Design Studio User Guide Release 2.1 (Service Pack)

Total Page:16

File Type:pdf, Size:1020Kb

Design Studio User Guide Release 2.1 (Service Pack) Design Studio User Guide Release 2.1 (Service Pack) 16-300271 Issue 2.1 April 2006 Copyright 2004-2006, Avaya Inc. Such intrusions may be either to/through synchronous (time- All Rights Reserved multiplexed and/or circuit-based) or asynchronous (character-, message-, or packet-based) equipment or interfaces for reasons of: Notice • Utilization (of capabilities special to the accessed equipment) Every effort was made to ensure that the information in this document • Theft (such as, of intellectual property, financial assets, or toll was complete and accurate at the time of printing. However, facility access) information is subject to change. • Eavesdropping (privacy invasions to humans) Warranty • Mischief (troubling, but apparently innocuous, tampering) • Harm (such as harmful tampering, data loss or alteration, Avaya Inc. provides a limited warranty on this product. Refer to your regardless of motive or intent) sales agreement to establish the terms of the limited warranty. In Be aware that there may be a risk of unauthorized intrusions addition, Avaya’s standard warranty language as well as information associated with your system and/or its networked equipment. Also regarding support for this product, while under warranty, is available through the following Web site: http://www.avaya.com/support. realize that, if such an intrusion should occur, it could result in a variety of losses to your company (including but not limited to, Trademarks human/data privacy, intellectual property, material assets, financial DEFINITY is a registered trademark of Avaya, Inc. MultiVantage is a resources, labor costs, and/or legal costs). trademark of Avaya, Inc. Windows, Windows 2000, and Windows NT Responsibility for Your Company’s Telecommunications Security are trademarks or registered trademarks of Microsoft Corporation. The final responsibility for securing both this system and its Preventing Toll Fraud networked equipment rests with you - Avaya’s customer system administrator, your telecommunications peers, and your managers. “Toll fraud” is the unauthorized use of your telecommunications system by an unauthorized party (for example, a person who is not a Base the fulfillment of your responsibility on acquired knowledge and resources from a variety of sources including but not limited to: corporate employee, agent, subcontractor, or is not working on your company's behalf). Be aware that there may be a risk of toll fraud • Installation documents associated with your system and that, if toll fraud occurs, it can result • System administration documents in substantial additional charges for your telecommunications • Security documents services. • Hardware-/software-based security tools • Shared information between you and your peers Avaya Fraud Intervention • Telecommunications security experts If you suspect that you are being victimized by toll fraud and you need To prevent intrusions to your telecommunications equipment, you and technical assistance or support, in the United States and Canada, call your peers should carefully program and configure: the Technical Service Center's Toll Fraud Intervention Hotline at • Your Avaya-provided telecommunications systems and their 1-800-643-2353. interfaces Disclaimer • Your Avaya-provided software applications, as well as their underlying hardware/software platforms and interfaces Avaya is not responsible for any modifications, additions or deletions • Any other equipment networked to your Avaya products to the original published version of this documentation unless such modifications, additions or deletions were performed by Avaya. TCP/IP Facilities Customer and/or End User agree to indemnify and hold harmless Customers may experience differences in product performance, Avaya, Avaya's agents, servants and employees against all claims, reliability and security depending upon network configurations/design lawsuits, demands and judgments arising out of, or in connection with, and topologies, even when the product performs as warranted. subsequent modifications, additions or deletions to this documentation to the extent made by the Customer or End User. Standards Compliance How to Get Help Avaya Inc. is not responsible for any radio or television interference caused by unauthorized modifications of this equipment or the For additional support telephone numbers, go to the Avaya support