IBM Unica Campaign Version 8 Release 5 March 16, 2012

Total Page:16

File Type:pdf, Size:1020Kb

IBM Unica Campaign Version 8 Release 5 March 16, 2012 IBM Unica Campaign Version 8 Release 5 March 16, 2012 Administrator's Guide Note Before using this information and the product it supports, read the information in “Notices” on page 377. This edition applies to version 8, release 5, modification 0 of IBM Unica Campaign (product number 5725-D22) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1998, 2011. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Contacting IBM Unica technical support ix To map or re-map a system table ......26 To unmap a system table .........27 Chapter 1. Administration in IBM Unica To view system table contents .......27 Campaign ..............1 Working with user tables ..........28 About working with user tables ......28 Campaign-related administrative tasks in IBM Unica Guidelines for mapping user tables .....29 Marketing ...............1 To access data sources from within a flowchart 29 Working with user tables while editing a Chapter 2. Managing security in IBM flowchart ..............29 Unica Campaign ...........3 Working with user tables from the Campaign About security policies ...........3 Settings page .............30 The global security policy .........3 Working with data dictionaries ........40 How Campaign evaluates permissions.....4 To open a data dictionary.........40 Using the Owner and Folder Owner roles . 4 To apply changes to a data dictionary ....40 Guidelines for designing security policies....5 When to use a data dictionary .......40 Security scenarios.............5 Data dictionary syntax..........40 Scenario 1: Company with a single division . 5 To manually create a new data dictionary . 41 Scenario 2: Company with multiple separate Working with table catalogs .........41 divisions...............7 To access table catalogs .........41 Scenario 3: Restricted access within a division . 9 To open a table catalog .........42 Implementing security policies ........10 To create a table catalog .........42 To create a security policy ........10 To load a stored table catalog .......43 To delete a security policy ........10 Deleting table catalogs..........43 Assigning security policies to folders or objects 11 To update pre-computed profiles for tables in a About administrative permissions in Campaign . 11 table catalog .............44 To configure report folder permissions ....12 To define a data folder for a table catalog . 44 Reference: Administrative permissions in Campaign ..............12 Chapter 4. Customizing campaigns . 47 Windows impersonation administration .....16 Custom campaign attributes .........47 What is Windows impersonation? ......16 Custom cell attributes ...........47 Why use Windows impersonation? .....16 Custom offer attributes ..........48 What is the relationship between Campaign users What is a static attribute?.........48 and Windows users? ..........16 What is a hidden static attribute? ......48 The Windows impersonation group .....17 What is a parameterized attribute? .....48 Windows impersonation and logging into IBM Select box attributes and offer templates ....49 Unica Marketing............17 Working with custom attributes .......49 Working with Windows impersonation ....17 To add a custom attribute ........49 About support of Proxy Server Authentication. 18 To modify a custom attribute .......50 To set authentication credentials for a virtual data Custom initiatives ............52 source named proxy ..........19 To add an initiative...........52 Custom products ............52 Chapter 3. Database table To add a product ...........52 administration ...........21 Table administration concepts ........21 Chapter 5. Offer template What are system tables? .........21 administration ...........53 What are user tables? ..........21 What is an offer? ............53 About mapping tables ..........22 What is an offer template? .........53 What is a data dictionary? ........23 Offer templates and security.........54 What is a table catalog? .........23 Why use offer templates?..........54 Initial table administration tasks .......24 Planning offer templates and offers ......54 Prerequisites: expected state following installation 24 Working with offer attributes ........55 To test system table access ........24 To add a custom attribute ........55 To test user table access .........25 To modify a custom attribute .......56 Mapping Customer audience level system tables 25 Standard offer attributes .........57 Working with system tables .........26 Working with offer templates ........58 © Copyright IBM Corp. 1998, 2011 iii To create an offer template ........58 Chapter 8. Response history To modify an offer template ........59 administration ...........83 To reorder offer templates ........60 Response history concepts .........83 To retire an offer template ........61 What is response history? ........83 Using offer custom attributes in offer templates 61 What is the response type? ........83 Adding list values to the Channel attribute . 