 29 In the API 29 In the formats.ini File 29 Run Filter In Process 29 In the API 30 In the formats.ini File 30 Run File Extraction Functions Out of Process 30 Restart the File Extraction Server 30 Out-of-Process Logging 31 Enable Out-of-Process Logging 31 Set the Verbosity Level 31 KeyView (12.4) Page 3 of 346 Filter SDK C Programming Guide Enable Windows Minidump 32 Keep Log Files 32 Run File Detection In or Out of Process 32 Specify the Process Type In the formats.ini File 33 Specify the Process Type In the API 33 Part II: Use Filter SDK 34 Chapter 3: Use the File Extraction API 35 Introduction 35 Extract Subfiles 36 Sanitize Absolute Paths 37 Extract Images 38 Recreate a File’s Hierarchy 38 Create a Root Node 38 Recreate a File’s Hierarchy—Example 39 Extract Mail Metadata 40 Default Metadata Set 40 Extract the Default Metadata Set 41 Extract All Metadata 41 Microsoft Outlook (MSG) Metadata 41 Extract MSG-Specific Metadata 42 Microsoft Outlook Express (EML) and Mailbox (MBX) Metadata 43 Extract EML- or MBX-Specific Metadata 43 Lotus Notes Database (NSF) Metadata 44 Extract NSF-Specific Metadata 44 Microsoft Personal Folders File (PST) Metadata 45 MAPI Properties 45 Extract PST-Specific Metadata 46 Exclude Metadata from the Extracted Text File 46 Extract Subfiles from Outlook Files 47 Extract Subfiles from Outlook Express Files 47 Extract Subfiles from Mailbox Files 47 Extract Subfiles from Outlook Personal Folders Files 47 Choose the Reader to use for PST Files 48 MAPI Attachment Methods 49 Open Secured PST Files 50 Detect PST Files While the Outlook Client is Running 50 Extract Subfiles from Lotus Domino XML Language Files 51 Extract .DXL Files to HTML 51 Extract Subfiles from Lotus Notes Database Files 52 System Requirements 52 Installation and Configuration 53 Windows 53 Solaris 53 AIX 5.x 54 KeyView (12.4) Page 4 of 346 Filter SDK C Programming Guide Linux 54 Open Secured NSF Files 54 Format Note Subfiles 55 Extract Subfiles from PDF Files 55 Improve Performance for PDFs with Many Small Images 55 Extract Embedded OLE Objects 55 Extract Subfiles from ZIP Files 56 Default File Names for Extracted Subfiles 56 Default File Name for Mail Formats 56 Default File Name for Embedded OLE Objects 57 Chapter 4: Use the Filter API 58 Generate an Error Log 58 Enable or Disable Error Logging 59 Use the API 59 Use Environment Variables 59 Change the Path and File Name of the Log File 59 Report Memory Errors 60 Use the API 60 Use Environment Variables 60 Specify a Memory Guard 60 Report the File Name in Stream Mode 60 Report Extended Error Codes 61 Specify the Maximum Size of the Log File 61 Extract Metadata 61 Extract Metadata for File Filtering 62 Extract Metadata for Stream Filtering 62 Example 62 Convert Character Sets 63 Determine the Character Set of the Output Text 64 Guidelines for Character Set Conversion 64 Set the Character Set During Filtering 65 Set the Character Set During Subfile Extraction 65 Prevent the Default Conversion of a Character Set 65 Extract Deleted Text Marked by Tracked Changes 66 Filter PDF Files 66 Filter PDF Files to a Logical Reading Order 66 Enable Logical Reading Order 68 Use the C API 68 Use the formats.ini File 68 Rotated Text 69 Extract Custom Metadata from PDF Files 69 Extract Custom Metadata by Tag 69 Extract All Custom Metadata 70 Filter Tagged PDF Content 70 Skip Embedded Fonts 71 Use the formats.ini File 71 KeyView (12.4) Page 5 of 346 Filter SDK C Programming Guide Use the C API 72 Control Hyphenation 72 Use the formats.ini File 72 Use the C API 72 Filter Spreadsheet Files 73 Filter Worksheet Names 73 Filter Hidden Text in Microsoft Excel Files 73 Specify Date and Time Format on UNIX Systems 73 Filter Very Large Numbers in Spreadsheet Cells to Precision Numbers 74 Extract Microsoft Excel Formulas 74 Standardize Cell Formats 76 Numbers 76 Text 77 Dates 77 Filter XML Files 77 Configure Element Extraction for XML Documents 78 Modify Element Extraction Settings 78 Modify Element Extraction Settings in the kvxconfig.ini File 79 Specify an Element's