How to fur ther enhance XKB configuration
|
|
|
- Imogen Stevens
- 10 years ago
- Views:
Transcription
1 How to fur ther enhance XKB configuration Kamil Toman, Ivan U. Pascal 25 November 2002 Abstract This guide is aimed to relieve one s labour to create a new (internationalized) keyboard layout. Unlike other documents this guide accents the keymap developer s point of view. 1. Overview The developer of a new layout should read the xkb protocol specification (The X Keyboard Extension: Protocol Specification <URL: at least to clarify for himself some xkb-specific terms used in this document and elsewhere in xkb configuration. Also it shows wise to understand how the X server and a client digest their keyboard inputs (with and without xkb). A useful source is also Ivan Pascal s text about xkb configuration <URL: pascal/en/xkb> often referenced throughout this document. Note that this document covers only enhancements which are tobemade to XFree86 version 4.3.x and above. 2. The Basics At the startup (or at later at user s command) X server starts its xkb keyboard module extension and reads data from a compiled configuration file. This compiled configuration file is prepared by the program xkbcomp which behaves altogether as an ordinary compiler (see man xkbcomp). Its input are human readable xkb configuration files which are verified and then composed into a useful xkb configuration. Users don t need to mess with xkbcomp themselves, for them it is invisible. Usually, it is started upon X server startup. As you probably already know, the xkb configuration consists of five main modules: Keycodes Tables that defines translation from keyboard scan codes into reasonable symbolic names, maximum, minimum legal keycodes, symbolic aliases and description of physically present LED-indicators. The primary sence of this component is to allow definitions of maps of symbols (see below) to be independent of physical keyboard scancodes. There are two main naming conventions for symbolic names (always four bytes long): How tofurther enhance XKB configuration 1
2 How tofurther enhance XKB configuration 2 Types names which express some traditional meaning like <SPCE> (stands for space bar) or names which express some relative positioning on a keyboard, for example <AE01> (an exclamation mark on US keyboards), on the right there are keys <AE02>, <AE03> etc. Types describe how the produced key is changed by active modifiers (like Shift, Control, Alt,...). There are several predefined types which cover most of used combinations. Compat Compatibility component defines internal behaviour of modifiers. Using compat component you can assign various actions (elaborately described in xkb specification) to key events. This is also the place where LED-indicators behaviour is defined. Symbols For i18n purposes, this is the most important table. It defines what values (=symbols) are assigned to what keycodes (represented by their symbolic name, see above). There may be defined more than one value for each key and then it depends on a key type and on modifiers state (respective compat component) which value will be the resulting one. Geometry Geometry files aren t used by xkb itself but they may be used by some external programs to depict a keyboard image. All these components have the files located in xkb configuration tree in subdirectories with the same names (usually in /usr/lib/x11/xkb). 3. Enhancing XKB Configuration Most of xkb enhancements concerns a need to define new output symbols for the some input key events. In other words, a need to define a new symbol map (for a new language, standard orjust to feel more comfortable when typing text). What do you need to do? Generally, you have to define following things: the map of symbols itself the rules to allow users to select the new mapping the description of the new layout First of all, it is good to go through existing layouts and to examine them if there issomething you could easily adjust to fit your needs. Even if there isnothing similar you may get some ideas about basic concepts and used tricks. 3.1 Levels And Groups Since XFree you can use multi-layout concept of xkb configuration. Though it is still in boundaries of xkb protocol and general ideas, the keymap designer must obey new rules when creating new maps. In exchange we get a more powerful and cleaner configuration system. Remember that it is the application which must decide which symbol matches which keycode according to effective modifier state. The X server itself sends only an input event message to. Of course, usually the general interpretation is processed by Xlib, Xaw, Motif, Qt, Gtk and similar libraries. The X server only supplies its mapping table (usually upon an application startup).
3 How tofurther enhance XKB configuration 3 Youcan think of the X server s symbol table as of a irregular table where each keycode has its row and where each combination of modifiers determines exactly one column. The resulting cell then gives the proper symbolic value. Not all keycodes need to bind different values for different combination of modifiers. <ENTER> key, for instance, usually doesn t depend on any modifiers so it its row has only one column defined. Note that in XKB there is no prior assumption that certain modifiers are bound to certain columns. By editing proper files (see keytypes (section 4.2, page 4)) this mapping can be changed as well. Unlike the original X protocol the XKB approach is far more flexible. It is comfortable to add one additional XKB term - group. You can think of a group as of a vector of columns per each keycode (naturally the dimension of this vector may differ for different keycodes). What is it good for? The group is not very useful unless you intend to use more than one logically different set of symbols (like more than one alphabet) defined in a single mapping table. But then, the group has anatural meaning - each symbol set has its own group and changing it means selecting a different one. XKB approach allows up to four different groups. The columns inside each group are called (shift) levels. The X server knows the current group and reports it together with modifier set and with a keycode in key events. To sum it up: for each keycode XKB keyboard map contains up to four one-dimensional tables - groups (logically different symbol sets) for each group of a keycode XKB keyboard map contains some columns - shift levels (values reached by combinations of Shift, Ctrl, Alt,... modifiers) different keycodes can have different number of groups different groups of one keycode can have different number of shift levels the current group number is tracked by X server It is clear that if you sanely define levels, groups and sanely bind modifiers and associated actions you can have simultaneously loaded up to four different symbol sets where each of them would reside in its own group. The multi-layout concept provides a facility to manipulate xkb groups and symbol definitions in away that allows almost arbitrary composition of predefined symbol tables. To keep it fully functional you have to: define all symbols only in the first group (re)define any modifiers with extra care toavoid strange (anisometric) behaviour 4. Defining New Layouts See Some Words About XKB internals <URL: pascal/en/xkb/internals.html> for explanation of used xkb terms and problems addressed by XKB extension. See Common notes about XKB configuration files language <URL: pascal/en/xkb/gram-common.html> for more precise explanation of syntax of xkb configuration files. 4.1 Predefined XKB Symbol Sets If you are about to define some European symbol map extension, you might want to use on of four predefined latin alphabet layouts. Okay, let s assume you want extend an existing keymap and you want to override a few keys.
