DST Prelo_TypeSpecimen

Page 1

DSTYPE PRESENTS: PRELO A TYPE SPECIMEN



DSTYPE PRESENTS: PRELO A TYPE SPECIMEN



Prelo was designed to be a neutral, highly readable typeface, for identity, editorial and information design. With nine weights and nine true italics, from Hairline to Black, Prelo is a workhorse typeface, full of OpenType features such as Small Caps, Tabular Figures, Central Europe characters and Historical Figures, among others. Like other DSTYPE fonts, most of the diacritics were designed to ďŹ t the gap between the x-height and the caps height, avoiding some common problems with the accented characters. ďż˝e curves are soft and smooth, providing legibility, even in very poor conditions and the neutrality allows this typeface to be used with any serif companion.


CHARACTER SET

ABCDEFGHIJKLMNOPQRSTUVWXYZÆŒØÞ!?¡¿ abcdefghijklmnopqrstuvwxyzæœøþ!?¡¿ ABCDEFGHIJKLMNOPQRSTUVWXYZÆŒØÞ!?¡¿ $€£¥¢ƒ$00123456789%‰ $€£¥¢ƒ0123456789%‰ 0123456789/0123456789 ⁄ ⁰¹²³⁴⁵⁶⁷⁸⁹/₀₁₂₃₄₅₆₇₈₉ ©®™*/|–—¦\-+×÷±≤≥≠=#†‡ №∑√ℓ℮Ω∏π∞◊¶§()[]{}&&& .,:;…„"“”‘’«»‹› fifl�ffiffl�ff ſ����� abdehilmⁿorst

06


DIACRITICS

ÀÁÂÃÄÅĂĀĄÇĆČĈĊĐĎÈÉÊËĔĚĖĒĘĞĜĢĠĦĤ Ì Í Î Ï Ĭ İ Ī Į Ĩ Ĵ ĶŁĹĽĻĿÑŃŇŅÒÓÔÕÖŎŐŌŔŘŖŚŞŜȘŠ ŦŤŢÙÚÛÜŬŰŪŲŮŨẂŴẄẀŸŶỲŽŹŻÞŊÐ àáâãäåăāąçćčĉċđďèéêëĕěėēęğĝģġħĥ ì í î ï ĭ i ī į ĩ ĵ ķłĺľļŀñńňņòóôõöŏőōŕřŗśşŝșš ŧťţùúûüŭűūųůũẃŵẅẁÿŷỳžźżþŋð ÀÁÂÃÄÅĂĀĄÇĆČĈĊĐĎÈÉÊËĔĚĖĒĘĞĜĢĠĦĤ Ì Í Î Ï Ĭ I Ī Į Ĩ Ĵ ĶŁĹĽĻĿÑŃŇŅÒÓÔÕÖŎŐŌŔŘŖŚŞŜȘŠ ŦŤŢÙÚÛÜŬŰŪŲŮŨẂŴẄẀŸŶỲŽŹŻÞŊÐ

07


A & h Q y & ű !? ff PRELO BOOK

PRELO HAIRLINE

PRELO BLACK ITALIC

PRELO BOLD

PRELO SEMIBOLD ITALIC

PRELO LIGHT ITALIC

PRELO MEDIUM

PRELO EXTRALIGHT

PRELO BLACK


¥ ffl z � a M 8 x ø PRELO MEDIUM

PRELO SEMIBOLD

PRELO HAIRLINE ITALIC

PRELO EXTRABOLD

PRELO BOOK

PRELO BOLD

PRELO HAIRLINE

PRELO EXTRABOLD ITALIC

PRELO LIGHT


PROPORTIONS: UPPERCASE, SMALLCAPS & LOWERCASE

QHHxftjbn 10


DIACRITICS & PROPORTIONS

Ħáľęïğħšç 11


Prelo: Hairline + Hairline Italic 9/11 pt

Prelo: ExtraLight + ExtraLight Italic 9/11 pt

Prelo: Light + Light Italic 9/11 pt

Saying it had the right to block “controversial or unsavory” text messages, Verizon Wireless last week rejected a request from Naral ProChoice America, the abortion rights group, to make Verizon’s mobile network available for a text-message program. But the company reversed course this morning, saying it had made a mistake.“�e decision to not allow text messaging on an important, though sensitive, public policy issue was incorrect, and we have fixed the process that led to this isolated incident,” Jeffrey Nelson, a company spokesman, said in a statement.“It was an incorrect interpretation of a dusty internal policy,” Mr. Nelson said. “�at policy, developed before text messaging protections such as spam filters adequately protected customers from unwanted messages, was designed to ward against communications such as anonymous hate messaging and adult materials sent to children.”

