XML Character Encoding and Decoding
|
|
|
- Shana White
- 9 years ago
- Views:
Transcription
1 XML Character Encoding and Decoding January 2013 Table of Contents 1. Excellent quotes 2. Lots of character conversions taking place inside our computers and on the Web 3. Well-formedness error when encoding="..." does not match actual character encoding 4. How to generate an encoding well-formedness error 5. If everyone used UTF-8 would that be best for everyone? 6. Interoperability of XML (i.e., Character Encoding Interoperability) 7. Acknowledgements 1. Excellent quotes... around "Why is character coding so complicated?"... it hasn't become any simpler in the intervening 40 years. To be able to track end-to-end the path of conversions and validate that your application from authoring through to storage through to search and retrieval is completely correct is amazingly difficult... it's a skill far too few programmers have, or even recognize that they do not have. We can't really tell what's going on without access to your entire tool chain. It's possible that your editor changed the character encoding of your text when you changed the XML declaration (emacs does this)! It's unlikely that the encoding of the characters in this is byte-identical with the files you created.... my preferred solution is to stick to a single encoding everywhere
2 ... I vote for UTF make sure every single link in the chain uses that encoding. 2. Lots of character conversions taking place inside our computers and on the Web All of the characters in the following XML are encoded in iso : <?xml version="1.0" encoding="iso "?> Now consider this problem: Suppose we search the XML for the string López, where the characters in López are encoded in UTF-8. Will the search application find a match? I did the search and it found a match. How did it find a match? The underlying byte sequence for the iso López is: 4C F A (one byte -- F3 -- is used to encode ó). The underlying byte sequence for the UTF-8 López is: 4C C3 B A (two bytes -- C3 B3 -- are used to encode ó). The search application cannot be doing a byte-for-byte match, else it would find no match. The answer is that the search application either converted the XML to UTF-8 or converted the search string (López) to iso Inside our computers, inside our software applications, and on the Web there is a whole lot of character encoding conversions occurring... transparently... without our knowing.
3 3. Well-formedness error when encoding="..." does not match actual character encoding Create an XML document and encode all the characters in it using UTF-8: Add an XML declaration and specify that the encoding is iso : <?xml version="1.0" encoding="iso "?> There is a mismatch between what encoding="..." says and the actual encoding of the characters in the document. Check the XML document for well-formedness and you will NOT get an error. Next, create the same XML document but encode all the characters using iso : Add an XML declaration and specify the encoding is UTF-8: <?xml version="1.0" encoding="utf-8"?> Again there is a mismatch between what encoding="..." says and the actual encoding of the characters in the document. But this time when you check the XML document for well-formedness you WILL get an error. Here's why. In UTF-8 the ó symbol is encoded using these two bytes: C3 B3 In iso , C3 and B3 represent two perfectly fine characters, so the UTF-8 encoded XML is a fine encoding="iso " document. In iso the ó symbol is encoded using one byte: F3 F3 is not a legal UTF-8 byte, so the iso encoded XML fails as an encoding="utf-8" document.
4 4. How to generate an encoding well-formedness error George Cristian Bina from oxygen XML gave the scoop on how things work inside oxygen. a. Create an XML document and encode all the characters in it using iso : <?xml version="1.0" encoding="iso "?> b. Using a hex editor, change encoding="iso " to encoding="utf-8": <?xml version="1.0" encoding="utf-8"?> c. Drag and drop the file into oxygen. d. oxygen will generate an encoding exception: Cannot open the specified file. Got a character encoding exception [snip] George described the encoding conversions that occur inside oxygen behind-the-scenes: If you have an iso encoded XML file loaded into oxygen and change encoding="iso " to encoding="utf-8" then oxygen will automatically change the encoding of every character in the document to UTF-8. George also made this important comment: Please note that the encoding is important only when the file is loaded and saved. When the file is loaded the bytes are converted to characters and then the application works only with characters. When the file is saved then those characters need to be converted to bytes and the encoding used will be determined from the XML header with a default to UTF-8 if no encoding can be detected. 5. If everyone used UTF-8 would that be best for everyone? There are a multiplicity of character encodings and a huge number of character encoding conversions taking place behind-the-scene. If everyone used UTF-8 then there would be no need to convert encodings.