4 How tofurther enhance XKB configuration 4 Let s take a simple U.K. keyboard asanexample (defined in pc/gb): partial default alphanumeric_keys xkb_symbols "basic" { include "pc/latin" name[group1]="great Britain"; key <AE02> { [ 2, quotedbl, twosuperior, oneeighth ] }; key <AE03> { [ 3, sterling, threesuperior, sterling ] }; key <AC11> { [apostrophe, at, dead_circumflex, dead_caron] }; key <TLDE> { [ grave, notsign, bar, bar ] }; key <BKSL> { [numbersign, asciitilde, dead_grave, dead_breve ] }; key <RALT> { type[group1]="two_level", [ ISO_Level3_Shift, Multi_key ] }; modifier_map Mod5 { <RALT> }; }; It defines a new layout in basic variant as an extension of common latin alphabet layout. The layout (symbol set) name is set to "Great Britain". Then there are redefinitions of a few keycodes and a modifiers binding. As you can see the number of shift levels is the same for <AE02>, <AE03>, <AC11>, <TLDE> and <BKSL> keys but it differs from number of shift levels of <RALT>. Note that the <RALT> key itself is a binding key for Mod5 and that it serves like a shift modifier for LevelThree, together with Shift as a multi-key. It is a good habit to respect this rule in a new similar layout. Okay, you could now define more variants of your new layout besides basic simply by including (augmenting/overriding/...) the basic definition and altering what may be needed. 4.2 Key Types The differences in the number of columns (shift levels) are caused by a different types of keys (see the types definition in section basics). Most keycodes have implicitly set the keytype in the included "pc/latin" file to "FOUR_LEVEL_ALPHABETIC". The only exception is <RALT> keycode which is explicitly set "TWO_LEVEL" keytype. All those names refer to pre-defined shift level schemes. Usually you can choose a suitable shift level scheme from default types scheme list in proper xkb component s subdirectory. The most used schemes are: ONE_LEVEL The key does not depend on any modifiers. The symbol from first level is always chosen. TWO_LEVEL The key uses a modifier Shift and may have two possible values. The second level may be chosen by Shift modifier. If Lock modifier (usually Caps-lock) applies the symbol is further processed using system-specific capitalization rules. If both Shift+Lock modifier apply the symbol from the second level is taken and capitalization rules are applied (and usually have no effect). ALPHABETIC The key uses modifiers Shift and Lock. It may have two possible values. The second level may be chosen by Shift modifier. When Lock modifier applies, the symbol from the first level is taken and further processed using system-specific capitalization rules. If both Shift+Lock modifier apply the symbol from the first level is taken and no capitalization rules applied. This is often called shift-cancels-caps behaviour.