Saying it had the right to block “controversial or unsavory” text messages, Verizon Wireless last week rejected a request from Naral ProChoice America, the abortion rights group, to make Verizon’s mobile network available for a text-message program. But the company reversed course this morning, saying it had made a mistake.“�e decision to not allow text messaging on an important, though sensitive, public policy issue was incorrect, and we have fixed the process that led to this isolated incident,” Jeffrey Nelson, a company spokesman, said in a statement.“It was an incorrect interpretation of a dusty internal policy,” Mr. Nelson said. “�at policy, developed before text messaging protections such as spam filters adequately protected customers from unwanted messages, was designed to ward against communications such as anonymous hate messaging and adult materials sent to children.”

Saying it had the right to block “controversial or unsavory” text messages, Verizon Wireless last week rejected a request from Naral ProChoice America, the abortion rights group, to make Verizon’s mobile network available for a text-message program. But the company reversed course this morning, saying it had made a mistake.“�e decision to not allow text messaging on an important, though sensitive, public policy issue was incorrect, and we have fixed the process that led to this isolated incident,” Jeffrey Nelson, a company spokesman, said in a statement.“It was an incorrect interpretation of a dusty internal policy,” Mr. Nelson said. “�at policy, developed before text messaging protections such as spam filters adequately protected customers from unwanted messages, was designed to ward against communications such as anonymous hate messaging and adult materials sent to children.”

12


Prelo: Book + Book Italic 9/11 pt

Prelo: Medium + Medium Italic 9/11 pt

Prelo: SemiBold + SemiBold Italic 9/11 pt

Saying it had the right to block “controversial or unsavory” text messages, Verizon Wireless last week rejected a request from Naral ProChoice America, the abortion rights group, to make Verizon’s mobile network available for a text-message program. But the company reversed course this morning, saying it had made a mistake.“�e decision to not allow text messaging on an important, though sensitive, public policy issue was incorrect, and we have fixed the process that led to this isolated incident,” Jeffrey Nelson, a company spokesman, said in a statement.“It was an incorrect interpretation of a dusty internal policy,” Mr. Nelson said. “�at policy, developed before text messaging protections such as spam filters adequately protected customers from unwanted messages, was designed to ward against communications such as anonymous hate messaging and adult materials sent to children.”

Saying it had the right to block “controversial or unsavory” text messages, Verizon Wireless last week rejected a request from Naral ProChoice America, the abortion rights group, to make Verizon’s mobile network available for a text-message program. But the company reversed course this morning, saying it had made a mistake.“�e decision to not allow text messaging on an important, though sensitive, public policy issue was incorrect, and we have fixed the process that led to this isolated incident,” Jeffrey Nelson, a company spokesman, said in a statement.“It was an incorrect interpretation of a dusty internal policy,” Mr. Nelson said. “�at policy, developed before text messaging protections such as spam filters adequately protected customers from unwanted messages, was designed to ward against communications such as anonymous hate messaging and adult materials sent to children.”

Saying it had the right to block “controversial or unsavory” text messages, Verizon Wireless last week rejected a request from Naral ProChoice America, the abortion rights group, to make Verizon’s mobile network available for a text-message program. But the company reversed course this morning, saying it had made a mistake.“�e decision to not allow text messaging on an important, though sensitive, public policy issue was incorrect, and we have fixed the process that led to this isolated incident,” Jeffrey Nelson, a company spokesman, said in a statement.“It was an incorrect interpretation of a dusty internal policy,” Mr. Nelson said. “�at policy, developed before text messaging protections such as spam filters adequately protected customers from unwanted messages, was designed to ward against communications such as anonymous hate messaging and adult materials sent to children.”

