{"id":4915,"date":"2013-10-30T05:07:19","date_gmt":"2013-10-29T18:07:19","guid":{"rendered":"http:\/\/www.rjmprogramming.com.au\/wordpress\/?p=4915"},"modified":"2013-10-30T05:07:19","modified_gmt":"2013-10-29T18:07:19","slug":"document-fidelity-primer-tutorial","status":"publish","type":"post","link":"https:\/\/www.rjmprogramming.com.au\/ITblog\/document-fidelity-primer-tutorial\/","title":{"rendered":"Document Fidelity Primer Tutorial"},"content":{"rendered":"<div style=\"width: 230px\" class=\"wp-caption alignnone\"><a target=_blank href=\"http:\/\/www.rjmprogramming.com.au\/wordpress\/DocumentFidelity.jpg\"><img decoding=\"async\" style=\"float:left; border: 15px solid pink;\" alt=\"Document Fidelity Primer Tutorial\" src=\"http:\/\/www.rjmprogramming.com.au\/wordpress\/DocumentFidelity.jpg\" title=\"Document Fidelity Primer Tutorial\"  \/><\/a><p class=\"wp-caption-text\">Document Fidelity Primer Tutorial<\/p><\/div>\n<p>The explosion of options for data exchange has had a huge effect on conducting business and commerce, and with the dissemination of information, and for education.   With all this exchange of information, data security has come into the spotlight, and organizations need to decide on strategies for data exchange that fits with the security their organization and its clients require.   Another concern with data exchange is document <a target=_blank title='fidelity information from Wikipedia' href='http:\/\/en.wikipedia.org\/wiki\/Fidelity'>fidelity<\/a>, as a measure of how accurate is a copy to its source.   Have a read of a finding from within the Scottish Legal Profession regarding the advantages of <a target=_blank title='PDF information from Wikipedia' href='http:\/\/en.wikipedia.org\/wiki\/Portable_Document_Format\u200e'>PDF<\/a> use within the Scottish Courts (from <a target=_blank title='link' href='http:\/\/www.journalonline.co.uk\/Magazine\/51-8\/1003313.aspx#.UmmknSQzLR0'>this link<\/a>).<\/p>\n<blockquote><p>The Forum resolved to support the view that electronic evidence in all Scotland\u2019s courts ought to be presented in PDF form. The term \u201cPDF\u201d stands for \u201cPortable Document Format\u201d. The key word is \u201cportable\u201d, intended to combine the qualities of authenticity, reliability and ease of use together into a single packaged concept.<\/p>\n<p>The differences between PDF and formats used for writing (Word, Excel, PowerPoint, HTML etc) are significant. Properly made, PDF files are not subject to the vagaries of other formats. PDFs are not readily editable \u2013 and editing may be explicitly prohibited. A precise snapshot, a PDF file, is created at a specific date and time, and in a specific way. Importantly, PDF files do not encode information that is specific to the application software, hardware or operating system used to create or view the document. A valid PDF will appear exactly the same regardless of its origin or destination.<\/p><\/blockquote>\n<p>Take a look at HTML, by contrast, and meta tags can tell you lots of information, in a layer on top of the data presented on the screen, and so this, by definition, has less document fidelity.<\/a><\/p>\n<p>The most well known application for reading PDF documents is <a target=_blank title='PDF reader' href='get.adobe.com\/reader\/\u200e'>Adobe Reader<\/a>.  As PDF has been so widely accepted as a standard, many applications export to PDF (eg. TextEdit on a Mac, Microsoft Office applications on Windows, OpenOffice applications), and many present PDF data (Preview on a Mac springs to mind).<\/p>\n<p>Another document format with excellent document fidelity qualities is the Open XML Paper Specification (or <a target=_blank title='XPS information from Wikipedia' href='http:\/\/en.wikipedia.org\/wiki\/Open_XML_Paper_Specification\u200e'>XPS<\/a> files).  Microsoft uses this format as a means for users to simulate the fidelity of paper copies without the paper.    Recent Microsoft .NET Framework versions install the XPS Viewer to your PC or laptop.  Have a read of <a target=_blank title='XPS' href='http:\/\/windows.microsoft.com\/en-au\/windows\/what-is-xps-viewer#what-is-xps-viewer=windows-vista'>this<\/a>.<\/p>\n<p>If this was interesting you may be interested in <a title='Click here to see topics in which you might be interested' href='#d4915' onclick='var dv=document.getElementById(\"d4915\"); dv.innerHTML = \"&lt;iframe width=670 height=600 src=\" + \"http:\/\/www.rjmprogramming.com.au\/wordpress\/?tag=PDF\" + \"&gt;&lt;\/iframe&gt;\"; dv.style.display = \"block\";'>this<\/a> too.<\/p>\n<div id='d4915' style='display: none; border-left: 2px solid green; border-top: 2px solid green;'><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The explosion of options for data exchange has had a huge effect on conducting business and commerce, and with the dissemination of information, and for education. With all this exchange of information, data security has come into the spotlight, and &hellip; <a href=\"https:\/\/www.rjmprogramming.com.au\/ITblog\/document-fidelity-primer-tutorial\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[44,350,782,785,881,913,983,1263,1319,1482],"class_list":["post-4915","post","type-post","status-publish","format-standard","hentry","category-tutorials","tag-net-framework","tag-document-fidelity","tag-microsoft","tag-microsoft-office","tag-openoffice","tag-pdf","tag-preview","tag-textedit","tag-tutorial","tag-xps"],"_links":{"self":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/4915"}],"collection":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/comments?post=4915"}],"version-history":[{"count":0,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/4915\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/media?parent=4915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/categories?post=4915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/tags?post=4915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}