5 How tofurther enhance XKB configuration 5 THREE_LEVEL Is the same as TWO_LEVEL but it considers an extra modifier - LevelThree which can be used to gain the symbol value from the third level. If both Shift+LevelThree modifiers apply the value from the third level is also taken. As in TWO_LEVEL, the Lock modifier doesn t influence the resulting level. Only Shift and LevelThree are taken into that consideration. If the Lock modifier is active capitalization rules are applied on the resulting symbol. FOUR_LEVEL Is the same as THREE_LEVEL but unlike LEVEL_THREE if both Shift+LevelThree modifiers apply the symbol is taken from the fourth level. FOUR_LEVEL_ALPHABETIC Is similar to FOUR_LEVEL but also defines shift-cancels-caps behaviour as in ALPHABETIC. If Lock+LevelThree apply the symbol from the third level is taken and the capitalization rules are applied. If Lock+Shift+LevelThree apply the symbol from the third level is taken and no capitalization rules are applied. KEYPAD As the name suggest this scheme is primarily used for numeric keypads. The scheme considers two modifiers - Shift and NumLock. If none of modifiers applies the symbol from the first level is taken. If either Shift or NumLock modifiers apply the symbol from the second level is taken. If both Shift+NumLock modifiers apply the symbol from the first level is taken. Again, shift-cancels-caps variant. FOUR_LEVEL_KEYPAD Is similar to KEYPAD scheme but considers also LevelThree modifier. If LevelThree modifier applies the symbol from the third level is taken. If Shift+LevelThree or NumLock+LevelThree apply the symbol from the fourth level is taken. If all Shift+NumLock+LevelThree modifiers apply the symbol from the third level is taken. This also, shift-cancels-caps variant. Besides that, there are several schemes for special purposes: PC_BREAK It is similar to TWO_LEVEL scheme but it considers the Control modifier rather than Shift. That means, the symbol from the second level is chosen by Control rather than by Shift. PC_SYSRQ It is similar to TWO_LEVEL scheme but it considers the Alt modifier rather than Shift. That means, the symbol from the second level is chosen by Alt rather than by Shift. CTRL+ALT The key uses modifiers Alt and Control. It may have two possible values. If only one modifier (Alt or Control) applies the symbol from the first level is chosen. Only if both Alt+Control modifiers apply the symbol from the second level is chosen. SHIFT+ALT The key uses modifiers Shift and Alt. It may have two possible values. If only one modifier (Alt or Shift) applies the symbol from the first level is chosen. Only if both Alt+Shift modifiers apply the symbol from the second level is chosen. If needed, special caps schemes may be used. They redefine the standard behaviour of all *ALPHABETIC types. The layouts (maps of symbols) with keys defined in respective types then automatically change their behaviour accordingly. Possible redefinitions are:
6 How tofurther enhance XKB configuration 6 internal internal_nocancel shift shift_nocancel None of these schemes should be used directly. They are defined merely for caps: xkb options (used to globally change the layouts behaviour). Don t alter any of existing key types. If you need a different behaviour create a new one More On Definitions Of Types When the XKB software deals with a separate type description it gets a complete list of modifiers that should be taken into account from the modifiers=<list of modifiers> list and expects that a set of map[<combination of modifiers>]=<list of modifiers> instructions that contain the mapping for each combination of modifiers mentioned in that list. Modifiers that are not explicitly listed are NOT taken into account when the resulting shift level is computed. If some combination is omitted the program (subroutine) should choose the first level for this combination (a quite reasonable behavior). Lets consider an example with two modifiers ModOne and ModTwo: type "..." { modifiers = ModOne+ModTwo; map[none] = Level1; map[modone] = Level2; }; In this case the map statements for ModTwo only and ModOne+ModTwo are omitted. It means that if the ModTwo is active the subroutine can t found explicit mapping for such combination an will use the default level i.e. Level1. But in the case the type described as: type "..." { modifiers = ModOne; map[none] = Level1; map[modone] = Level2; }; the ModTwo will not be taken into account and the resulting level depends on the ModOne state only. That means, ModTwo alone produces the Level1 but the combination ModOne+ModTwo produces the Level2 as well as ModOne alone. What does it mean if the second modifier is the Lock? It means that in the first case (the Lock itself is included in the list of modifiers but combinations with this modifier aren t mentioned in the map statements) the internal capitalization rules will be applied to the symbol from the first level. But in the second case the capitalization will be applied to the symbol chosen accordingly to he first modifier - and this can be the symbol from the first as well as from the second level. Usually, all modifiers introduced in modifiers=<list of modifiers> list are used for shift level calculation and then discarded. Sometimes this is not desirable. If you want to use a modifier for shift level calculation but you don t want to discard it, you may list in preserve[<combination of modifiers>]=<list of modifiers>. That means, for a given combination all listed modifiers will be preserved. If the Lock modifier is preserved then the resulting symbol is passed to internal capitalization routine regardless whether it has been used for a shift level calculation or not.
7 How tofurther enhance XKB configuration 7 Any key type description can use both real and virtual modifiers. Since real modifiers always have standard names it is not necessary to explicitly declare them. Virtual modifiers can have arbitrary names and can be declared (prior using them) directly in key type definition: virtual_modifiers <comma-separated list of modifiers> ; as seen in for example basic, pc or mousekeys key type definitions. 4.3 Rules Once you are finished with your symbol map you need to add it to rules file. The rules file describes how all the five basic keycodes, types, compat, symbols and geometry components should be composed to give a sensible resulting xkb configuration. The main advantage of rules over formerly used keymaps is a possibility to simply parameterize (once) fixed patterns of configurations and thus to elegantly allow substitutions of various local configurations into predefined templates. A pattern in a rules file (often located in /usr/lib/x11/xkb/rules) can be parameterized with four other arguments: Model, Layout, Variant and Options. For most cases parameters model and layout should be sufficient for choosing a functional keyboard mapping. The rules file itself is composed of pattern lines and lines with rules. The pattern line starts with an exclamation mark (! ) and describes how will the xkb interpret the following lines (rules). A sample rules file looks like this:! model = keycodes macintosh_old = macintosh... * = xfree86! model = symbols hp = +inet(%m) microsoftpro = +inet(%m) geniuscomfy = +inet(%m)! model layout[1] = symbols macintosh us = macintosh/us%(v[1]) * * = pc/pc(%m)+pc/%l[1]%(v[1])! model layout[2] = symbols macintosh us = +macintosh/us[2]%(v[2]):2 * * = +pc/%l[2]%(v[2]):2! option = types caps:internal = +caps(internal) caps:internal_nocancel = +caps(internal_nocancel) Each rule defines what certain combination of values on the left side of equal sign ( = ) results in. For example a (keyboard) model macintosh_old instructs xkb to take definitions of keycodes from file keycodes/macintosh while the rest of models (represented by a wild card * ) instructs it to take them from file keycodes/xfree86. The wild card represents all possible values on the left side which were not found in any of the previous rules. The more specialized (more complete) rules have higher precedence than general ones, i.e. the more general rules supply reasonable default values. As you can see some lines contain substitution parameters - the parameters preceded by the percent sign ( % ). The first alphabetical character after the percent sign expands to the value which has been found on the left side. For example +%l%(v) expands into +cz(bksl) if the respective values on the left side were cz layout in its bksl variant. More, if the layout resp. variant parameter is followed by a pair of brackets ( [, ] ) it means that xkb should place the layout resp. variant into specified xkb group. Ifthe brackets are omitted the first group is the default value.