13


Prelo: Bold + Bold Italic 9/11 pt

Prelo: ExtraBold + ExtraBold Italic 9/11 pt

Prelo: Black + Black Italic 9/11 pt

Saying it had the right to block “controversial or unsavory” text messages, Verizon Wireless last week rejected a request from Naral ProChoice America, the abortion rights group, to make Verizon’s mobile network available for a text-message program. But the company reversed course this morning, saying it had made a mistake.“�e decision to not allow text messaging on an important, though sensitive, public policy issue was incorrect, and we have fixed the process that led to this isolated incident,” Jeffrey Nelson, a company spokesman, said in a statement.“It was an incorrect interpretation of a dusty internal policy,” Mr. Nelson said. “�at policy, developed before text messaging protections such as spam filters adequately protected customers from unwanted messages, was designed to ward against communications such as anonymous hate messaging and adult materials sent to children.”

Saying it had the right to block “controversial or unsavory” text messages, Verizon Wireless last week rejected a request from Naral ProChoice America, the abortion rights group, to make Verizon’s mobile network available for a text-message program. But the company reversed course this morning, saying it had made a mistake.“�e decision to not allow text messaging on an important, though sensitive, public policy issue was incorrect, and we have fixed the process that led to this isolated incident,” Jeffrey Nelson, a company spokesman, said in a statement.“It was an incorrect interpretation of a dusty internal policy,” Mr. Nelson said. “�at policy, developed before text messaging protections such as spam filters adequately protected customers from unwanted messages, was designed to ward against communications such as anonymous hate messaging and adult materials sent to children.”

Saying it had the right to block “controversial or unsavory” text messages, Verizon Wireless last week rejected a request from Naral ProChoice America, the abortion rights group, to make Verizon’s mobile network available for a text-message program. But the company reversed course this morning, saying it had made a mistake.“�e decision to not allow text messaging on an important, though sensitive, public policy issue was incorrect, and we have fixed the process that led to this isolated incident,” Jeffrey Nelson, a company spokesman, said in a statement.“It was an incorrect interpretation of a dusty internal policy,” Mr. Nelson said. “�at policy, developed before text messaging protections such as spam filters adequately protected customers from unwanted messages, was designed to ward against communications such as anonymous hate messaging and adult materials sent to children.”

14


Tabular Figures are the best choice, when you need number to line up vertically. �ere are two types of tabular figures: Old-style and Lining. Example showing Prelo Medium and Black, using SmallCaps and Tabular Figures, at 6.5/9 pt

ASSETS CURRENT ASSETS: Inventories: Raw, subsidiary and consumable materials Working in Progress Finished products

1 784 819 1 498 856 13 504 351

BANK DEPOSITS AND CASH: Bank deposits Cash ACCRUALS AND DEFERRALS Accrued income Deferred expenses Deferred taxes Total depreciations and amortisation Total provisions Total assets

Lining Figures designed to match the capitals height and Old-style Figures designed for use with running text. Example showing Prelo Black, Roman Italic and Bold, using Lining and Old-Style Figures, at 7/8.4 pt

GAROSS ASSETS

2003 PROV. & DEPRE

2002 NET ASSETS

249 480

1 784 819 1 498 856 13 254 871

1 958 131 441 908 12 126 768

20 700 607 927

-

20 700 607 927

20 700 524 699

21 815 649 4 478 275 26 340 341

-

21 815 649 4 478 275 26 340 341

21 976 271 6 008 430 27 984 701

705 730 828

203 004 921 3 793 109 453 151 747

252 579 081

259 822 228

GM promises $36bn for union-run trust to end strike and allow contract reforms. SUZY JAGGER in New York GM promises $36bn for union-run trust to end strike and allow contract reforms Suzy Jagger in New York Union negotiators in Detroit have sealed a deal worth at least $36 billion (£17.8 billion) from the board of General Motors to end the car company’s first national strike in 37 years. Terms of the agreement – which covers health insurance, pay and pensions – will be used by the United Auto Workers (UAW) as the blueprint for talks with Ford and Chrysler, which are facing similar disruption among their workers. General Motors has agreed to pay $36 billion into a unioncontrolled trust, which will be invested and used to pay health insurance for GM’s retired workers. It is also thought that GM has agreed to pay existing workers bonuses and lump-sum payments so that it can reach an agreement on the terms of new employee contracts.Under the four-year deal, some existing workers will be offered early retirement with a $35,000 cash sum in order open the way for GM to

