Is Cineform still being used?

Given the capabilities of CS6, are people still feeling the need to use Cineform as opposed to editing natively?
My normal workflow has always usually consisted of first encoding my files (P2 and Red) into the Cineform codec and then editing, but it's a step I'd love to drop if I could.
I could also test out native editing, but I'm just wondering what the community is doing. Thanks.

I've never used Cineform for P2.*  P2 is handled very well, natively, all the way back to CS5 (or was it CS4?).
I use Cineform (GoPro Studio) for two things:
First, and most crucial, is preparing any acquisition format that uses 32-bit quicktime.  Using Cineform gets me around the 4GB RAM limitation of using the 32-bit process. Compared to their 32-bit Quicktime originals, Cineform AVIs edit like butter.
I also use Cineform to prepare AVCHD files from consumer/prosumer camcorders, unless I'm in a crunch and can't afford hours of transcoding just to start editing.  I believe I take a small quality hit when I don't convert.  Maybe it's only psychological.
* Prior to CS4, I was using Sony Vegas and a helper application (Raylight?) to edit P2.

Similar Messages

  • Error: The logical component X is still being used

    Hi,
    In Transaction SMSY, i want to delete a Logical Component. So, pre-condition is to check whether it is mapped to any Projects/Solutions. By right-clicking - Where used list , i have seen that it is mapped to a Project. So, in transaction SOLAR_PROJECT_ADMIN under tab System Landscape, i tried to delete the Logical Component but receiving the error message - The logical component X is still being used.
    Please help.
    Many Thanks,
    Mohan.

    Hello Mohan,
    You can also solve this by using the "Replace Logical Component" button in the system landscape within SOLAR_PROJECT_ADMIN.
    Thus you can replace all the occurances of the Z_ logical component by e.g. an existing standard SAP logical component.
    Afterwards you will be able to delete your Z_ logical component in SMSY (or in LMDB from 7.1 SP9 on).
    Best regards,
    Peter

  • Theft of phone and skype account still being used!...

    Hi.
    My wifes phone was stolen on th 19th of April during a camping trip.
    We reported the theft to the police.
    I have gone onto skype today, and the account is still being used.
    My wife said the only two places skype is installed is on her stolen phone and on her laptop, which isn't on at the moment as she is at work!!
    So whoever stole the phone is using the skype account right now!!!
    I need to find out the IP addresses that have been logged against the user [Redacted for privacy] since the 19th of April.
    I have tried to email support, but the contact form keeps giving an error, so please someone respond as soon as possible so I can relay info to the police please!!
    Kind regards,
    Glenn.

    Hi, Glenn, and welcome to the Community,
    These two commands, when entered into a chat window, may prove helpful:
    /remotelogout
    Sign out all other instances except the current one. This will also stop push notifications on all other instances.
    /showplaces
    Lists other instances where this Skype name is currently signed in.
    Important: Always make sure you are using the latest version of Skype. Some of these commands may not be supported in older versions.
    Here is a link to the original FAQ article:
    https://support.skype.com/en/faq/FA10042/what-are-chat-commands-and-roles?
    If your wife still has access to her account, she should consider signing on to her account details and removing any saved payment methods on file. 
    Skype does not release IP addresses except upon request from law enforcement agencies, who can file to receive this information via official channels.
    Regards,
    Elaine
    Was your question answered? Please click on the Accept as a Solution link so everyone can quickly find what works! Like a post or want to say, "Thank You" - ?? Click on the Kudos button!
    Trustworthy information: Brian Krebs: 3 Basic Rules for Online Safety and Consumer Reports: Guide to Internet Security Online Safety Tip: Change your passwords often!

  • Is code still being used

    We have a large database, with many stored procedures, packages, functions and views that have built up over such a long time that we no longer know which code is still being used.
    Is there any way of finding out if a procedure/package/view/function has recently been executed.
    The only way I could think of was to take away the privileges and see who shouts... but that's probably not the best idea.

    Find objects, that don't have other objects dependant on themDepending on how the database is used, this may or may not prove anything. Procedures that are called from SQL*Plus sessions or DBMS_JOBS wouldn't show up. Searching the text of your front-end application may be a chore as well.
    A similar caveat apllies to trawling the cache. You'd want to make sure you didn't drop procedures that are run once a month or once a quarter or once a year.
    In the absence of adequate documentation the only sound approach is to keep everything. Punishing your users - by removing their rights - for the incompetence of the support team is so wrong.
    Why do you want to get id of somne procedures? They are not like tables, they don't take up much space. Procedures that are not run don't have reported bugs, so they don't generate much additional work. The only issue I can see is when you have to do global work e.g. upgrading the database or applying some generic fix. That is additional work, I agree, but that's the price you have to pay for not having properly documented applications.
    We all do this (or rather don't do this) and we all end up having to do work we suspect is unnecessary but can't prove that's the case. Do we learn? Heck, no.
    Good luck, APC

  • HT4203 I have turned off the Data use on the I-phone 4s but am told by AT&T that data is still being used for applications.  How is this possible. Can someone help me understand this.  Thanks.

