Hi наб, On Thu, Feb 13, 2025 at 03:12:01AM +0100, наб wrote: > Just for reference since Alex didn't link it: the PDF in question is > https://archive.org/details/unix-v10-vol2 > and the "why not" by the scanner is > https://labyrinth.zone/notice/AqqVamq2W6Ybq8N3xY > Pull quotes: > > the troff source uses some special tools that i think only ever ran inside > > of bell labs, and i dont know what im doing wrt building them > > > > the tool that gave me hell when i briefly tried to build it is called prefer(1), > > and it’s meant as a successor to refer(1). > > it works by running a modified version of awk in a subprocess and talking over a pipe > > I'm not touching that shit with a ten-mile island, I would agree on this part. I think you misunderstood. > and if she, as an actual 9p user can't, I certainly can't either; > but the scanned PNGs are real and lord only knows my 7h10m are better-spent > levelling and cutting them up to produce something concrete > than apply-rock-to-head/rinse/repeating with software that barely worked, > 30 years ago, in fake C, under fake unix and have naught to show for it. I meant running groff(1) on the .roff sources of the Volume 2 papers. Certainly, I wouldn't consider looking at the sources of AT&T troff(1) with my eyes that already bleed when needing to read C89 code, let alone K&R C. Is running groff(1) on 1989 sources to re-typeset the old docs something difficult? I guess the main difficulty would be in putting the .roff (or .ms, or whatever they used) sources together. Have a lovely day! Alex -- <https://www.alejandro-colomar.es/>
Attachment:
signature.asc
Description: PGP signature