hire new workers at much lower pay. �ose who stay on will get a $3,000 bonus once the deal is ratified and an annual bonus of at least 3 per cent of salary. All new workers will be paid less. �e union failed to secure any explicit guarantees about future car models being built in the US. �e UAW expects to decide today which carmaker will go next into pay negotiations. Talks with Ford and Chrysler can proceed before the GM contract is ratified, said Ron Gettelfinger, the UAW president. �e union may even hold negotiations with Ford and Chrysler simultaneously, he said. GM and the UAW reached a tentative agreement at 3am yesterday in Detroit, home of America’s car industry. In a statement, the union said that it had called off the strike and instructed members to return to work at once. �e deal has still to be ratified by a vote of the union’s 74,000 members, expected to take place at the weekend, but Mr Gettelfinger said: “We’re proud of this tentative agreement.” GM investors were keen that the strike should not last long and hit the struggling carmaker’s sales. GM had to seek new contracts because higher labour costs in the US have put it at a disad

15


Layout sample. Example showing Prelo Black, Book, ExtraLight and Medium.

A case for sensor networks.

by GARCIA FLITAUK

Suppose that there exists unstable communication such that we can easily study B-trees. Similarly, we scripted a year-long trace showing that our methodology is unfounded.

C

yberinformaticians agree that cooperative information are an interesting new topic in the field of robotics, and statisticians concur. After years of essential research into multicast methodologies, we argue the simulation of ecommerce, which embodies the key principles of cryptoanalysis. Our focus in this position paper is not on whether Internet QoS and IPv6 can interact to realize this goal, but rather on proposing a stable tool for refining kernels (FlitAuk). Even though such a claim is rarely a practical ambition, it often conflicts with the need to provide Boolean logic to hackers worldwide. Cooperative information and DHCP have garnered tremendous interest from both security experts and computational biologists in the last several years. In this paper, we validate the evaluation of neural networks, which embodies the important principles of complexity theory. �e notion that researchers cooperate with peer-to-peer archetypes is always useful. To what extent can neural networks be emulated to surmount this grand challenge? To our knowledge, our work in our research marks the first system analyzed specifically for digital-to-analog converters. �e basic tenet of this solution is the improvement of superblocks. FlitAuk turns the relational epistemologies sledgehammer into a scalpel. We emphasize that our system is derived from the development of co sistent hashing. Two properties make this method perfect: our methodology creates consistent hashing, without observing the Ethernet, and also FlitAuk manages architecture. FlitAuk investigates architecture. �e disadvantage of this type of solution, however, is that the partition table can be made real-time, “smart”, and atomic. Of course, this is not always the case. However, this solution is always excellent. Two properties make this method ideal: FlitAuk turns the pervasive epistemologies sledgehammer into a scalpel, and also our framework emulates wireless models. �is combination of properties has not yet been investigated in prior work. In this position paper, we concentrate our efforts on validating that randomized algorithms and 802.11 mesh networks are always incompatible. �is is an important point to understand. Without a doubt, we emphasize that our framework is derived