    I have turned off the Data use on the I-phone 4s but am told by AT&T that data is still being used for applications.  How is this possible. Can someone help me understand this. 

    I assume you are including the STIX font as part of your epub files?     
    Perhaps the folks who do this blog might be able to help -- they have done some work with font embedding:
    http://www.pigsgourdsandwikis.com/2011/04/embedding-fonts-in-epub-ipad-iphone-an d.html

  • HT1391 Can a stolen Iphone be traced by using the serial number to see if it is still being used. I have had the handset locked but have been told it can be over ridden.

    Can a stolen Iphone be traced by using the serial number to see if it is still being used. I have had the handset locked but have been told it can be over ridden.

    No.
    Contact yoru carrier. They may be able to blacklist it.

  • TS3772 On my iphone 5 i have two iTunes ID, one is no longer in use, but keeps asking for a password which I no longer have, whilst the other is still being used. How do I delete the old ID?

    On my iphone 5 i have two iTunes ID, one is no longer in use, but keeps asking for a password which I no longer have, whilst the other is still being used. How do I delete the old ID?

    Hello steveod2
    The main thing to do is to sign out all services on your iPhone, like iCloud, iTunes & App Store, iMessage and FaceTIme. Check out the article below for more information.
    iOS 7: If you're asked for the password to your previous Apple ID when signing out of iCloud
    http://support.apple.com/kb/ts5223
    Regards,
    -Norm G.

  • Reintalled OS, but disk space is still being used from old files?

    I tried reinstalling the OS after my macbook would freeze when i tried to log in. I first tried to archive and install and then it said it couldn't complete that.I then put in the 2nd OS disc and it created a new user profile and my computer is working fine. The only thing is that a few alias are still being picked up from the old users and there is only 60 GB of space left on the hard drive. None of the information on the old user files is totally important so I can do without it, but I would like all my hard drive space back

    if you don't need the old user go to system preferences->accounts and delete the old user. also, check to see if you have a Previous System,s folder at the top level of the hard drive. delete that too and empty trash.

  • Why is WPA2 still being used??

    This a message I wrote recently in a forum that brought up my idea from a couple of years and every year I see new products/WIFI being released, but not changes so here it is again....and hopefully someone who works with the WIFI alliance can bring this to the table.
    I think WPA 3 or 4 needs to come out...I have written on this in different areas and attempted to contact the Wifi Alliance (Austin Texas) with no luck because I can't afford a $15,000 membership... Also linked a stack exchange post I made talking about the SIMPLE change/additions and the post was deleted....SO here it goes
    Current PSK formula is
    DK = PBKDF2(HMAC−SHA1, passphrase, ssid, 4096, 256)
    What this means is it uses HMAC-SHA1 with your passphrase/ssid, 4096 iterations, and produces a 256 bit key
    So for the past 10+ years people have been able to create databases/rainbow tables, etc because your only solving for 1 piece of the formula.
    First thing that needs to change is the number of iterations, 10+ years ago hardware could only bruteforce 100-300 passwords a second. The number of iterations needs to be increased in order to bring that change back in effect. Currently with GPU's this number reaches the 10's of thousands (actually more).
    The next thing would be to change the salt to include the mac of the ***router or client/both so that each router brute forced would require starting from scratch
    DK = PBKDF2(HMAC−SHA1, passphrase, ssid + Router mac***, 4096000, 256) *iterations are 100 times current..not sure if hardware can take this, again it would have to be tested, the number shown is just for illustration purposes.
    Next we need to take the HUMAN element out of the Equation.
    1) a password of 12 or more needs to be implemented
    2) if not already present in the password entered, the router would then GIVE the user a couple of permutations that include at least TWO upper/TWO lower/TWO special characters/TWO numbers and make them choose one. In other words the router would not allow anything less than a more "sophisticated" password.
    Another option would be that after the first formula is used and the client connects successfully the FIRST TIME.... the router then "remembers" that mac address and now the formula changes to
    DK = PBKDF2(HMAC−SHA1, passphrase, ssid + Router Mac, RND, 256)
    Where RND is a random number generated by the router 6-8 digits long for the iterations. Unless a "Hacker" just happened to catch the first handshake and then ran through the set standard 500,000 iteration formula and happened to find the password (being able to decrypt the aes256 exchange of RND), from that point on the formula would be different. This could be the same for the router, or even more secure, for each client connected. So the router would keep a table of Client macs and RND so when the client says "HELLO I want to connect" it would be done using the RND value/formula. If someone was to find how the RND value was saved on the client (physical access to the client) then it would be different for each client. After X many days/X many hours this could be re-set/established again using the first formula and AES256 as an option.
    So this is just some Ideas, with todays technology/hardware it shouldn't be that hard to do. WPA2 is old and getting easier to crack. Many wordlists have been created that easily go up to 10 if not more... "hackers" have been generating wordlists for YEARS. Making the first formula iterations high enough to slow down the brute force attack, and then making the hacker start from scratch with the combination of SSID + Router Mac, PLUS add the fact that after the client is first set up/connected to that router making the number of iterations RND (6-8+ digits)........this just makes it VERY VERY VERY difficult for a wardriver to accomplish finding the password.
    One last thing to add would be to encrypt the DEAUTH packets.. Currently a "wardriver" can deauth the client and when the connection is regained it captures the 4 way handshake...prevent this and again it would be a little more difficult to capture that handshake. Also even if it is captured and its not the FIRST time... it would be a RND value so the "wardriver" wouldn't know where to start, but from scratch. This time with every combination of a 12 character min password, and for each RND 6-8* digit of iterations...
    Honestly with something like this implemented (which isn't too far fetched, especially the simple formula change adding router mac***), and possibly the Random Iterations, wardriving would almost become worthless. Currently a wardriver knows the formula and nothing changes so there is SOME hope that the user used a really easy password, but with the option above even trying the correct password wouldn't work (unless was the first time or a re-authentication time). Even still it would be with a new formula that uses 12 min password/more iterations.
    Hopefully I don't get trashed on this post, all criticisms/ideas/opinions are open.