substitution or attachment of connecting cables and equipment other Web site: http://www.avaya.com/support. If you are: than those specified by Avaya Inc. The correction of interference • Within the United States, click the Escalation Management link. caused by such unauthorized modifications, substitution or attachment Then click the appropriate link for the type of support you need. will be the responsibility of the user. Pursuant to Part 15 of the Federal • Outside the United States, click the Escalation Management link. Communications Commission (FCC) Rules, the user is cautioned that Then click the International Services link that includes telephone changes or modifications not expressly approved by Avaya Inc. could numbers for the international Centers of Excellence. void the user’s authority to operate this equipment. Providing Telecommunications Security To order copies of this and other documents: Telecommunications security (of voice, data, and/or video Call: Avaya Publications Center communications) is the prevention of any type of intrusion to (that is, Voice 1.800.457.1235 or 1.207.866.6701 either unauthorized or malicious access to or use of) your company's FAX 1.800.457.1764 or 1.207.626.7269 telecommunications equipment by some party. Write: Globalware Solutions Your company's “telecommunications equipment” includes both this 200 Ward Hill Avenue Avaya product and any other voice/data/video equipment that could be Haverhill, MA 01835 USA accessed via this Avaya product (that is, “networked equipment”). Attention: Avaya Account Management An “outside party” is anyone who is not a corporate employee, agent, E-mail: [email protected] subcontractor, or is not working on your company's behalf. Whereas, a For the most current versions of documentation, go to the Avaya “malicious party” is anyone (including someone who may be support Web site: http://www.avaya.com/support otherwise authorized) who accesses your telecommunications equipment with either malicious or mischievous intent. Contents Preface ix Audience ix Organization ix Conventions x Related Documentation xi CHAPTER 1 Overview 1 Introduction 1 Design Studio Features 3 Understanding How the Application Gateway Works 5 Supported Formats 8 Understanding Microbrowser Limitations 11 CHAPTER 2 Design Studio Administration 13 Starting Design Studio 13 Changing your Password 14 Connecting to a Different Application Gateway 14 Configuring Device Definitions 15 Changing a Device Definition 22 Adding a Device Definition 23 Importing Device Definitions 26 Installing the Openwave Mobile Browser Simulator 26 Installing the Go.Web Simulator 28 CHAPTER 3 Design Studio Basics 31 Design Studio Concepts 31 Transformation Rules 31 Configuration and Project Files 32 XHTML Element Hierarchy 33 Design Studio User Guide iii Contents Navigating the Design Studio Window 35 Using the Project Tree 36 Viewing Page and Rule Information 37 Using the View Tabs 38 Finding Commands 39 Finding Text in the XHTML Source View 39 Design Studio Workflow 40 Working with Configuration Files and Projects 41 Creating a Configuration File and HTML Project 41 Opening and Saving a Configuration File 43 Adding an HTML Project to a Configuration File 44 Deleting a Project 44 Adding a Page to an HTML Project 45 Handling Page Redirects 46 Renaming a Page 47 Displaying Page Information 47 Deleting a Page 48 CHAPTER 4 Transformation Basics 49 Identifying a Page 49 Identifying a Page by Element Text 51 Identifying a Page by URL 54 Using an Identifier Rule for Multiple Pages 56 Creating Transformation Rules 58 Editing Transformation Rules 65 Copying Rules from One Device to Another 66 Performing Basic Transformations 67 Selecting Content 67 Clipping Content 71 Ignoring Content 74 Modifying Content 77 Inserting Content 82 Well-Formed XML 86 Moving an Element Tag 87 iv Design Studio User Guide Contents Working with Conflicting or Dead Rules 90 Resolving Conflicting Rules 90 Evaluating Dead Rules 92 Applying Rules to Several Elements 93 Introduction 93 Applying Rules Based on Element Name or Text 96 Applying Rules Based on Depth 101 Applying Rules Based on Position 102 How the Depth and Position Settings Interact 104 Example: Applying Rules to Elements that Change Positions 105 Example: Applying a Rule to a Range of Positions 106 Example: Applying a Rule to Several Nested Tables 107 Example: Clipping Links to Binary Data Files Across a Project 108 Using a Relative Path to Specify a Rule Location 109 Applying Rules Based on Element Attribute Values 111 Example: Applying a Rule to All Occurrences of an Element with a Specified Attribute 112 Applying the Move Rule to Several Elements 112 CHAPTER 5 Working with Pages and Elements 115 Working with Pages 115 Transforming Template-Based Pages 116 Transforming Pages Using a Default Set of Transformation Rules 117 Dividing a Web Page into Several Pages 118 Transforming Query and Results Pages 124 Working with Dynamically Generated Pages 127 Specifying a Rule Location on a Dynamically Generated Page 128 Example: Applying Rules to Dynamically Generated Content 129 Working with Frames and Windows 131 Guidelines for Transforming Frames and Window Content