16

from the principles of cryptography. Nevertheless, this method is entirely well-received. �e rest of this paper is organized as follows. We motivate the need for context-free grammar. Continuing with this rationale, to answer this obstacle, we present new interposable symmetries (FlitAuk), proving that the Ethernet and courseware can synchronize to fulfill this ambition. Next, we validate the study of the producerconsumer problem. Finally, we conclude. After several weeks of onerous architecting, we finally have a working implementation of FlitAuk. We have not yet implemented the homegrown database, as this is the least robust component of FlitAuk. It was necessary to cap the instruction rate used by FlitAuk to 1577 teraflops. A major source of our inspiration is early work on amphibious configurations. Instead of improving localarea networks, we fulfill this intent simply by emulating secure algorithms.Without using wide-area networks, it is hard to imagine that the well-known homogeneous algorithm for the visualization of randomized algorithmsby G. Lakshminarayanan runs in time.We had our solution in mind before S. Bose published the recent infamous work on embedded algorithms. �us if throughput is a concern, our heuristic has a clear advantage. Our approach to voice-over-IP differs from that of Harris as well. Our design avoids this overhead. Several cooperative and heterogeneous algorithms have been proposed in the literature. �ough this work was published before ours, we came up with the approach first but could not publish it until now due to red tape. �e original method to this riddle by Anderson was wellreceived; however, this discussion did not completely accomplish this purpose. Instead of deploying cooperative symmetries, we fix this riddle simply by deploying efficient archetypes. It remains to be seen how valuable this research is to the programming languages community. Similarly, the choice of the lookaside buffer in differs from ours in that we explore only extensive symmetries in FlitAuk. In the end, note that our framework refines real-time epistemologies, without allowing cache coherence; obviously, our framework runs in time. �e concept of “fuzzy” configurations has been studied before in the literature. Next, FlitAuk is broadly related to work in the field of electrical engineering, but we view it from a new perspective: thin clients.


Layout sample. Example showing Prelo Book, Medium, Light, Bold and Bold Italic for highlights.

TRAINABLE TECHNOLOGY

�e learning framework. from the essay by WILSON, K. Z., and WANG, C. On the theoretical unification of writeahead logging and architecture. In Proceedings of the Workshop on Data Mining and Knowledge Discovery (Aug. 1999).

THE MACHINE LEARNING APPROACH to sensor networks is delenge. However, signed models might not be the panacea that fined not only by the deployment of IPv7, but also by the esbiologists expected. We view software engineering as followsential need for lambda calculus. In our research, we disconfirm ing a cycle of four phases: synthesis, emulation, improvement, the synthesis of red-black trees. In order to fix this obstacle, and evaluation. Combined with psychoacoustic information, we verify that while the acclaimed amphibious algorithm for such a hypothesis develops an analysis of redundancy. �e the intuitive unification of congestion control and agents is reusual methods for the visualization of context-free grammar cursively enumerable, e-commerce and the UNIVAC computer do not apply in this area. �e basic tenet of this method is the are continuously incompatible. �e simulation of RPCs has anunderstanding of Internet QoS. On the other hand, trainable alyzed the location-identity split, and current trends suggest technology might not be the panacea that scholars expected. that the refinement of kernels will soon emerge. An extensive Combined with mobile configurations, such a claim improves quagmire in programming languages is the refinement of the a novel application for the analysis of the memory bus. Motivated by the need for agents, we now construct a framework structured unification of Scheme and robots. In this work, we show the improvement of model checking. �us, interactive for confirming that robots can be made peer-topeer, adaptive, and adaptive. Although end-users continuously hypothesize information and perfect theory have paved the way for the improvement of RPCs. Motivated by these observations, the the exact opposite, our framework depends on this property understanding of robots and cacheable models have been for correct behavior. Rather than locating the improvement extensively synthesized by of architecture, DopLampers computational biologists. We chooses to visualize e-comview e-voting technology as merce. �is may or may not Motivated by the need for agents, we now following a cycle of four phasactually hold in reality. We cones: emulation, management, construct a framework for confirming that robots sider a methodology consisting exploration, and synthesis. We can be made peer-topeer, adaptive, and adaptive. of n neural networks. We use emphasize that DopLampers our previously evaluated reAlthough end-users continuously hypothesize the sults as a basis for all of these harnesses classical algorithms. exact opposite, our framework depends on this assumptions. Despite the fact Similarly, existing semantic and encrypted frameworks that it might seem counterinproperty for correct behavior. use the simulation of Internet tuitive, it usually conflicts with the need to provide journaling QoS to manage 16 bit archifile systems to cyberinformaticians. Our system relies on the tectures. Furthermore, for example, many applications store replicated models. Combined with red-black trees, it studies a theoretical methodology ou lined in the recent famous work novel framework for the evaluation of IPv4. Here we prove not by Zheng et al. in the field of electrical engineering. Along these only that the seminal ubiquitous algorithm for the evaluation of same lines, we postulate that the lookaside buffer and consiserasure coding by John Hopcroft is NP-complete, but that the tent hashing can interact to overcome this problem. Although same is true for superblocks. Without a doubt, the shortcomphysicists entirely estimate the exact opposite, our heuristic ing of this type of solution, however, is that Markov models depends on this property for correct behavior. �usly, the deand architecture can interfere to surmount this grand chalsign that our heuristic uses holds for most cases.