8 How tofurther enhance XKB configuration 8 So the second block of rules enhances symbol definitions for some particular keyboard models with extra keys (for internet, multimedia,...). Other models are left intact. Similarly, the last block overrides some key type definitions, so the common global behaviour shift cancels caps or shift doesn t cancel caps can be selected. The rest of rules produces special symbols for each variant us layout of macintosh keyboard and standard pc symbols in appropriate variants as a default. 4.4 Descriptive Files of Rules Now you just need to add a detailed description to <rules>.xml description file so the other users (and external programs which often parse this file) know what is your work about Old Descriptive Files The formerly used descriptive files were named <rules>.lst Its structure is very simple and quite self descriptive but such simplicity had also some cavities, for example there was no way how to describe local variants of layouts and there were problems with the localization of descriptions. To preserve compatibility with some older programs, new XML descriptive files can be converted to old format.lst. For each parameter of rules file should be described its meaning. For the rules file described above the.lst file could look like:! model pc104 microsoft pc98 macintosh... Generic 104-key PC Microsoft Natural PC-98xx Series Original Macintosh! layout us cz de... U.S. English Czech German! option caps:internal uses internal capitalization. Shift cancels Caps caps:internal_nocancel uses internal capitalization. Shift doesn t cancel Caps And that should be it. Enjoy creating your own xkb mapping.
9 How tofurther enhance XKB configuration 9
10 CONTENTS 1. Overview The Basics Enhancing XKB Configuration Levels And Groups Defining New Layouts Predefined XKB Symbol Sets Key Types Rules Descriptive Files of Rules... 8 $XFree86: xc/programs/xserver/hw/xfree86/doc/sgml/xkb-enhancing.sgml,v /02/06 22:41:40 da i
OX Spreadsheet Product Guide
OX Spreadsheet Product Guide Open-Xchange February 2014 2014 Copyright Open-Xchange Inc. OX Spreadsheet Product Guide This document is the intellectual property of Open-Xchange Inc. The document may be
orrelog SNMP Trap Monitor Software Users Manual
orrelog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:[email protected] CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No
JetBrains ReSharper 2.0 Overview Introduction ReSharper is undoubtedly the most intelligent add-in to Visual Studio.NET 2003 and 2005. It greatly increases the productivity of C# and ASP.NET developers,
BusinessObjects: General Report Writing for Version 5
BusinessObjects: General Report Writing for Version 5 Contents 1 INTRODUCTION...3 1.1 PURPOSE OF COURSE...3 1.2 LEVEL OF EXPERIENCE REQUIRED...3 1.3 TERMINOLOGY...3 1.3.1 Universes...3 1.3.2 Objects...4
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: 1.800.529.0165 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This course is designed to deliver the fundamentals of SQL and PL/SQL along
Moving from CS 61A Scheme to CS 61B Java
Moving from CS 61A Scheme to CS 61B Java Introduction Java is an object-oriented language. This document describes some of the differences between object-oriented programming in Scheme (which we hope you
Duration Vendor Audience 5 Days Oracle End Users, Developers, Technical Consultants and Support Staff
D80198GC10 Oracle Database 12c SQL and Fundamentals Summary Duration Vendor Audience 5 Days Oracle End Users, Developers, Technical Consultants and Support Staff Level Professional Delivery Method Instructor-led
Oracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: + 38516306373 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training delivers the
HP Quality Center. Software Version: 9.20. Version Control Add-in Guide
HP Quality Center Software Version: 9.20 Version Control Add-in Guide Document Number: QCGENVC9.2/01 Document Release Date: May 2007 Software Release Date: May 2007 Legal Notices Warranty The only warranties
[MS-ACCDT]: Access Template File Format. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-ACCDT]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: +966 12 739 894 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training is designed to
EndNote Cite While You Write FAQs
IOE Library Guide EndNote Cite While You Write FAQs We have compiled a list of the more frequently asked questions and answers about citing your references in Word and working with EndNote libraries (desktop
UNICORN 6.4. Administration and Technical Manual
UNICORN 6.4 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
How To Guide. SIP Trunking Configuration Using the SIP Trunk Page
How To Guide SIP Trunking Configuration Using the SIP Trunk Page For the Ingate SIParators and Firewalls using software release 4.9.2 or later. Updated to show features available from release 4.10.x May
Introduction. Why Use ODBC? Setting Up an ODBC Data Source. Stat/Math - Getting Started Using ODBC with SAS and SPSS
Introduction Page 1 of 15 The Open Database Connectivity (ODBC) standard is a common application programming interface for accessing data files. In other words, ODBC allows you to move data back and forth