Recommended publications
  • California State University, Northridge
    CALIFORNIA STATE UNIVERSITY, NORTHRIDGE ON-LINE UNDERGRADUATE ADVISEMENT SYSTEM FOR COMPUTER SCIENCE FACULTY A thesis submitted in partial satisfaction of the requirements for the degree of Master of Science in Computer Science by Robert Oberwager January, 1984 The Thesis of Robert Oberwager is approved: Steven Stepanek John Swanson Morteza Anvari, Chair California State University, Northridge ii ACKNOWLEDGEMENT This acknowledgement is to thank my committee members for their kindness, patience, under­ standing and assistance in getting the final product done. iii TABLE OF CONTENTS ACKNOWLEDGEMENT • • • • • • iii LIST OF TABLES AND FIGURES vi Chapter 1 INTRODUCTION AND BACKGROUND • 1 1.1 Introduction • • • • • • 1 1.2 Background • • • • 1 2 ANALYSIS OF PROBLEM 6 2.1 Review of Current Procedures 6 2.2 User Requirements • • • • • 10 2.2.1 User Demands of System • • • • • 10 2.2.2 System Usage • • • 11 2.2.3 Communication with Other Systems . • . • • • • • • • • • 11 2.2.4 User Technical Background and Training • • • • 12 2.2.5 Type of VDT Terminal and Speed to Use • • • • • • . • . 12 2.2.6 Choice of Computer System for Implementation ••••• 13 2.2.7 Programming Language to be Used • • • • • • • • • • • 14 2.2.8 Expected User Load, Port Availability, and Reponse Time . 15 2.2.9 Access Limitations and Privacy Concerns • • • • • • 16 2.2.10 System Ownership and Operational Control • • • • • • 18 2.2.11 Software Support, Maintenance and On-Going Development • • • • 19 3 DESIGN SPECIFICATIONS • • • 22 3.1 Menu Driven Systems • • • • . • • • 22 3.2 Output Considerations • • • • • • . 23 3.3 Input Considerations • • . • . • 24 iv 3.4 F.ile Design . 25 3.4.1 Disk-Student-Master File . • • • 27 3.4.2 Course-Master-Disk File 30 3.4.3 Advise-Student-History File 31 3.4.4 Advise-student-Master File • 33 3.4.5 Advise-Course-Master File • • • 35 3.4.6 Advise-Department-Student File • 37 3.4.7 Advise-Department-Faculty File • 39 3.4.8 Advise-Transfer File • .
    [Show full text]
  • Markup Languages & HTML
    INTERNET & WEB APPLICATION DEVELOPMENT SWE 444 Fall Semester 2008-2009 (081) Module 2: Markup Languages & HTML (()II) Dr. El-Sayed El-Alfy Computer Science Department King Fahd University of Petroleum and Minerals [email protected] Objectives/Outline y Objectives y Outline ◦ … ◦ … ◦ Create pages that have ◦ HTML Elements frames x Frames ◦ Create pages that have x Forms forms to collect user inputs x Head Element ◦ Use meta data to improve x Meta data search engine results and to x <!DOCTYPE> tag redirect a user ◦ Use the <!DOCTYPE> to declare the DTD KFUPM-081© Dr. El-Alfy 1 Frames ¾ Allow the browser window to be divided into an independent set of frames ¾ More than one HTML document can be displayed in the same browser window ¾ Frequently used to add a menu bar to a web site where the constant back and forth clicking would become tedious in a single page. ¾ Allow easier navigation under some circumstances ¾ The designer can divide the window horizontally and vertically in various ways, e.g. ¾ The disadvantages of using frames are: ◦ The web developer must keep track of many HTML documents ◦ It is difficult to print/bookmark the entire page KFUPM-081© Dr. El-Alfy SWE 444 Internet & Web Application Development 2.3 Frames (cont.) ¾ The <frameset> tag ◦ Defines how to divide the window into frames ◦ Each frameset defines a set of rows or columns ◦ The values of the rows/col umns iidindicate the amount of screen area each row/column will occupy ¾ The <frame> tag ◦ Defines what HTML document to put into each frame ¾ Useful tips ◦ If a frame has visible borders, the user can resize it by dragging the border ◦ To prevent a user from resizing a frame, add noresize="noresize" to the <frame> tag ◦ Add the <noframes> tag for browsers that do not support frames KFUPM-081© Dr.