Namespace and Attribute 81 Add Configuration Settings for Custom XML Document Types 81 Configure Headers and Footers 82 Filter Hidden Data 83 Hidden Data in Microsoft Excel Documents 83 Example 84 Toggle Hidden Excel Data Settings in the formats.ini File 84 Hidden Data in HTML Documents 84 Tab Delimited Output for Embedded Tables 85 Table Detection for PDF Files 85 Exclude Japanese Guide Text 86 Source Code Identification 86 Chapter 5: Sample Programs 88 Introduction 88 tstxtract 88 filter 90 Part III: C API Reference 93 Chapter 6: File Extraction API Functions 94 KVGetExtractInterface() 94 fpCloseFile() 95 fpExtractSubFile() 96 fpFreeStruct() 97 fpGetMainFileInfo() 98 fpGetSubFileInfo() 99 fpGetSubFileMetaData() 100 fpOpenFile() 102 KeyView (12.4) Page 6 of 346 Filter SDK C Programming Guide fpSetExtractionTimeout() 103 Chapter 7: File Extraction API Structures 105 KVCredential 105 KVCredentialComponent 106 KVExtractInterface 106 KVExtractSubFileArg 107 KVGetSubFileMetaArg 110 KVMainFileInfo 111 KVMetadataElem 112 KVMetaName 113 KVOpenFileArg 114 KVOutputStream 115 KVSubFileExtractInfo 115 KVSubFileInfo 116 KVSubFileMetaData 119 Chapter 8: Filter API Functions 121 KV_GetFilterInterfaceEx() 122 fpCanFilterFile() 124 fpCanFilterStream() 125 fpCloseStream() 126 fpFiletoInputStreamCreate() 127 fpFileToInputStreamFree() 128 fpFilterConfig() 129 fpFilterFile() 134 fpFilterStream() 135 fpFreeFilterOutput() 136 fpFreeOLESummaryInfo() 137 fpFreeXmpInfo() 138 fpGetDocInfoFile() 139 fpGetDocInfoStream() 140 fpGetKvErrorCodeEx() 141 fpGetOLESummaryInfo() 142 fpGetOLESummaryInfoFile() 143 fpGetTrgCharSet() 144 fpGetXmpInfo() 145 fpGetXmpInfoFile() 146 fpInit() 147 fpInitWithLicenseData() 149 fpOpenStream() 152 fpOpenStreamEx2() 153 fpRefreshFilterKVOOP() 154 fpSetReplacementChar() 155 fpSetSrcCharSet() 156 fpSetTimeout() 157 fpShutdown() 158 KeyView (12.4) Page 7 of 346 Filter SDK C Programming Guide Chapter 9: Filter API Structures 159 KVFltInterfaceEx 160 ADDOCINFO 163 KV_CONFIG_Arg 164 KVFilterOutput 165 KVInputStream 166 KVMemoryStream 167 KVStructHead 168 KVSumInfoElemEx 169 KVSummaryInfoEx 170 KVXConfigInfo 171 KVXmpInfo 173 KVXmpInfoElems 174 Chapter 10: Enumerated Types 175 Introduction 175 Programming Guidelines 176 KVCredKeyType 176 KVErrorCode 177 KVErrorCodeEx 178 KVMetadataType 182 KVMetaNameType 183 KVSumInfoType 184 KVSumType 185 LPDF_DIRECTION 188 Appendixes 190 Appendix A: Supported Formats 191 Supported Formats 191 Archive Formats 192 Binary Format 195 Computer-Aided Design Formats 196 Database Formats 197 Desktop Publishing
Recommended publications
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • Energy-Efficient Design of the Secure Better Portable
    Energy-Efficient Design of the Secure Better Portable Graphics Compression Architecture for Trusted Image Communication in the IoT Umar Albalawi Saraju P. Mohanty Elias Kougianos Computer Science and Engineering Computer Science and Engineering Engineering Technology University of North Texas, USA. University of North Texas, USA. University of North Texas. USA. Email: [email protected] Email: [email protected] Email: [email protected] Abstract—Energy consumption has become a major concern it. On the other hand, researchers from the software field in portable applications. This paper proposes an energy-efficient investigate how the software itself and its different uses can design of the Secure Better Portable Graphics Compression influence energy consumption. An efficient software is capable (SBPG) Architecture. The architecture proposed in this paper is suitable for imaging in the Internet of Things (IoT) as the main of adapting to the requirements of everyday usage while saving concentration is on the energy efficiency. The novel contributions as much energy as possible. Software engineers contribute to of this paper are divided into two parts. One is the energy efficient improving energy consumption by designing frameworks and SBPG architecture, which offers encryption and watermarking, tools used in the process of energy metering and profiling [2]. a double layer protection to address most of the issues related to As a specific type of data, images can have a long life if privacy, security and digital rights management. The other novel contribution is the Secure Digital Camera integrated with the stored properly. However, images require a large storage space. SBPG architecture. The combination of these two gives the best The process of storing an image starts with its compression.
