Can different music be used with different set of photos in a slide show?

Can different music be used with different set of photos in a slide show?

Yes. The basic idea is that you make a playlist of songs and choose that to use with the slideshow, rather than any particular song. In iPhoto 11 you can do this in iPhoto. In earlier versions you do this in iTunes.
There is a limitation. Each song will play the full way through, you can't croassfade from one to another and so on.
Alternatives to iPhoto's slideshow include:
iMovie, on every Mac sold.
Others, in order of price: PhotoPresenter  $29
PhotoToMovie  $49.95
PulpMotion  $129
FotoMagico $29 (Home version) ($149 Pro version, which includes PhotoPresenter)
Final Cut Express  $199
It's difficult to compare these apps. They have differences in capability - some are driven off templates. some aren't. Some have a wider variety of transitions. Others will have excellent audio controls. It's worth checking them out to see what meets your needs. However, there is no doubt that Final Cut Express is the most capable app of them all. You get what you pay for.

Similar Messages

  • Hello,  I am have problems with coruption of the photos in a slide show after burning the DVD in iDVD.  This coruption does not always appear when you preview the project.  I have slowed down the burn rate to 1X and kept the quality to professional.

    I am having a great deal of problems with Data coruption in slide shows after I have burned a DVD in iDVD.  I have changed burn rate from best to 1X with no difference in the coruption.  I have the quality set to professional with no improvement.  The size of the project is near 3.95, so it should fit on a single layer burn.  Should I use either iMovie to create the slide show or "Photo to Movie"?  Also, can anyone comment on how I preserve the highest quality picture resolution with a slide show?  If I do use iMovie or Photo to Movie,  the file size should exceed the 4.2 size so, will I have to buy new DVD's which are capable to handle the double layer burn and upto 8 GB?  What DVD's are recommended?  Any preferred brand?  Are there problems with burning with double layer?  I read on this blog of numerous problems.

    DVDs are LOW resolution by today's standards - only about 0.3 megapixels - so there is no way they your images on a TV set will look "High Definition".  See Preparing images for iDVD slideshows at http://docs.info.apple.com/article.html?path=iDVD/7.0/en/6675.html for recommendations on image sizes to use.  Using larger images won't give you better  quality, andf in some cases, will lower you image quality because  the Quicktime resizing that occurs isn't the best.

  • [svn:bz-trunk] 13716: since include-read-only is a server global setting, we can't have two channels with different value.

    Revision: 13716
    Revision: 13716
    Author:   [email protected]
    Date:     2010-01-22 09:26:12 -0800 (Fri, 22 Jan 2010)
    Log Message:
    since include-read-only is a server global setting, we can't have two channels with different value.  remove the test for the include-read-only false.  update the service-config.xml as well.
    Modified Paths:
        blazeds/trunk/qa/apps/qa-regress/WEB-INF/flex/services-config.mods.xml
        blazeds/trunk/qa/apps/qa-regress/testsuites/mxunit/tests/remotingService/dataTypes/ReadOn lyTest.mxml

    You can give this a try on your Ultimate machine.  While these are said to be for Vista, I used it on my Win 7 machine just fine and it fixed the problems I was having.  Hope it works for you.
    The problem is that Vista, by default, will only use NTLMv2 for authentication, which is not supported by Mac OS X's Windows Sharing service.
    The other problem is the Minimum Session Security for NTVLM SSP based Clients.
    To get around this:
    1.     In Vista, open the Control Panel
    2.     Switch to "Classic" view
    3.     Double-click Administration Tools
    4.     Double-click Local Security Policy
    5.     Or Secpol.msc
    6.     Expand "Local Policies" and select "Security Options"
    7.     Alternate : Type secpol.msc to get editor up then
    8.     Locate "Network Security: LAN Manager Authentication Level" in the list and double-click it.
    9.     Change the setting from "Send NTMLv2 response only" to "Send LM & NTLM - use NTLMv2 session if negotiated"
    10.     Network Security: Minimum session security for NTLM SSP Based (including secure RPC) Clients
    11.     Change the setting from "require 128 bit" to unchecked (No Minimum)
    12.     Click OK
    the real difference between vista and windows 7 procedure is 10 and 11

  • How can I send email using two different email address that both link back to my one exchange account on my Ipad mini

    How can I send email using two different email address that both link back to my one exchange account on my Ipad mini? 
    On my PC I simply have a master return email address and use a POP for the secondary address.  Both are through the one exchange account without a problem.  I need to be able to do the same on my Ipad.