61 How does response history relate to audience Offer template references ..........61 levels? ...............83 Template icons ............61 How does response history relate to database Default offer attributes .........63 tables? ...............84 Foreign key constraints in response history tables 84 Chapter 6. Audience level What is an action table? .........84 administration ...........65 What does an action table contain? .....84 About audience levels ...........65 Why use an action table? .........84 Why different audience levels are needed in Working with response history ........85 Campaign ...............66 Creating response history tables for new The default Customer audience level ......66 audience levels ............85 Creating additional audience levels ......66 Mapping response history tables to Unica system About audience levels and system tables ....66 tables ...............85 Default Customer audience level system tables 67 To set the number of days after an offer expires About audience levels and strategic segments . 67 to record responses ...........85 Audience level unique identifiers ......67 To add a response type .........85 Required fields in audience-level-specific tables 68 Logging response history .........86 About audience levels and user tables .....69 Response history references .........86 User tables with a single audience level ....69 Default response types .........86 User tables with multiple audience levels . 70 Sample UA_ActionCustomer Table .....87 Working with audience levels ........70 Workflow for setting up a new audience level . 70 Chapter 9. Operational monitoring . 89 Removing an audience level ........73 To configure operational monitoring ......89 About global suppressions and global suppression To access the All Monitored Runs page .....89 segments ...............73 Viewing the All Monitored Runs page .....89 Switching audiences with global suppressions . 74 To sort the list of flowcharts on the All Monitored About creating global suppression segments . 74 Runs page ...............90 Updating global suppression segments ....75 To view associated campaigns or flowcharts . 90 Deleting global suppression segments ....75 To refresh the All Monitored Runs page display 90 Logging for global suppressions ......75 Working with flowcharts through the All Monitored Runs page ...............90 Chapter 7. Contact history To stop a running flowchart ........91 administration ...........77 To suspend a running flowchart ......91 Contact history concepts ..........77 To resume a suspended flowchart ......91 What is contact history? .........77 Operational monitoring references .......91 What is detailed contact history? ......78 Flowchart states and actions ........92 What is contact status? .........78 Properties related to operational monitoring . 93 About updating contact status .......78 All Monitored Runs page icons .......93 How does contact history relate to audience levels? ...............79 Chapter 10. Dimension hierarchy How does contact history relate to database and administration ...........95 system tables? ............79 What is a dimension hierarchy? .......95 What is offer history? ..........79 Why use dimension hierarchies? .......95 What is treatment history? ........79 About dimension hierarchies and cubes .....96 Working with contact history ........80 About dimension hierarchies and database tables. 96 Creating contact history tables for new audience Working with dimension hierarchies ......97 levels ...............80 About working with dimension hierarchies. 97 Mapping contact history tables to Unica system Designing dimension hierarchies ......97 tables ...............80 Accessing dimension hierarchies in Campaign . 97 To add a contact status code........81 To create a dimension hierarchy ......98 Logging history ............81 To load a stored dimension hierarchy.....98 Updating contact history .........82 To edit a dimension hierarchy .......99 Clearing contact history .........82 To update a dimension hierarchy ......99 Default contact status codes .........82 To remove a dimension hierarchy ......99 iv IBM Unica Campaign: Administrator's Guide Chapter 11. Trigger administration 101 Chapter 13. Unique code What is an inbound trigger? ........101 administration ...........121 Why use an inbound trigger? .......101 About campaign codes ..........121 Inbound triggers and the Schedule process . 101 About offer codes ............121 What is broadcasting? .........101