    [Show full text]
  • Narciso Martí Oliet Universidad Complutense De Madrid, 2018 Resumen
    BF y el asombroso mundo de los lenguajes esotéricos Narciso Martí Oliet Universidad Complutense de Madrid, 2018 Resumen Entre los miles de lenguajes de programación que existen, hay una especie que se ha hecho más visible en los últimos años, la de los lenguajes esotéricos. Se trata de lenguajes que no pretenden facilitarle la vida al programador o al menos facilitar la programación de ciertos sistemas, sino precisamente todo lo contrario; en la creación de muchos de ellos ha primado la diversión sobre la utilidad. En esta presentación veremos un panorama general de esta especie de lenguajes, prestando un poco más de atención a BF, uno de los lenguajes más famosos entre ellos. GitHub’s most popular PLs Ruby C++ C PHP Shell scripts Python TypeScript Java C# JavaScript PL Explorations (textbook) JavaScript Java CoffeeScript Clojure Lua Elm Python Erlang Ruby Go Julia Swift PL Explorations (more langs) Fortran C++ ML TypeScript COBOL Rust OCaml Dart Lisp CLU Haskell APL Algol Ada F# Prolog Simula C# Elixir K Smalltalk Scala PHP Io C Perl Hack Factor Lenguajes esotéricos Naturaleza ofuscada Utilidad dudosa Características poco comunes Prueba de concepto Según algunos APL, Lisp, Haskell, Oz (multiparadigma), JavaScript son buenos ejemplos. Lenguajes esotéricos Lenguaje de programación minimalista Sintaxis muy básica Alfabeto restringido Desafío para la creación e implementación Desafío para la programación Lenguajes esotéricos Cercanos a conceptos esenciales en computación Máquinas de Turing y máquinas de registros Turing computabilidad y
    [Show full text]
  • Improved Lossy Image Compression with Priming and Spatially Adaptive Bit Rates for Recurrent Networks
    Improved Lossy Image Compression with Priming and Spatially Adaptive Bit Rates for Recurrent Networks Nick Johnston, Damien Vincent, David Minnen, Michele Covell, Saurabh Singh, Troy Chinen, Sung Jin Hwang, Joel Shor, George Toderici {nickj, damienv, dminnen, covell, saurabhsingh, tchinen, sjhwang, joelshor, gtoderici} @google.com, Google Research Abstract formation from the current residual and combines it with context stored in the hidden state of the recurrent layers. By We propose a method for lossy image compression based saving the bits from the quantized bottleneck after each it- on recurrent, convolutional neural networks that outper- eration, the model generates a progressive encoding of the forms BPG (4:2:0), WebP, JPEG2000, and JPEG as mea- input image. sured by MS-SSIM. We introduce three improvements over Our method provides a significant increase in compres- previous research that lead to this state-of-the-art result us- sion performance over previous models due to three im- ing a single model. First, we modify the recurrent architec- provements. First, by “priming” the network, that is, run- ture to improve spatial diffusion, which allows the network ning several iterations before generating the binary codes to more effectively capture and propagate image informa- (in the encoder) or a reconstructed image (in the decoder), tion through the network’s hidden state. Second, in addition we expand the spatial context, which allows the network to lossless entropy coding, we use a spatially adaptive bit to represent more complex representations in early itera- allocation algorithm to more efficiently use the limited num- tions. Second, we add support for spatially adaptive bit rates ber of bits to encode visually complex image regions.