    Ah, I should have made that clear.  My domain didn't come from google.  It was purchased at and is hosted at dreamhost, but I haven't used their email servers in years - I just route everything through gmail.  I actually have a bunch of domains (with websites).
    Gmail has an option that lets someone with custom domains send (and receive) email through gmail using the custom domain once Google confirms proper ownership of the domain (to prevent spammers and such).  Gmail has a setting for "send email as" which allows gmail to be sent using a custom domain as the sender.  I'm pretty sure Apple's old mobileme had this feature too, but I didn't use it.

  • Can I backup two devices (with different documents) to one iCloud account?  For example: iPad and iPhone, not everything is synced between the two, but I would like to backup each (seperately in the cloud), is this possible?

    Hello Apple Community,
    Can I backup two devices (with different documents) to one iCloud account? 
    For example: iPad Air and iPhone 5, not everything is synced between the two, but I would like to backup each (seperately in the cloud).  Is this possible?
    This way when I change from an old ipad to a new, I can restore with the ipad backup, and when I change from an old iphone to a new, I can restore from the
    iphone backup.
    Thank you in advance!

    Terminology check here. Do you really mean a "CD"?  There's a difference in Cloud behavior between content from a physical CD you ripped (which only has Cloud content if you have iTunes Match) and an "album" you bought from the iTunes Store.
    Read references for Home Sharing.
    iTunes: How to share music and video - http://support.apple.com/kb/HT2688 - about Music Sharing and Home Sharing
    Home Sharing Support page - http://www.apple.com/support/homesharing/
    iOS: Setting up Home Sharing on your device - http://support.apple.com/kb/ht4557 - "With Home Sharing in iOS 4.3 or later, you can stream your entire iTunes library over your home Wi-Fi network from your Mac or PC right to your iPhone, iPad, or iPod touch."
    The above can get pretty complicated.  You are probably best off by syncing both devices to a single library and/or updating the libraries on both computers to have the same content.

  • How can I edit multiple clips with different frame rates on the same timeline

    how can I edit multiple clips with different frame rates on the same timeline

    You do not want to edit material from different frame rates on one timeline. You CAN do this, but it is a very bad idea - and this is why.
    Once you establish the sequence frame rate - lets say it is PAL material at 25fps, any material that you drop into the sequence other than 25 fps will have to be changed to play at 25 fps. If the material you add is NTSC (29.97), FCP will DROP 5 frames per sec to bring the frame rate down to 25 fps. Which 5 get thrown away? Every 6th one. This yields a funky cadence that becomes even more complex as as there are also interlaced fields (DV/NTSC is an interlaced format). Oh, and by the way, the image sizes are different as well. DV/PAL has 576 lines of resolution and DV/NTSC has 480. FCP has to scale up the NTSC to fit the PAL frame.
    You do not want FCP adjusting these things on the fly. You want to do a thoughtful (and time consuming) conversion so that you end up with all your material in one format with the best possible image from the conversion process. Compressor can do an adequate job with Frame Controls turned on. The Natress Standards Conversion FCP plugin is another way to go. A third option is to find a post house that can do the conversion for you using a hardware based process.
    The good news is, once everything is in the same format, editing it will be painless and the output process very quick.
    Whatever frame rate/ image size you select, I'd suggest using ProRes for the codec. It is 4:2:2 color and will withstand color correction and composting with much more grace than any variant of DV based codecs.
    Have fun.
    x

  • How can I add donate page with different levels of giving such as $250, $150, $50, Other

    How can I add donate page with different levels of giving such as $250, $150, $50, Other.  I am using Foxy Cart…is this possible?