5 Suppose every application, every IDE, every text editor, and every system worldwide used one character encoding, UTF-8. Would that be a good thing? The trouble with that is that UTF-8 makes larger files than UTF-16 for great numbers of people who use ideographic scripts such as Chinese. The real choice for them is between 16 and 32. UTF-16 is also somewhat harder to process in some older programming languages, most notably C and C++, where a zero-valued byte (NUL, as opposed to the zero-valued machine address, NULL) is used as a string terminator. So UTF-8 isn't a universal solution. There isn't a single solution today that's best for everyone. See this excellent discussion on StackOverflow titled, Should UTF-16 be Considered Harmful? In that discussion one person wrote: After long research and discussions, the development conventions at my company ban using UTF-16 anywhere except OS API calls Interoperability of XML (i.e., Character Encoding Interoperability) Remember not long ago you would visit a web page and see strange characters like this: â œgood morning, Daveâ You don't see that much anymore. Why? The answer is this: Interoperability is getting better. In the context of character encoding and decoding, what does that mean?
6 Interoperability means that you and I interpret (decode) the bytes in the same way. Example: I create an XML file, encode all the characters in it using UTF-8, and send the XML file to you. Here is a graphical depiction (i.e., glyphs) of the bytes that I send to you: You receive my XML document and interpret the bytes as iso In UTF-8 the ó symbol is a graphical depiction of the "LATIN SMALL LETTER O WITH ACUTE" character and it is encoded using these two bytes: C3 B3 But in iso , the two bytes C3 B3 is the encoding of two characters: C3 is the encoding of the à character B3 is the encoding of the ³ character Thus you interpret my XML as: <Name>López</Name> We are interpreting the same XML (i.e., the same set of bytes) differently. Interoperability has failed. So when we say: Interoperability is getting better. we mean that the number of incidences of senders and receivers interpreting the same bytes differently is decreasing. Let's revisit our first example, you open a document and see this: â œgood morning, Daveâ Here's how that happened: I created a document, using a UTF-8 editor, containing this text: Good morning, Dave
7 The left quote character is U+201C and the right quote character is U+201D. You open the document using Microsoft Word (or any Windows-1252 editor) and see: â œgood morning, Daveâ Here s why: In UTF-8 the left smart quote is codepoint 201C, which is encoded inside the computer as these hex values: E2 80 9C In Windows-1252 the byte E2 is displayed as â and the byte 80 is displayed as and the byte 9C is displayed as œ In UTF-8 the right smart quote is codepoint 201D, which is encoded inside the computer as these hex values: E2 80 9D In Windows-1252 the byte E2 is displayed as â and the byte 80 is displayed as and the byte 9D has no representation 7. Acknowledgements Thanks to the following people for their contributions to this paper: David Allen Roger Costello John Cowan Jim DeLaHunt Ken Holman Michael Kay David Lee Chris Maloney Liam Quin Michael Sokolov Andrew Welch Hermann Stam-Wilbrandt
Section 1.4 Place Value Systems of Numeration in Other Bases
Section.4 Place Value Systems of Numeration in Other Bases Other Bases The Hindu-Arabic system that is used in most of the world today is a positional value system with a base of ten. The simplest reason
Base Conversion written by Cathy Saxton
Base Conversion written by Cathy Saxton 1. Base 10 In base 10, the digits, from right to left, specify the 1 s, 10 s, 100 s, 1000 s, etc. These are powers of 10 (10 x ): 10 0 = 1, 10 1 = 10, 10 2 = 100,
The Unicode Standard Version 8.0 Core Specification
The Unicode Standard Version 8.0 Core Specification To learn about the latest version of the Unicode Standard, see http://www.unicode.org/versions/latest/. Many of the designations used by manufacturers
Storing Measurement Data
Storing Measurement Data File I/O records or reads data in a file. A typical file I/O operation involves the following process. 1. Create or open a file. Indicate where an existing file resides or where
**Unedited Draft** Arithmetic Revisited Lesson 5: Decimal Fractions or Place Value Extended Part 3: Multiplying Decimals
1. Multiplying Decimals **Unedited Draft** Arithmetic Revisited Lesson 5: Decimal Fractions or Place Value Extended Part 3: Multiplying Decimals Multiplying two (or more) decimals is very similar to how