    [Show full text]
  • Macintosh Classic Manual Download Macintosh Classic Manual
    Macintosh Classic Manual Download Macintosh Classic Manual A.P. Van Meter joined Phase Linear in 1974, bringing with him his design experience working at Macintosh and University Sound. When Carver left Phase Linear in 1977, Van Meter became the Chief Design Engineer and the Engineering Manager. Under his direction the Series II models were designed and built, and introduced in 1978. IClicker Integrate is an IT Administrator toolkit that configures the campus LMS and iClicker Classic to directly communicate with each other. For educational institutions using iClicker Integrate, students register their remotes within the LMS resulting in fewer errors, and faculty seamlessly sync class rosters and polling data without ever.Manual installation of *.Xmp format presets and creative profiles: Unzip the presets if they’re zipped. Find the Develop Presets folder in Explorer (Windows) - Finder (Mac) by going to the Preferences > Presets tab and pressing the Show Lightroom Develop Presets button. You can also manually navigate to: So I need to fix a macintosh classic machine. The battery DESTROYED the logicboard, corroded all the resistors, traces, card edge, even the IC pins. I am working on the analog board which is definitely saveable but Ill need a new logic board. Does anyone happen to have one? Part # 820-0390-03 or 630-0390 retro classic bt limited edition set. $299.99. Retro compact keyboard (rck) quick view color. Kb540 antimicrobial (mac) $45.90. Km535 antimicrobial combo. Related Manuals for Macintosh SE. Desktop Macintosh Performa User Manual. Macintosh performa computer (196 pages). Desktop Macintosh Classic Service Source Apple Macintosh Classic II Boxed, Manuals, Mouse Vintage 68k 68030: Condition: For parts or not working.
    [Show full text]
  • IDOL Connector Framework Server 11.6 Administration Guide
    Connector Framework Server Software Version: 11.6 Administration Guide Document Release Date: February 2018 Software Release Date: February 2018 Administration Guide Legal notices Warranty The only warranties for Seattle SpinCo, Inc. and its subsidiaries ("Seattle") products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Seattle shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted rights legend Confidential computer software. Except as specifically indicated, valid license from Seattle required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright notice © Copyright 2018 EntIT Software LLC, a Micro Focus company Trademark notices Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To verify you are using the most recent edition of a document, go to https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result?doctype=online help. This site requires you to sign in with a Software Passport.
    [Show full text]
  • NEWS and ANNOUNCEMENTS NEWS and ANNOUNCEMENTS: Maintosh Operating System Upgrade
    . - JUNE 1987 VoLUME 8 NuMBER 8 • CONTENTS • NEWS AND ANNOUNCEMENTS NEWS AND ANNOUNCEMENTS: Maintosh Operating System Upgrade ...... 69 • MACINTOSH OPERATING SYSTEM UPGRADE IBM XT ..................................................... 75 Apple has released new versions of its system software for the Macin­ tosh. The new version (Finder 5.5) supports the new Mac II and SE. If REVIEWS: you use a Mac II, SE, or Plus, Apple recommends that you use this new PFS Professional File ............................... 70 software. Because the new software takes up more memory, if you have Write Now .................................................. 71 a 512K or enhanced 512K Mac, Apple recommends you continue to use Finder 3.3 and only upgrade your printer drivers. (If you have a SERVICES 128K Mac you should use these older versions: System 2.0, Finder I ACSS Contract Services Group ............... 73 4.1.) If you don't have the new software, you can make a free copy at SPCS Site Licenses ................................. 73 the Micro HelpLine. You only need to bring two 800K floppy disks: 1 one for the system files and one for the utilities. You can speed things MICROCOMPUTER SHORT COURSES up by initializing your disks before you come to the HelpLine. Since Summer 1987 ........................................... 75 different versions of the Mac require different versions of the operating I system files, in the table below we divided the Macs into two groups. The table includes version numbers and the amount of disk space the files need. The size of your System me may differ from ours since we The Microcomputer Newslener is published monthly by removed most fonts from System 4.1 and 3.2.