17


Videnskab & Debat Prelo Black International Prelo Bold World News Prelo Medium Business Prelo Light Politik Prelo ExtraLight Bolsa Prelo Hairline

Videnskab & Debat

International

World News

Business

Politik

18

Bolsa


Editorial & Opinião Prelo Black Italic Finanzmarkt Prelo Bold Italic Life & Style Prelo Medium Italic Concerto Prelo Light Italic Søndag Prelo ExtraLight Italic Artes Prelo Hairline Italic

Editorial & Opinião

Finanzmarkt

Life & Style

Concerto

Søndag

Artes

19


OVERVIEW

[i+I]

CASE-SENSITIVE FORMS Shifts various punctuation marks up to a position that works better with all-capital sequences or sets of lining figures; also changes oldstyle figures to lining figures.

[a+A]

SMALL CAPITALS �is feature turns lowercase characters into small capitals. �is corresponds to the common SC font layout. It is generally used for display lines set in Large & small caps, such as titles. Forms related to small capitals, such as oldstyle figures, may be included.

[F+F]

SMALL CAPITALS FROM CAPITALS �is feature turns capital characters into small capitals. It is generally used for words which would otherwise be set in all caps, such as acronyms, but which are desired in small-cap form to avoid disrupting the flow of text.

[0+0]

SLASHED ZERO Some fonts contain both a default form of zero, and an alternative form which uses a diagonal slash through the counter. Sometimes, it can be difficult to distinguish between 0 and O (zero and capital O) in any situation where capitals and lining figures may be arbitrarily mixed. �is feature allows the user to change from the default 0 to a slashed form.

¡¿abc?! (gxh-wtp) > ¡¿ABC?! (GXH-WTP)

¡¿ABC?! (Gxh-Wtp) > ¡¿ABC?! (GXH-WTP)

0123456789 > 0123456789

[ffi]

STANDARD LIGATURES Replaces a sequence of glyphs with a single glyph which is preferred for typographic purposes.

[s+ſ]

HISTORICAL FORMS Some letterforms were in common use in the past, but appear anachronistic today. �e best-known example is the long form of s. Some fonts include the historical forms as alternates, so they can be used for a ‘period’ effect. �is feature replaces the default (current) forms with the historical alternates. While some ligatures are also used for historical effect, this feature deals only with single characters.

s si sl sh st ss > ſ � � � � �

FRACTIONS Replaces figures separated by a slash with ‘common’ (diagonal) fractions.

1/2 1/4 3/4 1/3 2/3 1/8 3/8 5/8 7/8 > ½ ¼ ¾ ⅓ ⅔ ⅛ ⅜ ⅝ ⅞

[½]

20

fi fl ffi ffl fj ffj Th > fi fl ffi ffl � � � � �


OVERVIEW

[&+&]

ACCESS ALL ALTERNATES �is feature makes all variations of a selected character accessible. �e user may need a glyph outside the context supported by the normal substitution, or the user may not know what feature produces the desired glyph.

&yýÿŷỳ > &yýÿŷỳ

SCIENTIFIC INFERIORS Replaces lining or oldstyle figures with inferior figures (smaller glyphs which sit lower than the standard baseline, primarily for chemical or mathematical notation).