PDF Primer PDF. White Paper
White Paper PDF Primer PDF What is PDF and what is it good for? How does PDF manage content? How is a PDF file structured? What are its capabilities? What are its limitations? Version: 1.0 Date: October
Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)
Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating
Independent samples t-test. Dr. Tom Pierce Radford University
Independent samples t-test Dr. Tom Pierce Radford University The logic behind drawing causal conclusions from experiments The sampling distribution of the difference between means The standard error of
CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf
CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf First Name: Last Name: NetID: The purpose of this lab is to help you to better understand functions:
Numeration systems. Resources and methods for learning about these subjects (list a few here, in preparation for your research):
Numeration systems This worksheet and all related files are licensed under the Creative Commons Attribution License, version 1.0. To view a copy of this license, visit http://creativecommons.org/licenses/by/1.0/,
Introduction to UNIX and SFTP
Introduction to UNIX and SFTP Introduction to UNIX 1. What is it? 2. Philosophy and issues 3. Using UNIX 4. Files & folder structure 1. What is UNIX? UNIX is an Operating System (OS) All computers require
**Unedited Draft** Arithmetic Revisited Lesson 4: Part 3: Multiplying Mixed Numbers
. Introduction: **Unedited Draft** Arithmetic Revisited Lesson : Part 3: Multiplying Mixed Numbers As we mentioned in a note on the section on adding mixed numbers, because the plus sign is missing, it
EE 261 Introduction to Logic Circuits. Module #2 Number Systems
EE 261 Introduction to Logic Circuits Module #2 Number Systems Topics A. Number System Formation B. Base Conversions C. Binary Arithmetic D. Signed Numbers E. Signed Arithmetic F. Binary Codes Textbook
Lesson 1 Introduction to Rapid Application Development using Visual Basic
Lesson 1 Introduction to Rapid Application Development using Visual Basic RAD (Rapid Application Development) refers to a development life cycle designed to give much faster development and higher-quality
Everything you wanted to know about using Hexadecimal and Octal Numbers in Visual Basic 6
Everything you wanted to know about using Hexadecimal and Octal Numbers in Visual Basic 6 Number Systems No course on programming would be complete without a discussion of the Hexadecimal (Hex) number
An overview of FAT12
An overview of FAT12 The File Allocation Table (FAT) is a table stored on a hard disk or floppy disk that indicates the status and location of all data clusters that are on the disk. The File Allocation
Chapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
Mail merge using Eudora - creating customized messages.
Page 1 of 5 Mail merge using Eudora creating customized messages Suppose you wanted to send many email messages, but each email message should be a little bit different from the rest. This can be done
FILEMAKER SERVER 12 BACKUPS FREQUENTLY ASKED QUESTIONS
FILEMAKER SERVER 12 BACKUPS FREQUENTLY ASKED QUESTIONS BY: WIM DECORTE AND STEVEN H. BLACKWELL 1. How have backups changed in FileMaker Server 12? Scheduled backups now utilize a process known as hard
About the Junk E-mail Filter
1 of 5 16/04/2007 11:28 AM Help and How-to Home > Help and How-to About the Junk E-mail Filter Applies to: Microsoft Office Outlook 2003 Hide All The Junk E-mail Filter in Outlook is turned on by default,
Windows Presentation Foundation (WPF) User Interfaces
Windows Presentation Foundation (WPF) User Interfaces Rob Miles Department of Computer Science 29c 08120 Programming 2 Design Style and programming As programmers we probably start of just worrying about
The Hexadecimal Number System and Memory Addressing
APPENDIX C The Hexadecimal Number System and Memory Addressing U nderstanding the number system and the coding system that computers use to store data and communicate with each other is fundamental to
University of Hull Department of Computer Science. Wrestling with Python Week 01 Playing with Python
Introduction Welcome to our Python sessions. University of Hull Department of Computer Science Wrestling with Python Week 01 Playing with Python Vsn. 1.0 Rob Miles 2013 Please follow the instructions carefully.