    From Muse end , you can add texts as donation value with paypal button which would take the users to paypal site for payment, with Foxy Cart you can try the suggestion mentioned here :
    https://forum.foxycart.com/discussion/4417/donation-page-radio-button/p1
    Thanks,
    Sanjit

  • Can I sync two ipods with different ID on the same computer?

    can I sync two ipods with different ID on the same computer?

    Hi,
    Yes you can as long as you have two seperate user accounts on your computer. Hope this helps.
    xxmitchxx90

  • Can I sync two iPads with different users and email addresses on the same computer

    Can I sync two IPads with different users and email addresses on the same computer.

    yes, just make sure you turn off auto-sync to keep everything organized before you try syncing
    on a pc
    edit > preferences > devices - 'prevent ipads, iphones, and ipods from syncing automatically' needs to be checked

  • Can a nook be used with os7

    Can a Nook be used with Apple products?  I don't want network or virus problems.

    Android is the most malware-prone, insecure platform there is - but millions of users seem to survive without dropping like flies!
    I can't answer Q.1 but as for Q2:
    How safe is your smartphone? (Android is the top malware collector)
    A major source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace:
    More than 50 applications available via the official Android Marketplace were initially found to contain a virus.
    Analysis suggests that the booby-trapped apps may have been downloaded up to 200,000 times. The apps are also known to be available on unofficial Android stores too. Once a booby-trapped application is installed and run, the virus lurking within, known as DroidDream, sends sensitive data, such as a phone's unique ID number, to a remote server. It also checks to see if a phone has already been infected and, if not, uses known exploits to bypass security controls and give its creator access to the handset. This bestows the ability to install any code on a phone or steal any information from it.
    Remote removal of the booby-trapped apps may not solve all the security problems they pose. The remote kill switch will not remove any other code that may have been dropped onto the device as a result of the initial infection.
    Moreover, more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.
    http://www.bbc.co.uk/news/technology-13422308
    The data being leaked is typically used to get at web-based services such as Google Calendar.
    The open nature of the Android platform was a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground.
    http://www.bbc.co.uk/news/technology-12633923
    Smartphones and social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.
    Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code
    Users of Facebook, Twitter and Google's mobile operating system, Android, are said to be particularly vulnerable.
    In several cases, the security holes were exploited and used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area, and Android is still in the firing line:
    http://www.bbc.co.uk/news/uk-15600697
    Android: it's getting worse: Juniper found a 400% increase in Android malware from 2009 to the summer of 2010.  We have since seen exponential grow in Android malware over the last several months. The Juniper Global Threat Center found that the months of October and November are shaping up to see the fastest growth in Android malware discovery in the history of the platform. The number of malware samples identified in September increased by 28% over the number of the known Android malware samples. October showed a 110% increase in malware sample collection over the previous month and a striking 171% increase from what had been collected up to July 2011.
    July 2012: Smartphones running Google's Android software have been hijacked by an illegal botnet, according to a Microsoft researcher.
    Botnets are large illegal networks of infected machines - usually desktop or laptop computers - typically used to send out masses of spam email.
    Researcher Terry Zink said there was evidence of spam being sent from Yahoo mail servers by Android devices:  http://www.bbc.co.uk/news/technology-18720565
    One question Juniper always get when discussing our research is if Apple’s iOS is more or less secure than Android? Maybe, but it’s not necessarily because of the security or lack of vulnerabilities in the platforms themselves. The main reason for the malware epidemic on Android is because of different approaches that Apple and Google take to police their application stores. Android’s open applications store model, which the lacks code signing and an application review process that Apple requires, makes it easy for attackers to distribute their malware. There is still no upfront review process in the official Android Market that offers even the hint of a challenge to malware writers that their investment in coding malware will be for naught.
    http://globalthreatcenter.com/?p=2492
    At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.
    Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.
    The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.
    (Apple closed out 2011 with a commanding 52.1 percent share of mobile devices tracked browsing the Web, while Google's Android had just 16.2 percent.)