    [Show full text]
  • 101 Ways to Promote Your
    Increase Your Real Estate Sales Online! 101 Ways to Promote Your Real Estate Web Site Web Real Estate Your to Promote Ways 101 An increasing number of real estate buyers and sellers are making This Book and Web Site 101 Ways to Promote Your the Web their first destination. So now is the time to stake your Will Help You: claim in the Internet land rush with an effective and well-promoted • Draw more buyers and sellers to your Web site. Getting potential customers to visit Web site rather your Web site than those of your competitors can mean thousands of additional • Optimize your site for real estate-specific search engines commission dollars in your pocket every month. • Learn what techniques work best in the “Great stuff! online real estate arena Real Esta t e Practical, powerful • Make effective marketing use of In 101 Ways to Promote Your Real Estate Web Site, widely tips on growing newsgroups, mail lists, meta indexes, sales from your Web recognized expert Susan Sweeney provides proven promotion e-zines, Web rings, cybermalls, site. Get it!” techniques that help you draw buyers and sellers to your real estate podcasting, blogs, wikis, mobile, autoresponders, banner exchange Web site. If you deal in either residential or commercial real estate programs, and more — Randy Gage, author of as an agent, broker, or firm, this book (and it’s companion Web site) • Leverage the power of e-mail in real Prosperity Mind estate sales Web Site is exactly what you need. Bottom line, it will help you draw more • Use offline promotion to increase buyers and sellers to your Web site and increase your earnings.
    [Show full text]
  • Extending Expression Web with Add-Ons
    APPENDIX Extending Expression Web with Add-Ons Any good web editor must be extensible, because the Web is constantly changing. This capability is one of the strongest assets of Expression Web; it means that third parties can add new features that are easy to use inside of Expression Web. You don’t have to wait for Microsoft to release a new version to get more features. I am talking not about code snippets, like the one we created in Chapter 2, but about fea- tures that make it easy to add e-commerce capabilities using PayPal buttons or a shopping cart, improve your search engine ranking using Google Sitemaps, or add Flash banners and interactivity without becoming a programmer or a search engine specialist. Some of these add-ons are commercial applications that charge a fee, and others are created by someone who sees a need and creates a free add-on. At the time of this writing, there were over a dozen add-ons available for download and more actively under develop- ment. A current list is available at http://foundationsofexpressionweb.com/exercises/ appendix. Add-ons are usually easy to install and use. Once you have found an extension for Expression Web that offers you the ability to extend what you can do, download the add-on, and follow the extension maker’s instructions on how to install it. Most add-ons will have an installer that creates either a toolbar or an entry in one of the menus. Adding PayPal Buttons The first add-on I will show you creates a menu item.
    [Show full text]
  • GP-PRO/PBIII for Windows Ver.6.3 Operation Manual
    PREFACE PREFACE Thank you for purchasing the GP Screen Editor Software, "GP-PRO/PB III for Windows Ver. 6.3" for use with Pro-face’s GP series programmable operator interfaces. Please read this manual carefully in order to use this software properly, and be sure to keep this manual handy for future reference. NOTES (1) The copyrights to all programs and manuals included in the GP-PRO/PB III for Windows Ver. 6.3 (hereinafter referred to as "this product") are reserved by the Digital Electronics Corporation. Digital grants the use of this product to its users as described in the "Software Operating License Conditions" documentation, included with this product's CD-ROM. Any actions violating the above-mentioned conditions are prohibited by both Japanese and foreign regulations. (2) The contents of this manual have been thoroughly inspected. However, if you should find any errors or omissions in this manual, please inform your local GP representative of your findings. (3) Regardless of article (2), the Digital Electronics Corporation shall not be held responsible for any damages or third party claims resulting from the use of this product. (4) Differences may occur between the descriptions found in this manual and the actual functioning of this product. Therefore, the latest information on this product is provided in data files (i.e. Readme.txt files, etc. ) and in separate documents. Please consult these sources as well as this manual prior to using the product. (5) Even though the information contained in and displayed by this product may be related to intangible or intellectual properties of the Digital Electronics Corporation or third parties, the Digital Electronics Corporation shall not warrant or grant the use of said properties to any users and/or other third parties.