    thank you for your reply..
    Hopefully it will change... back when this idea was originally thought of (when attempting to vb.net a PSK just for fun), I took into account costs...thats why the changes are pretty simple depending on hardware.  I remember when WPA, WPA 2 first came out it, it was just the cost of a router/new devices (back then lots of money, now routers/hardware is less expensive), depending on the current hardware a simple coding could just be updated (firmware)...example the new WIFI Passport system could be implemented on older hardware once tested/certified...at least according to WiFi alliance.
    The other reason for the change again is the 10+ years of using the same system, i understand it "secure" but with all the computer breaches/security breaches this is just one method to prevent it.  I would definitely upgrade if a newer secure encryption came out...however this really isn't a new encryption, same scheme, basically same formula with a different implementation, which is why I think a simple upgrade would be great...
    so a real world example of the implementation..
    Client says "Hello"
    Router uses DK1 = PBKDF2(HMAC−SHA1, passphrase, ssid + Router Mac, 24576, 256) to encrypt a random number between 15000-30000 and uses it to send its message AES(16745 & message authentication, DK1).
    Client uses DK1 to reverse it to get 16745/message authentication and now uses DK2 = PBKDF2(HMAC−SHA1, passphrase, ssid + Router Mac, 16745, 256) to AES(original message, DK2) in order to show the router that I have the original key/and have recived the new iterations.
    The router now stores 16745 and the client stores 16745 from that point on when wanting to communicate with that mac address.  makes it totally random except the first formula.
    anyway just a concept.. thanks for your reply again.

  • Memory still being used but no songs playlists being shown

    I went to charge my I-pod, using the adapter, and when I went back later to start playing songs, it showed that all the songs were gone (or not being shown) and no playlists!
    But the weird thing is, my I-pod is still using the same amount of memory. I did the manual reset and still it's the same!
    Anyone can explain this or help me out?
    Cheers!

    First thing to check is if the songs show up when you connect your iPod to you computer and open iTunes.
    If they do not, you will need to Restore your iPod using the iPod Updater. NOTE: this WILL ERASE all music on your iPod.
    The disappearance of your music is usually caused by corrupt iPod software. The restore will fix things.

  • I have downloaded version 4.0 but my current 3.16 version is still being used .how do i switch to the new version on my mac10.6

    i have a mac 10.6 and use firefox 3.16. i have just downloaded an updated version 4.0 which is in the down load folder but the version i am still using is the previous one . how do i use the latest version. i am a new user of apple mac.

    https://support.mozilla.com/en-US/kb/Installing+Firefox+on+Mac

  • Ram still being used after quitting

    hi, I know Mavericks handles Ram in a more effective way but why is it that I have programmes still running in the activity Monitor even though I have quit them?