Recommended publications
  • Cumberland Tech Ref.Book
    Forms Printer 258x/259x Technical Reference DRAFT document - Monday, August 11, 2008 1:59 pm Please note that this is a DRAFT document. More information will be added and a final version will be released at a later date. August 2008 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries. © 2008 Lexmark International, Inc. All rights reserved. 740 West New Circle Road Lexington, Kentucky 40550 Draft document Edition: August 2008 The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL, INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in later editions. Improvements or changes in the products or the programs described may be made at any time. Comments about this publication may be addressed to Lexmark International, Inc., Department F95/032-2, 740 West New Circle Road, Lexington, Kentucky 40550, U.S.A. In the United Kingdom and Eire, send to Lexmark International Ltd., Marketing and Services Department, Westhorpe House, Westhorpe, Marlow Bucks SL7 3RQ. Lexmark may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
    [Show full text]
  • IBM Unica Campaign: Administrator's Guide to Remove a Dimension Hierarchy
    IBM Unica Campaign Version 8 Release 6 February, 2013 Administrator's Guide Note Before using this information and the product it supports, read the information in “Notices” on page 385. This edition applies to version 8, release 6, modification 0 of IBM Unica Campaign and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1998, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. Administration in IBM Unica To view system table contents .......27 Campaign ..............1 Working with user tables ..........28 Campaign-related administrative tasks in IBM Unica About working with user tables ......28 Marketing ...............1 Guidelines for mapping user tables .....28 To access data sources from within a flowchart 29 Chapter 2. Managing security in IBM Working with user tables while editing a flowchart ..............29 Unica Campaign ...........3 Working with user tables from the Campaign About security policies ...........3 Settings page .............30 The global security policy .........3 Working with data dictionaries ........39 How Campaign evaluates permissions.....4 To open a data dictionary.........39 Using the Owner and Folder Owner roles . 4 To apply changes to a data dictionary ....40 Guidelines for designing security policies....5 When to use a data dictionary .......40 Security scenarios.............5 Data dictionary syntax..........40 Scenario 1: Company with a single division . 5 To manually create a new data dictionary . 40 Scenario 2: Company with multiple separate Working with table catalogs .........41 divisions...............7 To access table catalogs .........41 Scenario 3: Restricted access within a division .
    [Show full text]
  • HAIL: an Algorithm for the Hardware Accelerated Identification of Languages, Master's Thesis, May 2006
    Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-2006-36 2006-01-01 HAIL: An Algorithm for the Hardware Accelerated Identification of Languages, Master's Thesis, May 2006 Charles M. Kastner This thesis examines in detail the Hardware-Accelerated Identification of Languages (HAIL) project. The goal of HAIL is to provide an accurate means to identify the language and encoding used in streaming content, such as documents passed over a high-speed network. HAIL has been implemented on the Field-programmable Port eXtender (FPX), an open hardware platform developed at Washington University in St. Louis. HAIL can accurately identify the primary languages and encodings used in text at rates much higher than what can be achieved by software algorithms running on microprocessors. Follow this and additional works at: https://openscholarship.wustl.edu/cse_research Part of the Computer Engineering Commons, and the Computer Sciences Commons Recommended Citation Kastner, Charles M., " HAIL: An Algorithm for the Hardware Accelerated Identification of Languages, Master's Thesis, May 2006" Report Number: WUCSE-2006-36 (2006). All Computer Science and Engineering Research. https://openscholarship.wustl.edu/cse_research/187 Department of Computer Science & Engineering - Washington University in St. Louis Campus Box 1045 - St. Louis, MO - 63130 - ph: (314) 935-6160. Department of Computer Science & Engineering 2006-36 HAIL: An Algorithm for the Hardware Accelerated Identification of Languages, Master's Thesis, May 2006 Authors: Charles M. Kastner Corresponding Author: [email protected] Web Page: http://www.arl.wustl.edu/projects/fpx/reconfig.htm Abstract: This thesis examines in detail the Hardware-Accelerated Identification of Languages (HAIL) project.