One Report, Many Languages: Using SAS Visual Analytics to Localize Your Reports
Technical Paper One Report, Many Languages: Using SAS Visual Analytics to Localize Your Reports Will Ballard and Elizabeth Bales One Report, Many Languages: Using SAS Visual Analytics to Localize Your
Translating QueueMetrics into a new language
Translating QueueMetrics into a new language Translator s manual AUTORE: LOWAY RESEARCH VERSIONE: 1.3 DATA: NOV 11, 2006 STATO: Loway Research di Lorenzo Emilitri Via Fermi 5 21100 Varese Tel 0332 320550
Qlik REST Connector Installation and User Guide
Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All
User manual BS1000 LAN base station
1/18 Contents 1.Introduction 2.Package of the LAN Base Station 3.Software installation 4.Installation of the Receiver 5.Sensor operation 6.Software operation Introduction The BS1000 is a receiver station
Numbering Systems. InThisAppendix...
G InThisAppendix... Introduction Binary Numbering System Hexadecimal Numbering System Octal Numbering System Binary Coded Decimal (BCD) Numbering System Real (Floating Point) Numbering System BCD/Binary/Decimal/Hex/Octal
Everyone cringes at the words "Music Theory", but this is mainly banjo related and very important to learning how to play.
BLUEGRASS MUSIC THEORY 101 By Sherry Chapman Texasbanjo The Banjo Hangout Introduction Everyone cringes at the words "Music Theory", but this is mainly banjo related and very important to learning how
6 3 4 9 = 6 10 + 3 10 + 4 10 + 9 10
Lesson The Binary Number System. Why Binary? The number system that you are familiar with, that you use every day, is the decimal number system, also commonly referred to as the base- system. When you
Detecting Anonymous Proxy Usage
Detecting Anonymous Proxy Usage John Brozycki March 2008 GIAC GPEN, GCIH, GSEC, GCIA, GCFW, GCFA, GREM [email protected] SANS Technology Institute - Candidate for Master of Science Degree 1 1 John
Appendix K Introduction to Microsoft Visual C++ 6.0
Appendix K Introduction to Microsoft Visual C++ 6.0 This appendix serves as a quick reference for performing the following operations using the Microsoft Visual C++ integrated development environment (IDE):
Performance Testing Web 2.0
Performance Testing Web 2.0 David Chadwick Rational Testing Evangelist [email protected] Dawn Peters Systems Engineer, IBM Rational [email protected] 2009 IBM Corporation WEB 2.0 What is it? 2 Web
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with
Continuous Integration Part 2
1 Continuous Integration Part 2 This blog post is a follow up to my blog post Continuous Integration (CI), in which I described how to execute test cases in Code Tester (CT) in a CI environment. What I
Free Report. My Top 10 Tips to Betting Like a Pro With Zero Risk
Free Report My Top 10 Tips to Betting Like a Pro With Zero Risk Legal Disclaimer: EVERY EFFORT HAS BEEN MADE TO ACCURATELY REPRESENT THIS PRODUCT AND IT'S POTENTIAL. EVEN THOUGH THIS INDUSTRY IS ONE OF
Parsing Technology and its role in Legacy Modernization. A Metaware White Paper
Parsing Technology and its role in Legacy Modernization A Metaware White Paper 1 INTRODUCTION In the two last decades there has been an explosion of interest in software tools that can automate key tasks
HP Business Notebook Password Localization Guidelines V1.0
HP Business Notebook Password Localization Guidelines V1.0 November 2009 Table of Contents: 1. Introduction..2 2. Supported Platforms...2 3. Overview of Design...3 4. Supported Keyboard Layouts in Preboot
Using SQL Server Management Studio
Using SQL Server Management Studio Microsoft SQL Server Management Studio 2005 is a graphical tool for database designer or programmer. With SQL Server Management Studio 2005 you can: Create databases
2 SYSTEM DESCRIPTION TECHNIQUES
2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange
SEPA formats - an introduction to XML. version September 2013. www.ing.be/sepa
Financial Supply Chain SEPA SEPA formats - an introduction to XML version September 2013 www.ing.be/sepa INTRODUCTION 1 INTRODUCTION TO XML 2 What is XML? 2 What is a root element? 2 What are the specifications