    [Show full text]
  • Check Seo of Article
    Check Seo Of Article Forensic Hamilton girdle some viridescence and values his Latinists so delayingly! Stark-naked Westbrook never invaginatingdisguisings so foreknown etymologically ungainly. or muring any roomettes nauseously. Dolomitic Goddard autoclave, his shadoofs In your post is a drop in? Some of your posts are some other domains option, perform the top serp features cover it. We check out of seo article by nightwatch search engines but keep google only indexes and seos and match interested. As a article, of articles are unlimited focus of those pages? Google had low content in enterprise search index due to querystring parameters that shadow were passing along god the URL. SEO checklist on the internet. On page is kindergarten a few since many factors that search engines looks at are they build their index. How do I know that a particular page can be indexed? Irina Weber is Brand Manager at SE Ranking. It makes you frustrated when faculty receive affection with errors. This category only includes cookies that ensures basic functionalities and security features of the website. Google SEO Ranking Checker Our Free Google SEO Ranking Tool helps your find you top traffic driving keywords Enter a domain known to identify high. This makes it easy for readers to share your content continuously as they are reading down the page. This ensures that a wider audience will enjoy great content and acquit the headline but it shows up in Google results pages. Thanks for seo article title tag, checking tool can conduct readability score to click the articles are highly useful was of.
    [Show full text]
  • CSS Lecture 2
    ΠΡΟΓΡΑΜΜΑΤΙΣΜΟΣ ∆ΙΑ∆ΙΚΤΥΟΥ HTLM – CSS Lecture 2 ver. 2.03 Jan 2011 ∆ρ. Γεώργιος Φ. Φραγκούλης ΤΕΙ ∆υτ. Μακεδονίας - 1 Μεταπτυχιακό Τμήμα The HTML head Element The head element is a container for all the head elements. Elements inside <head> can include scripts, instruct the browser where to find style sheets, provide meta information, and more. The following tags can be added to the head section: <title>, <base>, <link>, <meta>, <script>, and <style>. ΤΕΙ ∆υτ. Μακεδονίας - 2 Μεταπτυχιακό Τμήμα The HTML title Element The <title> tag defines the title of the document. The title element is required in all HTML documents. The title element: – defines a title in the browser toolbar – provides a title for the page when it is added to favorites – displays a title for the page in search-engine results ΤΕΙ ∆υτ. Μακεδονίας - 3 Μεταπτυχιακό Τμήμα Example <html> <head> <title>Title of the document</title> </head> <body> The content of the document...... </body> </html> ΤΕΙ ∆υτ. Μακεδονίας - 4 Μεταπτυχιακό Τμήμα The HTML base Element The <base> tag specifies a default address or a default target for all links on a page: <head> <base href="http://www.mypages.com/images/" /> <base target="_blank" /> </head> ΤΕΙ ∆υτ. Μακεδονίας - 5 Μεταπτυχιακό Τμήμα The HTML link Element The <link> tag defines the relationship between a document and an external resource. The <link> tag is most used to link to style sheets: <head> <link rel="stylesheet" type="text/css" href="mystyle.css" /> </head> ΤΕΙ ∆υτ. Μακεδονίας - 6 Μεταπτυχιακό Τμήμα The HTML style Element The <style> tag is used to define style information for an HTML document.