    [Show full text]
  • INCITS Withdrawn Standards and Projects List - Prior to 2015
    INCITS Withdrawn Standards and Projects List - Prior to 2015 Key: Designation: The final standard designation given to the published standard Project: The initial number assigned to new project prior to 2013. Title: Title of the standard Committee: The committee assignment for the project. Designation: -[] Project: 1058 Knowledge Information Format (KIF) Committee: INCITS/DM32.8 Designation: -[] Project: 1059 Conceptual Graphs: A presentation language for knowledge in conceptual models Committee: INCITS/DM32.8 Designation: -[] Project: 106 USA Candidates for Registry Committee: INCITS/L2 Designation: -[] Project: 2113 Cartridge Characterization Standard - Part 4: Ink Cartridge Attributes Committee: INCITS/W1 Designation: -[] Project: 2113 Cartridge Characterization Standard - Part 5: Toner cartridge attributes Committee: INCITS/W1 Designation: -[] Project: 2086 Document Printing Application - Part 1: Abstract Service Definition and Procedures Committee: INCITS/T3 Designation: -[] Project: 2087 Application session service Committee: INCITS/T3 Designation: -[] Project: 1234 Information technology - Database languages - SQL - Part 4: Persistent Stored Modules (SQL/PSM) TECHNICAL CORRIGENDUM 1 Committee: INCITS/DM32.2 Designation: -[] Project: 1234 Information technology - Database languages - SQL - Part 1: Framework (SQL/Framework) TECHNICAL CORRIGENDUM 1 Committee: INCITS/DM32.2 Designation: -[] Project: 2061 Protocol Combinations to Provide and Support the OSI Network Service (Technical Report Type 3) Committee: INCITS/T3 Designation:
    [Show full text]
  • Vntex — Typesetting Vietnamese Hàn Thế Thành Reinhard Kotucha
    VnTEX — Typesetting Vietnamese Hàn Thế Thành Reinhard Kotucha Abstract VnTEX is an extension to Donald Knuth’s TEX typesetting system which provides support for typesetting Vietnamese. The primary site of VnTEX is http://vntex.sf.net. 1 Where to get Help The current maintainers of VnTEX are: I Hàn Thế Thành [email protected] I Reinhard Kotucha [email protected] I Werner Lemberg [email protected] There is a mailing list (very low traffic) for questions about VnTEX and typesetting Vietnamese. To subscribe to the list, visit: http://lists.sourceforge.net/lists/listinfo/vntex-users There is also a Wiki: http://vntex.info 2 Related Documents The following files are part of the VnTEX distribution I Hàn Thế Thành, Hỗ trợ tiếng Việt cho TEX I Hàn Thế Thành, Minimal steps to typeset Vietnamese I Hàn Thế Thành và Thái Phú Khánh Hòa, Dùng font với VnTEX The following files are not part of VnTEX but might be part of the TEX distribution you are using. I The American Mathematical Society, Hướng dẫn sử dụng gói amsmath, http://ctan.org/tex-archive/info/amslatex/vietnamese/amsldoc-vi.pdf http://ctan.org/tex-archive/info/amslatex/vietnamese/amsldoc-print-vi.pdf I H. Partl, E. Schlegl, I. Hyna, T. Oetiker, Một tài liệu ngắn gọn giới thiệu về LATEX 2", Translated by Nguyễn Tân Khoa. http://ctan.org/tex-archive/info/lshort/vietnamese/lshort-vi.pdf I Wolfgang May, Andreas Schlechte, Mở rộng môi trường định lý. Translated by Huỳnh Kỳ Anh. http://ctan.org/tex-archive/info/translations/vn/ntheorem-doc-vn.pdf 1 3 Typesetting Vietnamese In order to typeset Vietnamese, you need a text editor which supports Vietnamese.