    And most recently this:
    Millions of people are using Android apps that can be tricked into revealing personal data, research indicates.
    Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins.
    These apps failed to implement standard scrambling systems, allowing "man-in-the-middle" attacks to reveal data that passes back and forth when devices communicate with websites.
    http://www.bbc.co.uk/news/technology-20025973
    And this:
    Freezing an Android phone can help reveal its confidential contents, German security researchers have found.
    The team froze phones for an hour as a way to get around the encryption system that protects the data on a phone by scrambling it.
    Google introduced the data scrambling system with the latest version of Android called Ice Cream Sandwich.
    The attack allowed the researchers to get at contact lists, browsing histories and photos.
    http://www.bbc.co.uk/news/technology-21697704
    Update from May 2013:
    Malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the only platform being actively targeted is Google's Android, which researchers now say is resembling Windows on the desktop PC.
    http://appleinsider.com/articles/13/05/14/mobile-malware-exploding-but-only-for- android
    And in early June 2013 a highly toxic trojan began attacking the Android platform:
    According to reports:
    Obad.a exploits previously unknown Android bugs, uses Bluetooth and Wi-Fi connections to spread to near-by handsets, and allows attackers to issue malicious commands using standard SMS text messages.
    By exploiting this vulnerability, malicious applications can enjoy extended Device Administrator privileges without appearing on the list of applications which have such privileges," Unuchek said. "As a result of this, it is impossible to delete the malicious program from the smartphone after it gains extended privileges."
    More information here:
    http://arstechnica.com/security/2013/06/behold-the-worlds-most-sophisticated-and roid-trojan
    A recent study on smartphone malware has found that 92 percent of nefarious mobile software is targeted at Google's Android platform, and the amount of attacks are growing:
    The latest data released in June 2013 by Juniper Networks reveals that Android malware has grown at a "staggering rate" over the last three years. In 2010, it accounted for just 24 percent of all mobile malware, while as of this March the platform accounts for nearly all of it.
    In the last year alone, the total number of malicious apps has grown 614 percent to 276,259. The annual Mobile Threats support also identified more than 500 third-party Android application stores worldwide that are known to host mobile malware.
    http://newsroom.juniper.net/press-releases/juniper-networks-finds-mobile-threats -continue-ram-nyse-jnpr-1029552
    The far reaching vulnerability, discovered by San Francisco's Bluebox Security, involves "discrepancies in how Android applications are cryptographically verified & installed, allowing for APK code modification without breaking the cryptographic signature."
    Android apps (packaged as an "APK") are signed with an encryption key (just like iOS apps) to prevent a malicious party from changing the code. Signed apps are expressly designed to enable the system to detect any tampering or modification.
    However, due to the newly discovered Android flaw, a rogue developer can trick the system into thinking that a compromised app is still legitimate, giving it system wide access to do virtually anything.
    "A device affected by this exploit could do anything in the realm of computer malice, including become a part of a botnet, eavesdrop with the microphone, export your data to a third party, encrypt your data and hold it hostage, use your device as a stepping stone to another network, attack your connected PC, send premium SMS messages, perform a DDoS attack against a target, or wipe your device," a representative of the company wrote AppleInsider:
    http://appleinsider.com/articles/13/07/03/security-flaw-opens-all-modern-android -devices-to-zombie-botnet-takeover
    The problem (with Android) is: that committee design has failed to make Android a good platform for either users or for developers. By not making any hard choices and giving people what they said they wanted, Google simply abandoned the future to cling tenaciously to the past.
    Rather than conceptualizing and engineering really new solutions to historical computing problems as Apple did with iOS, Google has only attempted to wrest control away from iOS via volume shipments and has effectively sent mobile computing back in time into the 1990s, resulting in the same malware, spyware, viruses and usability issues of Windows.
    http://appleinsider.com/articles/13/07/14/editorial-googles-android-haunted-by-s teve-jobs-warnings-on-app-signing-security
    The Department of Homeland Security considers the malware threat from Android so serious that they issued a public warning on July 23, 2013:
    http://info.publicintelligence.net/DHS-FBI-AndroidThreats.pdf

  • HT4106 I have a camera connection kit for my ipad 2. Can this kit be used with my new ipad air?... If so what adapter is required please

    Camera connection kit for ipad 2. Can this kit be used with ipad air and if so what adapter(s) are required please