    [Show full text]
  • The Jail Information System (JIS)
    If you have issues--~---~-------~--~-- viewing or accessing this file contact us at NCJRS.gov. .. U. S. Department or Justice Law Enforcement Assistance Administrl!otion National Criminal Justice Reference Service ---------------~ nCJrs \ - The Jail Information This microfiche was produced from documents received for inclusion in the NCJRS data base. Since NCJRS cannot exercise control over the physical condition of the documents submitted, ...I System (JIS) the individual frame quality will vary. The resolution chart on this frame may be used to evaluate the document quality. ,,-, ~.'" An Automated Booking, ~.. Inmate Accounting, and 1.0 '. 0 Jail Population Management 1.1 Irtformation System 111111.25 111111.4 tlill /.6 '.i - ~;' , , , MICROCOPY RESOLUTION TEST CHART 1 NATIONAL BUREAU OF STANDARDS-1963-A Microfilming procedures us~d to create this fiche comply with the standards set forth in 41CFR 101-11.504. " ' Points of view or 0Pinions stated in this document are those of the aUihor(s) and do not represent the official (.- "'~. '''.•.. ; .•~.' ,...-. position or policies of the U. S. Department of Justice. .- - j 11/15/82 1 National Institute of Justice '\ United States Department of Justicle 7 Washington, D. C. 20531 ",. I ",'i-'I > __._" ... ~. t ... , i . , ,J" . i ·THE JAIL ·INFORMATION SYSTEM • (JIS) . '. Ii AN AUTOMATED BOOKING, INMATE ACCOUNTING, /. AND ,JAIL POPULATION MANAGEMENT INFORMATION SYSTEM Copy right (0 1982 eo , 0,.' SYSTEM DESCRIPTION DOCUMENT March 1982 Prepared By: JEROME R. BUSH ':"-.'r J IS Proiect Director U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the AMERICAN JUSTICE INSTIJUTEfF~t~<~':'" -. ". : . ': person or organization originating it.
    [Show full text]
  • Getting Back on the Trail, Combating Information Overload with Topic Maps Thesis for the Cand
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NORA - Norwegian Open Research Archives UNIVERSITY OF OSLO Faculty of Humanities Department of Linguistics and Scandinavian Studies (Humanistic Informatics) Getting back on the trail, combating information overload with Topic Maps Thesis for the Cand. Philol. degree Rolf B. Guescini May 8, 2006 Contents 1 Historical overview and contributions 1 1.1 Vannevar Bush . 1 1.1.1 Memex . 2 1.1.2 Sequential vs. Associative . 2 1.1.3 From Memex to hypertext . 3 1.2 Theodore Nelson . 4 1.2.1 Literary Machines . 4 1.2.2 Project XANADU . 5 1.2.3 Embedded markup . 6 1.2.4 Other visions and projects on the way . 8 1.3 Douglas Engelbart . 12 1.4 Hypertext before the World Wide Web . 14 1.4.1 Modularity, juxtaposing, and editing . 14 1.4.2 Hierarchical structure vs. non-hierarchical link structures . 15 1.4.3 Filtering of information . 16 1.4.4 Extended link functionality . 16 1.4.5 Paths . 17 1.4.6 High level info to combat overload . 18 1.4.7 Tim Berners-Lee and the World Wide Web . 18 1.4.8 Development of the World Wide Web . 19 1.4.9 WWW becomes commercial . 20 1.4.10 The World Wide Web Consortium . 21 2 The World Wide Web and HTML: What is wrong with hypertext at this point? 23 2.1 The hyper in hypertext . 24 2.1.1 Associative links . 25 2.1.2 Link directionality . 26 2.1.3 Broken links .
    [Show full text]
  • Analysis of Web Spam for Non-English Content: Toward More Effective Language- Based Classifiers
    RESEARCH ARTICLE Analysis of Web Spam for Non-English Content: Toward More Effective Language- Based Classifiers Mansour Alsaleh*, Abdulrahman Alarifi King Abdulaziz City for Science and Technology (KACST), Riyadh, Saudi Arabia * [email protected] a11111 Abstract Web spammers aim to obtain higher ranks for their web pages by including spam contents that deceive search engines in order to include their pages in search results even when they are not related to the search terms. Search engines continue to develop new web spam detection mechanisms, but spammers also aim to improve their tools to evade detection. In OPEN ACCESS this study, we first explore the effect of the page language on spam detection features and we demonstrate how the best set of detection features varies according to the page lan- Citation: Alsaleh M, Alarifi A (2016) Analysis of Web Spam for Non-English Content: Toward More guage. We also study the performance of Google Penguin, a newly developed anti-web Effective Language-Based Classifiers. PLoS ONE spamming technique for their search engine. Using spam pages in Arabic as a case study, 11(11): e0164383. doi:10.1371/journal. we show that unlike similar English pages, Google anti-spamming techniques are ineffective pone.0164383 against a high proportion of Arabic spam pages. We then explore multiple detection features Editor: Muhammad Khurram Khan, King Saud for spam pages to identify an appropriate set of features that yields a high detection accu- University, SAUDI ARABIA racy compared with the integrated Google Penguin technique. In order to build and evaluate Received: June 3, 2016 our classifier, as well as to help researchers to conduct consistent measurement studies, we Accepted: September 23, 2016 collected and manually labeled a corpus of Arabic web pages, including both benign and Published: November 17, 2016 spam pages.