    [Show full text]
  • Basis Technology Unicode対応ライブラリ スペックシート 文字コード その他の名称 Adobe-Standard-Encoding A
    Basis Technology Unicode対応ライブラリ スペックシート 文字コード その他の名称 Adobe-Standard-Encoding Adobe-Symbol-Encoding csHPPSMath Adobe-Zapf-Dingbats-Encoding csZapfDingbats Arabic ISO-8859-6, csISOLatinArabic, iso-ir-127, ECMA-114, ASMO-708 ASCII US-ASCII, ANSI_X3.4-1968, iso-ir-6, ANSI_X3.4-1986, ISO646-US, us, IBM367, csASCI big-endian ISO-10646-UCS-2, BigEndian, 68k, PowerPC, Mac, Macintosh Big5 csBig5, cn-big5, x-x-big5 Big5Plus Big5+, csBig5Plus BMP ISO-10646-UCS-2, BMPstring CCSID-1027 csCCSID1027, IBM1027 CCSID-1047 csCCSID1047, IBM1047 CCSID-290 csCCSID290, CCSID290, IBM290 CCSID-300 csCCSID300, CCSID300, IBM300 CCSID-930 csCCSID930, CCSID930, IBM930 CCSID-935 csCCSID935, CCSID935, IBM935 CCSID-937 csCCSID937, CCSID937, IBM937 CCSID-939 csCCSID939, CCSID939, IBM939 CCSID-942 csCCSID942, CCSID942, IBM942 ChineseAutoDetect csChineseAutoDetect: Candidate encodings: GB2312, Big5, GB18030, UTF32:UTF8, UCS2, UTF32 EUC-H, csCNS11643EUC, EUC-TW, TW-EUC, H-EUC, CNS-11643-1992, EUC-H-1992, csCNS11643-1992-EUC, EUC-TW-1992, CNS-11643 TW-EUC-1992, H-EUC-1992 CNS-11643-1986 EUC-H-1986, csCNS11643_1986_EUC, EUC-TW-1986, TW-EUC-1986, H-EUC-1986 CP10000 csCP10000, windows-10000 CP10001 csCP10001, windows-10001 CP10002 csCP10002, windows-10002 CP10003 csCP10003, windows-10003 CP10004 csCP10004, windows-10004 CP10005 csCP10005, windows-10005 CP10006 csCP10006, windows-10006 CP10007 csCP10007, windows-10007 CP10008 csCP10008, windows-10008 CP10010 csCP10010, windows-10010 CP10017 csCP10017, windows-10017 CP10029 csCP10029, windows-10029 CP10079 csCP10079, windows-10079
    [Show full text]
  • Awk, Perl, Etc
    CNAM, spécialité Informatique NSY116- Multimédia & interaction humain-machine (2008-9) Le texte P. Cubaud <[email protected]> 1. Codes, structures (2. Transport, compression, cryptage) 3. Analyse (4. Synthèse) 5. Présentation Bibliographie B. Habert, C. Fabre, F. Isaac De l’écrit au numérique InterEditions, 1998 I.H. Witten, A. Moffat, T.C. Bell Managing gygabytes. Compressing and indexing documents and images Van Nostrand, 1994 Techniques de l’ingénieur série H. section Document numérique (en ligne au CNAM) R. Laufer, D. Scavetta Texte, hypertexte, hypermédia Que-sais-je n°2629 (v2 1995) 1. Codes - Structures Codage des caractères Trois problèmes : • caractère ≠ glyphe • coder ≠ classer • norme ≠ standard Aussi vieux que le télégraphe… et toujours non résolus. 7 bits : American Standard Code for Information Interchange (ASCII, 1967 - puis ISO646 en 1983) 8 bits : ISO-Latin-XXX (ISO 8859-n) Au delà : Unicode (1990, v3 en 2000) et ISO 10646 = Site web unicode: www.unicode.org Une table à garder en attendant… et un outil : iconv MACCROATIAN [numer:~] pcubaud% iconv -l MACROMANIA ANSI_X3.4-1968 ANSI_X3.4-1986 ASCII CP367 IBM367 ISO-IR-6 ISO646-US ISO_646.IRV:1991 US US-ASCII CSASCII MACCYRILLIC UTF-8 MACUKRAINE ISO-10646-UCS-2 UCS-2 CSUNICODE MACGREEK UCS-2BE UNICODE-1-1 UNICODEBIG CSUNICODE11 MACTURKISH UCS-2LE UNICODELITTLE MACHEBREW ISO-10646-UCS-4 UCS-4 CSUCS4 MACARABIC UCS-4BE MACTHAI UCS-4LE HP-ROMAN8 R8 ROMAN8 CSHPROMAN8 UTF-16 NEXTSTEP UTF-16BE ARMSCII-8 UTF-16LE GEORGIAN-ACADEMY UTF-32 GEORGIAN-PS UTF-32BE KOI8-T UTF-32LE MULELAO-1
    [Show full text]
  • IGP® / VGL Emulation Code V™ Graphics Language Programmer's Reference Manual Line Matrix Series Printers
    IGP® / VGL Emulation Code V™ Graphics Language Programmer’s Reference Manual Line Matrix Series Printers Trademark Acknowledgements IBM and IBM PC are registered trademarks of the International Business Machines Corp. HP and PCL are registered trademarks of Hewlett-Packard Company. IGP, LinePrinter Plus, PSA, and Printronix are registered trademarks of Printronix, LLC. QMS is a registered trademark and Code V is a trademark of Quality Micro Systems, Inc. CSA is a registered certification mark of the Canadian Standards Association. TUV is a registered certification mark of TUV Rheinland of North America, Inc. UL is a registered certification mark of Underwriters Laboratories, Inc. This product uses Intellifont Scalable typefaces and Intellifont technology. Intellifont is a registered trademark of Agfa Division, Miles Incorporated (Agfa). CG Triumvirate are trademarks of Agfa Division, Miles Incorporated (Agfa). CG Times, based on Times New Roman under license from The Monotype Corporation Plc is a product of Agfa. Printronix, LLC. makes no