H2O (25,000) > H2O (25,000)

SUPERSCRIPT Replaces lining or oldstyle figures with superior figures, primarily for footnote indication, but also usefull for formulas and other mathematical purposes.

z(12-4,693) = x21 y7 > z(12-4,693) = x21 y7

[1st]

ORDINALS Replaces default alphabetic glyphs with the corresponding ordinal forms for use after figures.

1st 2nd 3rd > 1st 2ⁿd 3rd

[2+2]

OLDSTYLE FIGURES �is feature changes selected figures from the default lining style to oldstyle form.

0123456789 > 0123456789

[1+1]

TABULAR FIGURES Replaces figure glyphs set on proportional widths with corresponding glyphs set on uniform (tabular) widths. Ideal for setting tables, where the number should be vertically aligned.

[H2]

[x3]

[€]

CURRENCY Includes several currency symbols, both for linning and old style figures.

0123456789 > 0123456789 0123456789 > 0123456789 €£$¥₡ƒ¢$€£$¥₡ƒ¢

All the typefaces available for sale at www.dstype.com are available in OpenType. For more information about the features of our typefaces, please contact us: info@dstype.com For more information about OpenType, visit the website http://www.adobe.com/type/opentype/

21



PRICE LIST

Single User Price of a single font Price of full Prelo

Nº of fonts 1 font 18 fonts

Nº of CPU 5 5

Price €40 €400

Packages Prelo: Pack of 8 Styles Prelo: Pack of 6 Styles Prelo: Pack of 4 Styles

Nº of fonts 8 fonts 6 fonts 4 fonts

Nº of CPU 5 5 5

Price €200 €160 €120

Multiply x1 x2 x3 x 3,5 x4 x 4,5 x5 x 5,5 x6 x 6,5 x7

Nº of CPU 5 10 20 30 40 50 60 70 80 90 100

Price €40 €80 €120 €140 €160 €180 €200 €220 €240 €260 €280

Multiple Users Base Price For instance: to the price of a single font

In the Packages, you can choose the fonts you need for your purposes, but if you think these packages don’t fit your needs, feel free to contact us. You can use the multiply chart to check the prices of the fonts you need. Just insert the values provided for single users and/or packages, the number of CPU’s and use the multiply to get your price. If you have any questions about prices, please contact us: info@dstype.com



DSTYPE was founded in late 1994 by Dino dos Santos and since then designed typefaces for several corporations, magazines and cultural projects. Dino dos Santos graduated in Graphic Design by ESAD, Matosinhos in 1994. In 2002 was awarded with an MPHIL in Multimedia Arts at FBAUP, Oporto, with a thesis on Digital Typography in Multimedia Environments. Teaches Typographic Studies at ESAD Escola Superior de Artes e Design, Matosinhos and Communication Design in the Master Graduation of Industrial Design, FEUP Faculdade de Engenharia da Universidade do Porto. His typographic work is published in several magazines which include Computer Arts (UK), Creative Review (UK), Page (DE), Publish (PT), Page (PT), among others. Designed some notable typefaces like ANDRADE (winner of the Creative Review Type Design Awards, for the Best Revival/Extension Family, 2005), NERVA (Notable Releases of 2005 for Typographica), ESTA (Best Serif Font of 2005 for MyFonts and Favorite Fonts of 2006 for Typographica), ESTILO (Favorite Fonts of 2006 for Typographica) and ESTILO SCRIPT (Best Script Font of 2006 for MyFonts). Work exhibited in several places around the world. Contributes regularly to conferences, seminars and publications. DSTYPE specializes in creating custom typefaces including, completely new typefaces for every purposes, improving balance, legibility and fine tunning existent typefaces and/or logotypes. You can also order typefaces using our email address. Please contact us for more information.

DSTYPE, UNIPESSOAL LDA. RUA ÓSCAR DA SILVA 1234, 4 ESQ 4450-754 LEÇA DA PALMEIRA MATOSINHOS - PORTUGAL PHONE +351 916 166 740 EMAIL: INFO@DSTYPE.COM URL: WWW.DSTYPE.COM



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.