Business Insight Report Authoring Getting Started Guide
Business Insight Report Authoring Getting Started Guide Version: 6.6 Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software,
Administration and Business Collaboration. User Manual
Administration and Business Collaboration User Manual Copyright 2007 by Eurekify Ltd., 8 Hasadna Street Raanana 43651, ISRAEL. All Rights Reserved. This document maybe used in its complete form only and
UNICORN 7.0. Administration and Technical Manual
UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
Advanced Excel 10/20/2011 1
Advanced Excel Data Validation Excel has a feature called Data Validation, which will allow you to control what kind of information is typed into cells. 1. Select the cell(s) you wish to control. 2. Click
UNIVERSITY OF WATERLOO Software Engineering. Analysis of Different High-Level Interface Options for the Automation Messaging Tool
UNIVERSITY OF WATERLOO Software Engineering Analysis of Different High-Level Interface Options for the Automation Messaging Tool Deloitte Inc. Toronto, ON M5K 1B9 Prepared By Matthew Stephan Student ID:
Configuration Manager
After you have installed Unified Intelligent Contact Management (Unified ICM) and have it running, use the to view and update the configuration information in the Unified ICM database. The configuration
Installation & User Guide
SharePoint List Filter Plus Web Part Installation & User Guide Copyright 2005-2009 KWizCom Corporation. All rights reserved. Company Headquarters P.O. Box #38514 North York, Ontario M2K 2Y5 Canada E-mail:
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
Course Name: ADVANCE COURSE IN SOFTWARE DEVELOPMENT (Specialization:.Net Technologies)
Course Name: ADVANCE COURSE IN SOFTWARE DEVELOPMENT (Specialization:.Net Technologies) Duration of Course: 6 Months Fees: Rs. 25,000/- (including Service Tax) Eligibility: B.E./B.Tech., M.Sc.(IT/ computer
Specifications of Paradox for Windows
Specifications of Paradox for Windows Appendix A 1 Specifications of Paradox for Windows A IN THIS CHAPTER Borland Database Engine (BDE) 000 Paradox Standard Table Specifications 000 Paradox 5 Table Specifications
Microsoft Access 2010 Part 1: Introduction to Access
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Access 2010 Part 1: Introduction to Access Fall 2014, Version 1.2 Table of Contents Introduction...3 Starting Access...3
Use this translator to save ArchiCAD layouts/views in DXF/DWG format if you plan to continue
Tip Sheet ArchiCAD 11 Mark Horrocks Graphisoft New Zealand May 2007 DWG Translator In Architectural practice you often send and receive content from co-working Structural, Mechanical or Electrical Engineers.
Spyware - The invisible computer virus
Issue 3 Edition 1 Spyware - The invisible computer virus Inside This Issue: By Chris Noles You have probably heard a lot about Spyware or Adware lately. In fact, you probably have some type of spyware
Efficient database auditing
Topicus Fincare Efficient database auditing And entity reversion Dennis Windhouwer Supervised by: Pim van den Broek, Jasper Laagland and Johan te Winkel 9 April 2014 SUMMARY Topicus wants their current
MERLIN. The Quick Start Guide to professional project management. 2013 ProjectWizards GmbH, Melle, Germany. All rights reserved.
MERLIN The Quick Start Guide to professional project management 2013 ProjectWizards GmbH, Melle, Germany. All rights reserved. INTRODUCTION Welcome to the quick start guide to Merlin! Thank you for choosing
Database Studio is the new tool to administrate SAP MaxDB database instances as of version 7.5.
1 2 3 4 Database Studio is the new tool to administrate SAP MaxDB database instances as of version 7.5. It replaces the previous tools Database Manager GUI and SQL Studio from SAP MaxDB version 7.7 onwards
Getting Started with KompoZer
Getting Started with KompoZer Contents Web Publishing with KompoZer... 1 Objectives... 1 UNIX computer account... 1 Resources for learning more about WWW and HTML... 1 Introduction... 2 Publishing files
SPSS: Getting Started. For Windows
For Windows Updated: August 2012 Table of Contents Section 1: Overview... 3 1.1 Introduction to SPSS Tutorials... 3 1.2 Introduction to SPSS... 3 1.3 Overview of SPSS for Windows... 3 Section 2: Entering
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
Team Members: Christopher Copper Philip Eittreim Jeremiah Jekich Andrew Reisdorph. Client: Brian Krzys
Team Members: Christopher Copper Philip Eittreim Jeremiah Jekich Andrew Reisdorph Client: Brian Krzys June 17, 2014 Introduction Newmont Mining is a resource extraction company with a research and development
Adobe Acrobat 9 Pro Accessibility Guide: Creating Accessible Forms
Adobe Acrobat 9 Pro Accessibility Guide: Creating Accessible Forms Adobe, the Adobe logo, Acrobat, Acrobat Connect, the Adobe PDF logo, Creative Suite, LiveCycle, and Reader are either registered trademarks
aarhus MicroStation Print Organizer V8i-SS3 Your Technology Advantage Spring 2013 Jeanne Aarhus jeanne@aarhusassociates.