representations or warranties of any kind regarding this material, including, but not limited to, implied warranties of merchantability and fitness for a particular purpose. Printronix, LLC. shall not be held responsible for errors contained herein or any omissions from this material or for any damages, whether direct, indirect, incidental or consequential, in connection with the furnishing, distribution, performance or use of this material. The information in this manual is subject to change without notice. This document contains proprietary information protected by copyright. No part of this document may be reproduced, copied, translated or incorporated in any other material in any form or by any means, whether manual, graphic, electronic, mechanical or otherwise, without the prior written consent of Printronix, LLC.
    [Show full text]
  • Java Bytecode Manipulation Framework
    Notice About this document The following copyright statements and licenses apply to software components that are distributed with various versions of the OnCommand Performance Manager products. Your product does not necessarily use all the software components referred to below. Where required, source code is published at the following location: ftp://ftp.netapp.com/frm-ntap/opensource/ 215-09632 _A0_ur001 -Copyright 2014 NetApp, Inc. All rights reserved. 1 Notice Copyrights and licenses The following component is subject to the ANTLR License • ANTLR, ANother Tool for Language Recognition - 2.7.6 © Copyright ANTLR / Terence Parr 2009 ANTLR License SOFTWARE RIGHTS ANTLR 1989-2004 Developed by Terence Parr Partially supported by University of San Francisco & jGuru.com We reserve no legal rights to the ANTLR--it is fully in the public domain. An individual or company may do whatever they wish with source code distributed with ANTLR or the code generated by ANTLR, including the incorporation of ANTLR, or its output, into commerical software. We encourage users to develop software with ANTLR. However, we do ask that credit is given to us for developing ANTLR. By "credit", we mean that if you use ANTLR or incorporate any source code into one of your programs (commercial product, research project, or otherwise) that you acknowledge this fact somewhere in the documentation, research report, etc... If you like ANTLR and have developed a nice tool with the output, please mention that you developed it using ANTLR. In addition, we ask that the headers remain intact in our source code. As long as these guidelines are kept, we expect to continue enhancing this system and expect to make other tools available as they are completed.
    [Show full text]
  • Unicode Compression: Does Size Really Matter? TR CS-2002-11
    Unicode Compression: Does Size Really Matter? TR CS-2002-11 Steve Atkin IBM Globalization Center of Competency International Business Machines Austin, Texas USA 78758 [email protected] Ryan Stansifer Department of Computer Sciences Florida Institute of Technology Melbourne, Florida USA 32901 [email protected] July 2003 Abstract The Unicode standard provides several algorithms, techniques, and strategies for assigning, transmitting, and compressing Unicode characters. These techniques allow Unicode data to be represented in a concise format in several contexts. In this paper we examine several techniques and strategies for compressing Unicode data using the programs gzip and bzip. Unicode compression algorithms known as SCSU and BOCU are also examined. As far as size is concerned, algorithms designed specifically for Unicode may not be necessary. 1 Introduction Characters these days are more than one 8-bit byte. Hence, many are concerned about the space text files use, even in an age of cheap storage. Will storing and transmitting Unicode [18] take a lot more space? In this paper we ask how compression affects Unicode and how Unicode affects compression. 1 Unicode is used to encode natural-language text as opposed to programs or binary data. Just what is natural-language text? The question seems simple, yet there are complications. In the information age we are accustomed to discretization of all kinds: music with, for instance, MP3; and pictures with, for instance, JPG. Also, a vast amount of text is stored and transmitted digitally. Yet discretizing text is not generally considered much of a problem. This may be because the En- glish language, western society, and computer technology all evolved relatively smoothly together.