    [Show full text]
  • Comparison of JPEG's Competitors for Document Images
    Comparison of JPEG’s competitors for document images Mostafa Darwiche1, The-Anh Pham1 and Mathieu Delalandre1 1 Laboratoire d’Informatique, 64 Avenue Jean Portalis, 37200 Tours, France e-mail: fi[email protected] Abstract— In this work, we carry out a study on the per- in [6] concerns assessing quality of common image formats formance of potential JPEG’s competitors when applied to (e.g., JPEG, TIFF, and PNG) that relies on optical charac- document images. Many novel codecs, such as BPG, Mozjpeg, ter recognition (OCR) errors and peak signal to noise ratio WebP and JPEG-XR, have been recently introduced in order to substitute the standard JPEG. Nonetheless, there is a lack of (PSNR) metric. The authors in [3] compare the performance performance evaluation of these codecs, especially for a particular of different coding methods (JPEG, JPEG 2000, MRC) using category of document images. Therefore, this work makes an traditional PSNR metric applied to several document samples. attempt to provide a detailed and thorough analysis of the Since our target is to provide a study on document images, aforementioned JPEG’s competitors. To this aim, we first provide we then use a large dataset with different image resolutions, a review of the most famous codecs that have been considered as being JPEG replacements. Next, some experiments are performed compress them at very low bit-rate and after that evaluate the to study the behavior of these coding schemes. Finally, we extract output images using OCR accuracy. We also take into account main remarks and conclusions characterizing the performance the PSNR measure to serve as an additional quality metric.
    [Show full text]
  • Forcepoint DLP Supported File Formats and Size Limits
    Forcepoint DLP Supported File Formats and Size Limits Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 This article provides a list of the file formats that can be analyzed by Forcepoint DLP, file formats from which content and meta data can be extracted, and the file size limits for network, endpoint, and discovery functions. See: ● Supported File Formats ● File Size Limits © 2021 Forcepoint LLC Supported File Formats Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 The following tables lists the file formats supported by Forcepoint DLP. File formats are in alphabetical order by format group. ● Archive For mats, page 3 ● Backup Formats, page 7 ● Business Intelligence (BI) and Analysis Formats, page 8 ● Computer-Aided Design Formats, page 9 ● Cryptography Formats, page 12 ● Database Formats, page 14 ● Desktop publishing formats, page 16 ● eBook/Audio book formats, page 17 ● Executable formats, page 18 ● Font formats, page 20 ● Graphics formats - general, page 21 ● Graphics formats - vector graphics, page 26 ● Library formats, page 29 ● Log formats, page 30 ● Mail formats, page 31 ● Multimedia formats, page 32 ● Object formats, page 37 ● Presentation formats, page 38 ● Project management formats, page 40 ● Spreadsheet formats, page 41 ● Text and markup formats, page 43 ● Word processing formats, page 45 ● Miscellaneous formats, page 53 Supported file formats are added and updated frequently. Key to support tables Symbol Description Y The format is supported N The format is not supported P Partial metadata
    [Show full text]
  • Next and Open Systems Standards Next and Open Systems Standards
    ® NeXT and Open Systems Standards NeXT and Open Systems Standards Standards have become the watchword of the corporate technology manager. And rightly so, because multivendor computing is now the rule. To survive, a computer company must ensure that its products connect and communicate easily with other equipment. With this in mind, NeXT focuses on adherence to industry standards and multivendor con- nectivity. From the start, we built the philosophy of compatibility into all of our products. And we had an advantage. Since the NeXT™ Computer was designed more recently than the products of other major competitors, we saw what standards were actually accepted and which ones truly provided user value. We then incorporated these accepted tech- nologies into NeXT systems. Our view is simple: • Use standards whenever possible. • Invent new technologies when users are dissatisfied with current industry offerings. • Make our new technologies coexist in a heterogeneous world. This document builds a structured model of where key industry standards are required and discusses where they are incorporated into all NeXT systems. We’ll begin with the operating system, the subject of unrelenting UNIX® wars between groups like the Open Software Foundation (OSF) and UNIX International (UI). From there, we’ll highlight the additional standards above the operating system that affect users every day. Before we construct the architectural model we’ll use throughout this document, we also want you to know our biases: The ultimate standards-based computer would be a perfect clone of whatever computer system had the largest market share. This product would bring no surprises. Of course it would also provide no added value to its users.