Your Technology Advantage Spring 2013 MicroStation Print Organizer V8i-SS3 Presented by: Jeanne Aarhus [email protected] aarhus ASSOCIATES 12005 Quail Drive Bellevue, NE 68123-1175 Office: 402-408-9696
Connections to External File Sources
Connections to External File Sources By using connections to external sources you can significantly speed up the process of getting up and running with M-Files and importing existing data. For instance,
2 SQL in iseries Navigator
2 SQL in iseries Navigator In V4R4, IBM added an SQL scripting tool to the standard features included within iseries Navigator and has continued enhancing it in subsequent releases. Because standard features
PROPHIX Reporting What is PROPHIX?
ALA Financial System PROPHIX Reporting What is PROPHIX? ALA s Financial System upgrade is comprised of three new software solutions: 1. Bill Payment Process (BPP), a Microsoft SharePoint web-based platform
Blackbaud FundWare Accounts Receivable Guide VOLUME 1 SETTING UP ACCOUNTS RECEIVABLE
Blackbaud FundWare Accounts Receivable Guide VOLUME 1 SETTING UP ACCOUNTS RECEIVABLE VERSION 7.50, JULY 2008 Blackbaud FundWare Accounts Receivable Guide Volume 1 USER GUIDE HISTORY Date Changes June 2000
Beginning Microsoft Project
Beginning Microsoft Project BEGINNING MICROSOFT PROJECT...1 WHAT IS PROJECT? WHAT IS IT USED FOR?...1 PROJECT WINDOWS... 1 Views and Tables...1 PHASE 1: PLANNING AND SETTING UP PROJECT...2 PLANNING AND
Microsoft' Excel & Access Integration
Microsoft' Excel & Access Integration with Office 2007 Michael Alexander and Geoffrey Clark J1807 ; pwiueyb Wiley Publishing, Inc. Contents About the Authors Acknowledgments Introduction Part I: Basic
Installation & User Guide
SharePoint List Filter Plus Web Part Installation & User Guide Copyright 2005-2011 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 50 McIntosh Drive, Unit 109 Markham, Ontario ON
Chapter 6. About This Chapter. Before You Begin. Windows 2000 Naming Schemes. [Previous] [Next]
[Previous] [Next] Chapter 6 R e s o l v i n g N e t w o r k H o s t N a m e s About This Chapter Both clients and servers on a network must resolve the user-friendly host names to the Internet Protocol
Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations
Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations Simon R. Chudley and Ulrich Ultes-Nitsche Department of Electronics and Computer Science, University of
WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math
Textbook Correlation WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math Following Directions Unit FIRST QUARTER AND SECOND QUARTER Logic Unit
Voluntary Product Accessibility Report
Voluntary Product Accessibility Report Compliance and Remediation Statement for Section 508 of the US Rehabilitation Act for OpenText Content Server 10.5 October 23, 2013 TOGETHER, WE ARE THE CONTENT EXPERTS
Red Hat Enterprise Linux International Language Support Guide
Red Hat Enterprise Linux International Language Support Guide Red Hat Enterprise Linux International Language Support Guide Copyright This book is about international language support for Red Hat Enterprise
Programming Reference Guide HP USB Barcode Scanner
Programming Reference Guide HP USB Barcode Scanner Document Part Number: 430944-002 August 2006 Print this document before setting up the HP USB Barcode Scanner. The document provides the programming bar
Calc Guide Chapter 9 Data Analysis
Calc Guide Chapter 9 Data Analysis Using Scenarios, Goal Seek, Solver, others Copyright This document is Copyright 2007 2011 by its contributors as listed below. You may distribute it and/or modify it
Presentation Reporting Quick Start
Presentation Reporting Quick Start Topic 50430 Presentation Reporting Quick Start Websense Web Security Solutions Updated 19-Sep-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web
Danish Keyboard Label Instructions and Specifications
Visit our web site at: SmartKeyboardSolutions.com Smart Keyboard Solutions 1855 E Southern Avenue, Suite #213 Mesa, AZ 85204 Phone: 877-477-1988 Buy this product online Danish Keyboard Label Instructions
Migration Manager v6. User Guide. Version 1.0.5.0
Migration Manager v6 User Guide Version 1.0.5.0 Revision 1. February 2013 Content Introduction... 3 Requirements... 3 Installation and license... 4 Basic Imports... 4 Workspace... 4 1. Menu... 4 2. Explorer...