    If an applications appears in the Activity Monitor then it is still running. This would indicate one of two things: 1) the program isn't responding. Usually programs that have stopped responding will have a message next to their name indicating that and/or appear in red text. 2) You closed all the windows of the program which, in Windows, would quit the application. But this is not typical Mac behavior. To quit a program on the Mac you must select Quit from the Application menu or use command Q.

  • Cloud icon doesn't appear; space still being used on ipad (or is it on my computer? I'm confused!)

    What is the main selling poiint of iTunes Match? I subscribed because I'm loading my cds onto my new ipod, and I have more cds than it will hold. But the gb space didn't go to zero. Do we have to manually delete every song?

    KeithJenner is correct - if you have music on your iPad and you sign up for iTunes Match, the locally stored music is not automatically removed.  You have to do that yourself as he described.  After you have removed the music from your ipad, if those songs were also on the computer you used to sign up for iTunes match, you will still see them in the music list on your iPad.  If you click to play a song it will download a copy.  There are other ways to download music too, such as from a button at the bottom of an album track list or from a playlist.
    The headline of your post said "cloud icon doesn't appear."  If you tell us where you are looking for a cloud icon and what you want to do with that cloud icon., we might be able to help you.  cloud icons of one sort or another are used in many places in iTunes Match.
    You also asked what the main selling point is for iTunes Match.  While every person has their reason for using the service, in general it is looked at as a way to have access to all of your music on all of your devices, without having to keep all of your music locally stored on them all.  It lets people with different music on more than one computer add it all to a central location too.  You can read more about it at the link below.  There is a link to a video at the top of the page that you might find helpful
    http://www.apple.com/itunes/itunes-match/
    Message was edited by: JiminMissouri

  • Lost all music on ipod but the space is still being used

    I have seen this posted already and i apologize for a repeat. Those posts didnt have any useful info though.
    My problem:
    I am in France staying at a friends house. I brought my new 60 gig ipod video with me and was charging it on his laptop. I believe what happend was his laptop fell asleep while my ipod was still plugged in. I disconnected my ipod and went to listen to a song and all of my music and video files were gone. My photos are still there. I checked the about menu in the settings are and it says i have 40 Gigs available space. This means the videos and music are still using space. Does anyone know how to get them out of hiding? I really need the help and id like to be able to have my music for the 10 hour plane ride home!
    thanks everyone!
    60 gb video    

    Welcome to Apple Discussions!
    Try resetting your iPod...
    Reset iPod
    If that doesn't work, try restoring your iPod (if you have the music on a computer with you)...
    Restore iPod
    And then put the music/videos back on
    If you don't have the computer with the music on it, try downloading YamiPod...
    YamiPod
    And then do this...
    http://www.yamipod.com/main/modules/docs/help/corruptedipod.php
    btabz

  • How do i sync my new iphone to itunes, i want to keep my old iphone on there to as it is still being used?

    Ok first of all sorry if this is posted in the wrong place.
    Today i got my new iphone and i want to sync it to itunes and have what is on the old iphone on the new one as well.   I don't want to loose what is on my old iphone as my daughter is now using it and is happy with having every thing the same on the phone. Both phone are using the same apple id.  When i put it on the computer it came up only with set up as new iphone or back up from the ipad.  I just not sure if i am to set it up as a new iphone or back up from the ipad.
    would appreciate some help please.
    Thanks, sarah.

    CrimsonButterfly wrote:
    Ok first of all sorry if this is posted in the wrong place.
    Today i got my new iphone and i want to sync it to itunes
    Plug it in and sync it.
    If you have the old phone backed up and want all the info from the old iPhone on this iPhone select Restore from backup.

Maybe you are looking for

  • Managed Metadata Fields not showing up in preview mode

    0down votefavorite In our SharePoint 2013 Publishing page, managed metadata fields doesn't show in preview, they show up only in edit mode or after we publish page. Is this bug? Thanks in advance.

  • HT1491 how do i change over from the american itunes store to the Australian store?

    How do i change over from the american itunes store to the Australian store? I was switched over when I was looking for something that was not available in the Australian store and now I cant get back.

  • Song Not playing

    When i try and play certain songs, my itunes comes up with the message that, "This computer is not authoized to play song ...."  . When i go to autorize my computer, It says that it has already been authorized by me, which it has in the past obviousl

  • Force Date "Display Pattern"??

    Greetings, We are having troubles with the "Display Pattern" of Date fields.  The scenario is that we receive data in XML, apply it to the form, and then want it displayed in a specific format on the Form, but it doesn't work like it should. For exam

  • Broken session

    I've got a problem when running my internet application on Oracle App. Server 1.0.2.2.1 in SSL mode. Clients are IE 5.0, 5.5 and 6.0. The application uses more instances of web browser at the same time (using the same session). In non-secure mode, ev