    [Show full text]
  • Forensic Considerations for the High Efficiency Image File Format (HEIF)
    Author’s version DOI: 10.1109/CyberSecurity49315.2020.9138890 ©2020 IEEE IEEE International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2020) Forensic Considerations for the High Efficiency Image File Format (HEIF) Sean McKeown Gordon Russell School of Computing School of Computing Edinburgh Napier University Edinburgh Napier University Edinburgh, Scotland Edinburgh, Scotland [email protected] [email protected] Abstract—The High Efficiency File Format (HEIF) was the relatively recent adoption of the High Efficiency Image File adopted by Apple in 2017 as their favoured means of capturing Format (HEIF) by Apple in 2017, beginning with the iPhone 7, images from their camera application, with Android devices such 6th generation iPad, and Mac computers running OS X High as the Galaxy S10 providing support more recently. The format is positioned to replace JPEG as the de facto image compression Sierra (10.13) and above. While claims of higher encoding file type, touting many modern features and better compression efficiency have done little to sway users in the past, Apple’s ratios over the aging standard. However, while millions of devices hardware and software support across millions of devices across the world are already able to produce HEIF files, digital potentially allows the HEIF format to eventually replace JPEG forensics research has not given the format much attention. in mainstream use. Contemporary Apple devices save images As HEIF is a complex container format, much different from traditional still picture formats, this leaves forensics practitioners from the camera directly in the HEIF format by default. This exposed to risks of potentially mishandling evidence.
    [Show full text]
  • Mav1988 Volume 4, Number 7 ,J CONTENTS NEWS and ANNOUNCEMENTS
    f'Y\1\tJ MAv1988 VoLUME 4, NuMBER 7 ,j CONTENTS NEWS AND ANNOUNCEMENTS NEWS AND ANNOUNCEMENTS Campus Network Considerations ............. 73 • CAMPUS NETWORK CONSIDERATIONS l If you are considering installing a Local Area Network (LAN) or REVIEWS connecting to the University's campus-wide Ethernet backbone net­ l Microsoft Mail ........................................... 74 work, there are several issues that you need to keep in mind. (Two I Apple 40SC Tape Backup ........................ 76 reasons for connecting microcomputers and workstations to the campus Lotus Measure ......................................... n network are: provide very high speed communications with other j computers on campus; use the campus network to link your departmen­ CoLUMNS tal LANs together.) Since the campus-wide network is shared by people Ma Micro Notes all over the University, there are some limitations on what you can File Maker Plus 2.1 Upgrade .................. 79 expect to do over the network. In other words, there are some standards I I ti LaserWrtter and Legal Size Paper .... 79 for how computers communicate across the campus network. Whether I Site License Forum .................................. 80 you are considering connecting either a single machine or a LAN to the Instructional Software Forums ................. 80 campus network, you need to be aware of what the standards are and Book Center Notes how they affect what you can expect to do over the University's back­ Price Changes· HP LaserJet Fonts ...... 81 bone network. Laser Printer Toner cartridges .............. 81 Apple -+ Claris Software ....................... 81 Perhaps the most important standard you should be aware of is the I HP DeskJet Ink Cartridges .................... 81 network protocols that are supported over the network.
    [Show full text]