SIM User Guide. Version 8/06/2016
SIM User Guide Version 8/06/2016 This document describes the version 2.56 from June 2016, but also corresponds to previous or later versions. Simple Inventory Manager is an active software that is regularly
How To Use Excel With A Calculator
Functions & Data Analysis Tools Academic Computing Services www.ku.edu/acs Abstract: This workshop focuses on the functions and data analysis tools of Microsoft Excel. Topics included are the function
All V7 registers support barcode printing, except the Sharp 410/420 1A ROM and that limitation is based upon the register.
Tools Section Barcode Printing These are basic instructions for Version 7 Polling barcode printing. Users will need to have a PLU/UPC file containing either UPC-A, UPC-E, EAN 13 or EAN 8 numbers, label
Microsoft Excel 2010 Part 3: Advanced Excel
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Excel 2010 Part 3: Advanced Excel Winter 2015, Version 1.0 Table of Contents Introduction...2 Sorting Data...2 Sorting
Macros allow you to integrate existing Excel reports with a new information system
Macro Magic Macros allow you to integrate existing Excel reports with a new information system By Rick Collard Many water and wastewater professionals use Microsoft Excel extensively, producing reports
Logix5000 Controllers Import/Export Project Components
Programming Manual Logix5000 Controllers Import/Export Project Components Catalog Numbers 1768-L43, 1768-L45 Important user information Read this document and the documents listed in the additional resources
Microsoft Office 2010: Access 2010, Excel 2010, Lync 2010 learning assets
Microsoft Office 2010: Access 2010, Excel 2010, Lync 2010 learning assets Simply type the id# in the search mechanism of ACS Skills Online to access the learning assets outlined below. Titles Microsoft
Eventia Log Parsing Editor 1.0 Administration Guide
Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing
Oracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals
How To Create A Powerpoint Intelligence Report In A Pivot Table In A Powerpoints.Com
Sage 500 ERP Intelligence Reporting Getting Started Guide 27.11.2012 Table of Contents 1.0 Getting started 3 2.0 Managing your reports 10 3.0 Defining report properties 18 4.0 Creating a simple PivotTable
WHO STEPS Surveillance Support Materials. STEPS Epi Info Training Guide
STEPS Epi Info Training Guide Department of Chronic Diseases and Health Promotion World Health Organization 20 Avenue Appia, 1211 Geneva 27, Switzerland For further information: www.who.int/chp/steps WHO
How To Use Query Console
Query Console User Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Query Console User
Topics Advanced PL/SQL, Integration with PROIV SuperLayer and use within Glovia
Topics Advanced PL/SQL, Integration with PROIV SuperLayer and use within Glovia 1. SQL Review Single Row Functions Character Functions Date Functions Numeric Function Conversion Functions General Functions
Instructions for Creating an Outlook E-mail Distribution List from an Excel File
Instructions for Creating an Outlook E-mail Distribution List from an Excel File 1.0 Importing Excel Data to an Outlook Distribution List 1.1 Create an Outlook Personal Folders File (.pst) Notes: 1) If
Infoview XIR3. User Guide. 1 of 20
Infoview XIR3 User Guide 1 of 20 1. WHAT IS INFOVIEW?...3 2. LOGGING IN TO INFOVIEW...4 3. NAVIGATING THE INFOVIEW ENVIRONMENT...5 3.1. Home Page... 5 3.2. The Header Panel... 5 3.3. Workspace Panel...
Chapter 1. Dr. Chris Irwin Davis Email: [email protected] Phone: (972) 883-3574 Office: ECSS 4.705. CS-4337 Organization of Programming Languages
Chapter 1 CS-4337 Organization of Programming Languages Dr. Chris Irwin Davis Email: [email protected] Phone: (972) 883-3574 Office: ECSS 4.705 Chapter 1 Topics Reasons for Studying Concepts of Programming
A Basic introduction to Microsoft Access
A Basic introduction to Microsoft Access By Ojango J.M.K Department of Animal Sciences, Egerton University, Njoro, Kenya and International Livestock Research Institute, Nairobi, Kenya Ms Access is a database
irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire [email protected] 25th
irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire [email protected] Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...
HP Business Notebook Password Localization Guidelines V1.0
HP Business Notebook Password Localization Guidelines V1.0 November 2009 Table of Contents: 1. Introduction..2 2. Supported Platforms...2 3. Overview of Design...3 4. Supported Keyboard Layouts in Preboot
When the template is complete, the whole Product Description document can be printed and approved.