XML Processing and Web Services. Chapter 17
XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing
HTML Web Page That Shows Its Own Source Code
HTML Web Page That Shows Its Own Source Code Tom Verhoeff November 2009 1 Introduction A well-known programming challenge is to write a program that prints its own source code. For interpreted languages,
FirstClass FAQ's An item is missing from my FirstClass desktop
FirstClass FAQ's An item is missing from my FirstClass desktop Deleted item: If you put a item on your desktop, you can delete it. To determine what kind of item (conference-original, conference-alias,
SCRIPT: Security Training
SCRIPT: Security Training Slide Name Introduction Overview 1 Overview 2 Overview 3 Text Welcome to the MN WIC Program Security Training Module for all MN WIC Program staff provided by the MN Department
QaTraq Pro Scripts Manual - Professional Test Scripts Module for QaTraq. QaTraq Pro Scripts. Professional Test Scripts Module for QaTraq
QaTraq Pro Scripts Professional Test Scripts Module for QaTraq QaTraq Professional Modules QaTraq Professional Modules are a range of plug in modules designed to give you even more visibility and control
ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters
The char Type ASCII Encoding The C char type stores small integers. It is usually 8 bits. char variables guaranteed to be able to hold integers 0.. +127. char variables mostly used to store characters
Installing C++ compiler for CSc212 Data Structures
for CSc212 Data Structures [email protected] Spring 2010 1 2 Testing Mac 3 Why are we not using Visual Studio, an Integrated Development (IDE)? Here s several reasons: Visual Studio is good for LARGE project.
Frequently Asked Questions on character sets and languages in MT and MX free format fields
Frequently Asked Questions on character sets and languages in MT and MX free format fields Version Final 17 January 2008 Preface The Frequently Asked Questions (FAQs) on character sets and languages that
MS Access Lab 2. Topic: Tables
MS Access Lab 2 Topic: Tables Summary Introduction: Tables, Start to build a new database Creating Tables: Datasheet View, Design View Working with Data: Sorting, Filtering Help on Tables Introduction
How To Proofread
GRADE 8 English Language Arts Proofreading: Lesson 6 Read aloud to the students the material that is printed in boldface type inside the boxes. Information in regular type inside the boxes and all information
Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
Consulting. Personal Attention, Expert Assistance
Consulting Personal Attention, Expert Assistance 1 Writing Better SQL Making your scripts more: Readable, Portable, & Easily Changed 2006 Alpha-G Consulting, LLC All rights reserved. 2 Before Spending
Iowa State Poll. Page 1
Iowa State Poll Project: 151101 N Size: 641 Registered Voters Margin of Error: ± 4% Topline Report November 10-16, 2015 F3B Question Response Frequency Percentage In the presidential caucus in your state
Java Interview Questions and Answers
1. What is the most important feature of Java? Java is a platform independent language. 2. What do you mean by platform independence? Platform independence means that we can write and compile the java
File Management Where did it go? Teachers College Summer Workshop
File Management Where did it go? Teachers College Summer Workshop Barbara Wills University Computing Services Summer 2003 To Think About The Beginning of Wisdom is to Call Things by the Right Names --
Demonstrating a DATA Step with and without a RETAIN Statement
1 The RETAIN Statement Introduction 1 Demonstrating a DATA Step with and without a RETAIN Statement 1 Generating Sequential SUBJECT Numbers Using a Retained Variable 7 Using a SUM Statement to Create SUBJECT
Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication
Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication Contents Domain Controller Certificates... 1 Enrollment for a Domain Controller Certificate...
Q Lately I've been hearing a lot about WS-Security. What is it, and how is it different from other security standards?