    [Show full text]
  • Creating HTML Meta-Tags Using the Dublin Core Element Set Abstract Creating HTML Meta-Tags with the Dublin Core Element Set Over
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by E-LIS Creating HTML Meta-tags Using the Dublin Core Element Set Christopher Sean Cordes Assistant Professor Instructional Technology Librarian Parks Library Iowa State University Abstract The breadth and scope of information available online and through intranets is making the standardization and use of metadata to identify records imperative if not mandated. Some measure of searchability is provided by the html meta tag<meta>. But the tag has limited potential for describing complex documents. The Dublin Core Initiative group has developed metadata standards that support a broad range of purposes and business models,” most notably the Dublin Core Element Set. The set is fairly easy to learn but must be combined with HTML if to provide metadata for referencing by a web crawler or search engine. This paper will outline the steps needed to create HTML metadata using the Dublin Core Element Set, and some of the benefits of doing so. Keywords: Dublin Core Element Set, HTML, Metadata, Meta tag, Search engine Creating HTML Meta-tags with the Dublin Core Element Set Overview The breadth and scope of information available online and through intranets is making the standardization and use of metadata to identify records imperative if not mandated. There is a small degree of metadata control built in to the HTML language in the meta <meta> element. However this tag has limited potential for describing complex documents. The Dublin Core Initiative a group working towards “the development of interoperable online metadata standards that support a broad range of purposes and business models” developed an element set for building flexible control records for online documents.
    [Show full text]
  • Mstusm Hiiil »Rw Plow Wtth a Moot Btadztobta* Sepd •Ached to One of the Towmrupt Trocka
    , -••J^-—-•jfo^'-.Tr ~~- KT. 74, l«6 FIVE ^ ^^—^^——— =———= —ea^— ^. M TOWBHP [ ^^ ~^" • • • ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^a^^^^^^^^^^^^^T^^^^^^^^B^^^ee^^^^^f^^^awaw^^^e^^^^awgiej ^pa^vei PREPARES FOR SMQW DIB In ordnr to mstusm HiIIL »rw plow wtth a Moot btadZtobTa* Sepd •ached to one of the towmrupt trocka. That win give Cranlord low plows to put!Mo serrka. An adOHooal three RETOdHNSONC, Ptowa can be uead wtth hirsd trucks I. js*e then ahouldb. an uoaauan, heavy IWth<rfCWi»ttoBe( ikesttssnt to Onion f»tt«fsnow, according to Township i.ot tht Oaneral AS- •nstossr Thomaa J, MeUughlln. The k. Craaloni fhwrlm IHIiiiEjfci Serrfc** Tonight, by th» streat department win try out a motor- f»mls«iht Fistrisw Tns,rm»w llawlaTt drhwn akknalk .play, constructed to Iscaawattareqaeit- break a path of about two and a half "Miniih"toB«Sur>tS«ndayfwltl>t tart. It wffl be punhaaed tf K provta i tor the period of successful In Mount*, the machme The Christmai story will be retold in tons and sermon twa» learned Tuesday can be wed to drive a lawn mower. tonight, tomorrow and on Sunday in Cranford churches/ Spe- cial services, with festive musk, will be held- in all local 11* (ranted to eon. churchea commemorating the birth of Christ. Many churches will usher in Christmas with midnight employes and SO BASKETS TO BE vert to services tonight, others will hold candlelight service! at 6 a. m,t t scale on January 31 tomorrow. One of the highlight* of the musical programs tai DBTMBOIB TODAY be prevented during the week-end will be Handel's immortal [Ja» telegrams, It tt for the work, "The Messiah," which will be sung in the Pint Pres- r salartss In Ita ownNeedy of Town to Be Cared byterian Church at 8 p.
    [Show full text]