    [Show full text]
  • Mysql Globalization Abstract
    MySQL Globalization Abstract This is the MySQL Globalization extract from the MySQL 8.0 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit the MySQL Forums, where you can discuss your issues with other MySQL users. Document generated on: 2021-09-27 (revision: 70895) Table of Contents Preface and Legal Notices ............................................................................................................ v 1 Character Sets, Collations, Unicode ........................................................................................... 1 1.1 Character Sets and Collations in General ........................................................................ 2 1.2 Character Sets and Collations in MySQL ......................................................................... 3 1.2.1 Character Set Repertoire ...................................................................................... 5 1.2.2 UTF-8 for Metadata .............................................................................................. 7 1.3 Specifying Character Sets and Collations ......................................................................... 8 1.3.1 Collation Naming Conventions .............................................................................. 8 1.3.2 Server Character Set and Collation ....................................................................... 9 1.3.3 Database Character Set and Collation ................................................................. 10 1.3.4 Table
    [Show full text]
  • Package 'Fontmplus'
    Package ‘fontMPlus’ February 27, 2017 Title Additional 'ggplot2' Themes Using 'M+' Fonts Version 0.1.1 Description Provides 'ggplot2' themes based on the 'M+' fonts. The 'M+' fonts are a font family under a free license. The font family provides multilingual glyphs. The fonts provide 'Kana', over 5,000 'Kanji', Basic Latin, Latin-1 Supplement, Latin Extended-A, and 'IPA' Extensions glyphs. Most of the Greek, Cyrillic, Vietnamese, and extended glyphs and symbols are included too. So the fonts are in conformity with ISO-8859-1, 2, 3, 4, 5, 7, 9, 10, 13, 14, 15, 16, Windows-1252, T1, and VISCII encoding. More information about the fonts can be found at <http://mplus-fonts.osdn.jp/about-en.html>. Depends R (>= 3.0.0) License MIT + file LICENSE Encoding UTF-8 LazyData true RoxygenNote 6.0.1 Imports hrbrthemes, extrafont, ggplot2 Suggests stringr, knitr, rmarkdown URL https://github.com/bhaskarvk/fontMPlus BugReports https://github.com/bhaskarvk/fontMPlus/issues VignetteBuilder knitr NeedsCompilation no Author Bhaskar Karambelkar [aut, cre], MPlus [cph] Maintainer Bhaskar Karambelkar <[email protected]> Repository CRAN Date/Publication 2017-02-27 08:15:30 1 2 fontMPlus R topics documented: fontMPlus . .2 import_mplus . .3 mplus.fontfamilies . .3 mplus.fonttable . .4 theme_ipsum_mplus_c1 . .4 theme_ipsum_mplus_c2 . .6 theme_ipsum_mplus_m1 . .7 theme_ipsum_mplus_m2 . .9 theme_ipsum_mplus_mn1 . 10 theme_ipsum_mplus_p1 . 12 theme_ipsum_mplus_p2 . 14 Index 16 fontMPlus Additional ggplot2 themes using M+ fonts. Description This is an add-on pacakge for hrbrthemes pacakge. It provides seven ggplot2 themes based on M+ fonts. M+ FONTS The M+ FONTS are a font family under the Free license. You can use, copy, and distribute them, with or without modification, either commercially or noncommercially.
    [Show full text]