MSDN Home > MSDN Magazine > September 2002 > XML Files: WS-Security, WebMethods, Generating ASP.NET Web Service Classes WS-Security, WebMethods, Generating ASP.NET Web Service Classes Aaron Skonnard Download
Security Patch Management and MSMUG. Bill Cotter 3M
Security Patch Management and MSMUG Thursday Morning, Feb 7th Bill Cotter 3M MsMUG Today s Structure Consumer and Office Business Display Graphics Business Electro and Communications Business Health Care
SQL Injection. The ability to inject SQL commands into the database engine through an existing application
SQL Injection The ability to inject SQL commands into the database engine through an existing application 1 What is SQL? SQL stands for Structured Query Language Allows us to access a database ANSI and
Computer Science 281 Binary and Hexadecimal Review
Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two
Setting Up Database Security with Access 97
Setting Up Database Security with Access 97 The most flexible and extensive method of securing a database is called user-level security. This form of security is similar to methods used in most network
Pulse Secure Client. Customization Developer Guide. Product Release 5.1. Document Revision 1.0. Published: 2015-02-10
Pulse Secure Client Customization Developer Guide Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 http://www.pulsesecure.net
BBBT Podcast Transcript
BBBT Podcast Transcript About the BBBT Vendor: The Boulder Brain Trust, or BBBT, was founded in 2006 by Claudia Imhoff. Its mission is to leverage business intelligence for industry vendors, for its members,
Today s Outline. Computer Communications. Java Communications uses Streams. Wrapping Streams. Stream Conventions 2/13/2016 CSE 132
Today s Outline Computer Communications CSE 132 Communicating between PC and Arduino Java on PC (either Windows or Mac) Streams in Java An aside on class hierarchies Protocol Design Observability Computer
Documentation to use the Elia Infeed web services
Documentation to use the Elia Infeed web services Elia Version 1.0 2013-10-03 Printed on 3/10/13 10:22 Page 1 of 20 Table of Contents Chapter 1. Introduction... 4 1.1. Elia Infeed web page... 4 1.2. Elia
Number Representation
Number Representation CS10001: Programming & Data Structures Pallab Dasgupta Professor, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Topics to be Discussed How are numeric data
The programming language C. sws1 1
The programming language C sws1 1 The programming language C invented by Dennis Ritchie in early 1970s who used it to write the first Hello World program C was used to write UNIX Standardised as K&C (Kernighan
Select the Crow s Foot entity relationship diagram (ERD) option. Create the entities and define their components.
Α DESIGNING DATABASES WITH VISIO PROFESSIONAL: A TUTORIAL Microsoft Visio Professional is a powerful database design and modeling tool. The Visio software has so many features that we can t possibly demonstrate
REACHING YOUR GOALS. Session 4. Objectives. Time. Materials. Preparation. Procedure. wait4sex
Session 4 REACHING YOUR GOALS Objectives At the completion of this session, youth will: 1. Define what is meant by short and long term goals, 2. Identify and describe personal goals to the group, and 3.
SMPP protocol analysis using Wireshark (SMS)
SMPP protocol analysis using Wireshark (SMS) Document Purpose Help analyzing SMPP traffic using Wireshark. Give hints about common caveats and oddities of the SMPP protocol and its implementations. Most
A Comparison of Programming Languages for Graphical User Interface Programming
University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange University of Tennessee Honors Thesis Projects University of Tennessee Honors Program 4-2002 A Comparison of Programming
THE MAKING OF THE CONSTITUTION LESSON PLANS
THE MAKING OF THE CONSTITUTION LESSON PLANS Introduction: These lessons are based on the CALLA approach. See the end of the lessons for more information and resources on teaching with the CALLA approach.
Product Internationalization of a Document Management System
Case Study Product Internationalization of a ì THE CUSTOMER A US-based provider of proprietary Legal s and Archiving solutions, with a customizable document management framework. The customer s DMS was
Frequently Asked Questions For CAISO Digital Certificates
Frequently Asked Questions For CAISO Digital Certificates Contents Questions... 1 Question #1: How can I get a new CAISO digital certificate?...1 Question #2: My certificate has expired. How do I get a
Smooks Dev Tools Reference Guide. Version: 1.1.0.GA
Smooks Dev Tools Reference Guide Version: 1.1.0.GA Smooks Dev Tools Reference Guide 1. Introduction... 1 1.1. Key Features of Smooks Tools... 1 1.2. What is Smooks?... 1 1.3. What is Smooks Tools?... 2
Merkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan [email protected] April 7, 2015 Modern distributed systems spread their databases across a large number
Address Phone & Fax Internet
Smilehouse Workspace 1.13 Payment Gateway API Document Info Document type: Technical document Creator: Smilehouse Workspace Development Team Date approved: 31.05.2010 Page 2/34 Table of Content 1. Introduction...