    You can try the 30 pin to lightning adapter but I'm not sure if that'll work. So if you get it to experiment, make sure you can return it. Apple does sell a SD to lightning adapter for the newer devices. So that should be a sure bet. The main downside is that your 30 pin camera kit came with both USB and SD for 29 and now the USB adapter is 19 and the SD adapter 29, so more expensive.
    You may want to look into third party adapters, but make sure you use a reputable manufacturer (ie not a cheap no-name off amazon) because iOS7 brought with it software that looks for a signed chip in the adapter. And a chip is 'signed' when a company gets apple's permission to make accessories. I would suggest sticking with companies like Belkin, Kensington and Targus. They seem to be of a better reputation when making things and would have a signed chip.

  • How can I see shared pc with firewall set to allow only essential services?

    How can I see shared pc with firewall set to allow only essential services?
    So far if I set it as above then shared does not show up? I have to set the firewall to set access to specific applications and services to get access to my windows based hard drive.
    Cheers
    Mike R

    Ok I solved it myself. Not an ideal solution as I have to connect it manually each time but it will do... Unless anyone has a way to have it auto connect when I start the mac.
    Cheers
    Mike R

  • Can this extension be used with trial version of dw8?

    The extension:
    http://www.projectseven.com/extensions/info/vscroller/index.htm
    Can ANY extension be used with trial version?
    After I down loaded it and tried to open dw, I got a dialog
    box in which the text was not visible. All I could do was hit 'ok,'
    which quit it.

    Trial versions are fully functional so all extensions should
    work in it.
    Paul Whitham
    Certified Dreamweaver MX2004 Professional
    Adobe Community Expert - Dreamweaver
    Valleybiz Internet Design
    www.valleybiz.net
    "thighmister" <[email protected]> wrote in
    message
    news:eud87r$r06$[email protected]..
    > The extension:
    >
    http://www.projectseven.com/extensions/info/vscroller/index.htm
    >
    > Can ANY extension be used with trial version?
    >
    > After I down loaded it and tried to open dw, I got a
    dialog box in which
    > the
    > text was not visible. All I could do was hit 'ok,' which
    quit it.
    >

  • Can extends keyword be used with respect to interfaces?

    can extends keyword be used with respect to interfaces?

    srinu269 wrote:
    can extends keyword be used with respect to interfaces?Yes. An interface can extend another interface:
    interface A {
        public void a();
    interface B extends A {
        public void b();
    class X implements B {
        public void b() {    
        public void a() {
    }

  • Can older charger be used with MacBook Air?

    Can older charger be used with MacBook Air? Charger with cylindrical magnetic male end was lost. Charger for older white plastic MacBook is available, but is it safe to use with MacBook Air.

    You have to use the right power adapter.
    You can order one from Apple store.
    https://support.apple.com/en-us/HT201700
    Best.

Maybe you are looking for

  • Problem in invoking a BPEL process with complex input

    Hi, I have an asynchronous BPEL process which has a complex request schema. When I try to invoke the process through BPEL Console, it works properly. But when invoking it through Java API, it seems that the input soap message is not well received by

  • Events recovery in Office 2013 and Windows 8 with iCloud

    Hi Guys, I have a serious problem with an end user. In the way to get PC, iPhone and iPad synchronized (calendar and contacts only), I make a calendar and using the iCloud tab under Outlook 2013 for refresh I got 2 records to be visible under PC and

  • Pages 5.2: how to reflow tables

    I am preparing a document and have pasted a table from Numbers. When I add text before the pasted table, the table itslef does not move down with the text. Does anybody know if there is a way to force a pasted table to reflow with the text? Thanks!

  • How to make the description field as mandatory in IW31 T.code

    Hi All, My requirement is make the Description field as mandatory in T.code: IW31 That field is CAUFVD-KTEXT. How to make this field as mandatory, I tried with BADI: IWO1_SCREEN_MODIFY And some customer exists also (ZXWOCU04, ZXWOCU09) but unfortunat

  • Generate an Attachment from an XDATA

    Hello, i have the following problem: i've written an WebDynpro where you can upload some files. Later after an approve there will be a creation of an prelimanary posted accounting doccument. in this step i want to attach data to the acc-document. The