HOW TO USE THIS TEMPLATE: Introduction The template reflects the steps set out in the PRINCE2 Method and is designed to prompt the Project Manager and help in the creation of the Product Description. The
Migrating to Excel 2010 from Excel 2003 - Excel - Microsoft Office 1 of 1
Migrating to Excel 2010 - Excel - Microsoft Office 1 of 1 In This Guide Microsoft Excel 2010 looks very different, so we created this guide to help you minimize the learning curve. Read on to learn key
Email Client Configuration Guide
Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why
FileBench's Multi-Client feature
FileBench's Multi-Client feature Filebench now includes facilities to synchronize workload execution on a set of clients, allowing higher offered loads to the server. While primarily intended for network
Database Programming with PL/SQL: Learning Objectives
Database Programming with PL/SQL: Learning Objectives This course covers PL/SQL, a procedural language extension to SQL. Through an innovative project-based approach, students learn procedural logic constructs
Advanced Microsoft Excel 2013
Advanced Microsoft Excel 2013 Introduction Microsoft Excel is program designed to efficiently manage spreadsheets and analyze data. It contains both basic and advanced features that anyone can learn. Once
Bitrix Site Manager 4.0. The Guide to Managing User Group Permissions
Bitrix Site Manager 4.0 The Guide to Managing User Group Permissions Contents CONTENTS...2 INTRODUCTION...3 ACCESS PERMISSION LEVELS...4 Access to files and folders...4 Permissions for the system modules
Vodafone Bulk Text. User Guide. Copyright Notice. Copyright Phonovation Ltd
Vodafone Bulk Text User Guide Copyright Notice Copyright Phonovation Ltd Important Notice: The Information contained in this document is subject to change without notice and should not be construed as
A Programming Language for Mechanical Translation Victor H. Yngve, Massachusetts Institute of Technology, Cambridge, Massachusetts
[Mechanical Translation, vol.5, no.1, July 1958; pp. 25-41] A Programming Language for Mechanical Translation Victor H. Yngve, Massachusetts Institute of Technology, Cambridge, Massachusetts A notational
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
CatDV Pro Workgroup Serve r
Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability
Hansa Financials HansaWorld
Hansa Financials HansaWorld Integrated Accounting, CRM and ERP System for Macintosh, Windows, Linux, PocketPC 2002 and AIX Volume 2b: Accounting Package Nominal Ledger and Multi-Currency 2003 Hansa Business
Oracle SQL. Course Summary. Duration. Objectives
Oracle SQL Course Summary Identify the major structural components of the Oracle Database 11g Create reports of aggregated data Write SELECT statements that include queries Retrieve row and column data
Guile Present. version 0.3.0, updated 21 September 2014. Andy Wingo ([email protected])
Guile Present version 0.3.0, updated 21 September 2014 Andy Wingo ([email protected]) This manual is for Guile Present (version 0.3.0, updated 21 September 2014) Copyright 2014 Andy Wingo Permission is granted
Create a New Database in Access 2010
Create a New Database in Access 2010 Table of Contents OVERVIEW... 1 CREATING A DATABASE... 1 ADDING TO A DATABASE... 2 CREATE A DATABASE BY USING A TEMPLATE... 2 CREATE A DATABASE WITHOUT USING A TEMPLATE...
How To Write A File System On A Microsoft Office 2.2.2 (Windows) (Windows 2.3) (For Windows 2) (Minorode) (Orchestra) (Powerpoint) (Xls) (
Remark Office OMR 8 Supported File Formats User s Guide Addendum Remark Products Group 301 Lindenwood Drive, Suite 100 Malvern, PA 19355-1772 USA www.gravic.com Disclaimer The information contained in
A Computer Glossary. For the New York Farm Viability Institute Computer Training Courses
A Computer Glossary For the New York Farm Viability Institute Computer Training Courses 2006 GLOSSARY This Glossary is primarily applicable to DOS- and Windows-based machines and applications. Address:
HP OpenVMS Migration Software for Alpha to Integrity Servers Guide to Translating Images
HP OpenVMS Migration Software for Alpha to Integrity Servers Guide to Translating Images February 2005 This manual describes how to use the Alpha Environment Software Translator (AEST) and other OpenVMS
Kit Rowley. Subject: Content type and workflow planning (SharePoint Server 2010) Attachments: image001.gif. Plan content types. Plan content types
Kit Rowley Subject: Content type and workflow planning (SharePoint Server 2010) Attachments: image001.gif Content type and workflow planning (SharePoint Server 2010) Published: May 12, 2010 This article
14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë
14.1 bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë bî~äì~íáåö=oéñäéåíáçå=ñçê=emi=rkfui=~åç=lééåsjp=eçëíë This guide walks you quickly through key Reflection features. It covers: Getting Connected
Bluetooth HID Profile
RN-WIFLYCR-UM-.01 RN-HID-UM Bluetooth HID Profile 2012 Roving Networks. All rights reserved. Version 1.0r 1/17/2012 USER MANUAL www.rovingnetworks.com 1 OVERVIEW Roving Networks Bluetooth modules support
VB.NET Programming Fundamentals
Chapter 3 Objectives Programming Fundamentals In this chapter, you will: Learn about the programming language Write a module definition Use variables and data types Compute with Write decision-making statements
Programming Languages CIS 443
Course Objectives Programming Languages CIS 443 0.1 Lexical analysis Syntax Semantics Functional programming Variable lifetime and scoping Parameter passing Object-oriented programming Continuations Exception
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Magenta CMS Training: RAF Station/ RAF Sport websites
Magenta CMS Training: RAF Station/ RAF Sport websites [email protected] 0207 490 1010 Introduction What is a website content management system? The content management system, or CMS, is software
Microsoft Access 2010 Overview of Basics
Opening Screen Access 2010 launches with a window allowing you to: create a new database from a template; create a new template from scratch; or open an existing database. Open existing Templates Create