HOMEWORK # 2 SOLUTIO
HOMEWORK # 2 SOLUTIO Problem 1 (2 points) a. There are 313 characters in the Tamil language. If every character is to be encoded into a unique bit pattern, what is the minimum number of bits required to
A Process is Not Just a Flowchart (or a BPMN model)
A Process is Not Just a Flowchart (or a BPMN model) The two methods of representing process designs that I see most frequently are process drawings (typically in Microsoft Visio) and BPMN models (and often
When the program is complied, built, and sent to the programmer, the return is an ERROR 27 message and the programming stops.
CanaKit Programmer Error 27 Workaround Mark Spencer, WA8SME [email protected] 860 381 5335 Introduction. Many readers of the PIC Programming for Beginners book that are using the CanaKit programmer supplied
This explains why the mixed number equivalent to 7/3 is 2 + 1/3, also written 2
Chapter 28: Proper and Improper Fractions A fraction is called improper if the numerator is greater than the denominator For example, 7/ is improper because the numerator 7 is greater than the denominator
Rotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
A Case Study of ebay UTF-8 Database Migration
A Case Study of ebay UTF-8 Database Migration Nelson Ng Chief Globalization Architect 1 What is the difficulty in migrating from ISO Latin 1 to UTF-8? 2 ebay: The World s Online Marketplace An online trading
PHP Tutorial From beginner to master
PHP Tutorial From beginner to master PHP is a powerful tool for making dynamic and interactive Web pages. PHP is the widely-used, free, and efficient alternative to competitors such as Microsoft's ASP.
How to register and use our Chat System
How to register and use our Chat System Why this document? We have a very good chat system and easy to use when you are set up, but getting registered and into the system can be a bit complicated. If you
Cobol. By: Steven Conner. COBOL, COmmon Business Oriented Language, one of the. oldest programming languages, was designed in the last six
Cobol By: Steven Conner History: COBOL, COmmon Business Oriented Language, one of the oldest programming languages, was designed in the last six months of 1959 by the CODASYL Committee, COnference on DAta
Roadmap for Ph.D. Students Aiming for a Successful Career in Science
Roadmap for Ph.D. Students Aiming for a Successful Career in Science Do you really want to get a Ph.D.? Do you have what it takes to get a Ph.D.? How can you get the most out of joining a Ph.D. program?
Moven Studio realtime. streaming
Moven Studio realtime network streaming UDP protocol specification Document MV0305P Revision B, 19 December 2007 Xsens Technologies B.V. phone +31 88 XSENS 00 Pantheon 6a +31 88 97367 00 P.O. Box 559 fax
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
Table Of Contents. iii
PASSOLO Handbook Table Of Contents General... 1 Content Overview... 1 Typographic Conventions... 2 First Steps... 3 First steps... 3 The Welcome dialog... 3 User login... 4 PASSOLO Projects... 5 Overview...
The Forensic Analysis of the Microsoft Windows Vista Recycle Bin. By Mitchell Machor [email protected]
The Forensic Analysis of the Microsoft Windows Vista Recycle Bin By Mitchell Machor [email protected] 1/22/2008 - 1 - Introduction Contrary to due belief, when a file is deleted on a Microsoft operating
C# and Other Languages
C# and Other Languages Rob Miles Department of Computer Science Why do we have lots of Programming Languages? Different developer audiences Different application areas/target platforms Graphics, AI, List
Exchanger XML Editor - Canonicalization and XML Digital Signatures
Exchanger XML Editor - Canonicalization and XML Digital Signatures Copyright 2005 Cladonia Ltd Table of Contents XML Canonicalization... 2 Inclusive Canonicalization... 2 Inclusive Canonicalization Example...
BBC LEARNING ENGLISH 6 Minute English Never too old
BBC LEARNING ENGLISH 6 Minute English Never too old NB: This is not a word-for-word transcript Hello and welcome to 6 Minute English. I'm And I'm Now, how old are you? I'm 21, not a day older! Come on,
