Looking for Pixma plus 35mm slide scanning!

Hello.
I used to have a Canon Pixma printer with a 35mm scanning facility built in to the lid. Broke down some time ago, unfortunately.
And now Canon don't do Pixma printers with 35mm scanning.
Been scouring the internet for an MG8250 or equivalent, with no luck. I don't WANT to change from Pixma. I think it's possibly the best colour print system you can buy, but I do need that 35mm slide scanning facility, so any suggestions as to an alternative product, i.e. a good quality colour printer (plus copier plus flatbed scanner plus 35mm slide scanner), offering similar print quality as the Pixma?
I suppose one alternative is to buy a stand-alone 35mm neg scanner, but I also have a number of ancient (1890s) large b&w negatives so a 35mm-only carrier wouldn't do - I need something where I can use bits of tape etc. to hold odd-sized films.
Thanks for reading, and I hope someone has a suggestion or two.
Allen.

Aside from looking at the pretty transitions, did you read
the rest of the
page? See the part where it says "Step 1 - copy and
paste....."
Then do Step 2. It just can't get any easier than that.
Read the bit underneath step 2 and it tells you how the
script can be used
multiple times on a page - Again - step 1: you give it a new
name in the
javascript file, and add the names and paths of the images
for the
consecutive slides you wish to display. Then, again, Step 2 -
you call the
slideshow somewhere on your page.
Without sounding condescending, sit back, read the
instructions again, and
have a go at implementing them into your page.
Upload your efforts, post a link to the page, and we'll be
able to help you
further if you need it.
You can describe what you have, how you want it to work, but
until we see a
page live, its a bit hard to help further.
Last resort, spring for a paid solution to do it all for you
(which I highly
recommend) -
http://www.projectseven.com/products/galleries/ssm/index.htm
Brendon
"Fugasi" <[email protected]> wrote in
message
news:gju0dl$olu$[email protected]..
> Brendon-
>
> >I've used this one many times before with good
success:
>
> I don't know how to use this, its a bunch of code.
>
> 1. Do I C&P this and paste it into my page? Where on
the page?
> 2. I actually want to have four separate slide shows
happening at once on
> the
> same page. Will this code allow me to do that?
> 3. Right now I have four photos in-line horizontally in
non-css table. I
> want
> those four to interchange as a slow dissolve slide show.
How do I specify
> that
> I want the slide show to appear in the table cells?
>
> Thanks
>

Similar Messages

  • I am looking for a (free, ideally) virus scan/check for my MacBook Pro -- any suggestions?

    I am looking for a (free, ideally) virus scan/check for my MacBook Pro -- any suggestions?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • I have a Konica Minolta DiMage Scan Dual IV scanner for use with 35mm slides. KM refers me to Sony.

    I have not used my DiMage Scan Dual IV scanner since 2005. The KM web site tells me it has discontinued support for the unit but that Sony now does it. I am looking for an update to my software that will allow me to connect the unit to a Mac System 10.6.8, then a 10.7 iMac. Can you provide me with an updated program?

    Hi Guy,
    Welcome to Sony Community!
    Sony is no longer supporting Konica Minolta products. However, as long as the camera body is Sony, the unit will be repaired by Sony for the following situations:
    If you do not know whether the defect is of lens or body.
    If you’re unable to detach the lens/accessory from the main body
    Units requiring repeat repair.
    Additional information for this model will be available on Konica Minolta website:
    http://ca.konicaminolta.com/support/repair/index.html
    Thank you for your post.

  • Looking for XMP schema relevant to scanned documents

    I want to embed XMP metadata in a scanned document, I'm looking for any existing schema or standards or even existing practice by anybody.
    Examples:
    physical sheet number
    side of page (front or back)
    make & model of scanner
    operator name
    scan resolution (DPI)
    paper size
    pixel format
    paper orientation
    Doesn't have to be those exact things, anything relevant would be interesting.

    Thanks for that link. Have to read it.
    I tracked the current problem down to the fact, that Adobe Lightroom puts the usageTerms into an element, looking like
    <xapRights:UsageTerms>
    <rdf:Alt>
    <rdf:li xml:lang="x-default">
    ...some text...</rdf:li>
    </rdf:Alt>
    </xapRights:UsageTerms>
    while bibble Pro 5 puts it into an attribute like
    <rdf:Description ... xmpRights:UsageTerms="..." ...>
    Based on the descriptions about XMP I found so far it is impossible to tell which of both is correct (and where the element or attribute is allowed). Hope to find some answers in that document.

  • Looking for a photo Carousel/Slide

    I have 2 months looking for this and can't make it work and also can't found any control that 100% works
    The idea is simple, I have some photos and want to display it. Also the user must be able to zoom
    My latest attempt was with ScrollViewer and FlipView
    https://social.msdn.microsoft.com/Forums/windowsapps/en-US/ff2d4215-62d2-41de-9e86-bbd739e9c84b/scrollviewer-and-changeview-zoomtofactor?forum=winappswithcsharp#ff2d4215-62d2-41de-9e86-bbd739e9c84b
    This is for a Windows Phone Store app

    Hi,
    There is an sample you can follow up:
    <FlipView>
    <FlipView.Resources>
    <Style
    TargetType="FlipViewItem">
    <Setter
    Property="Template">
    <Setter.Value>
    <ControlTemplate
    TargetType="FlipViewItem">
    <!--Style="{StaticResource VerticalScrollViewerStyle}" is the standard alternative-->
    <ScrollViewer
    HorizontalAlignment="Center"
    VerticalAlignment="Center"
    HorizontalContentAlignment="Center"
    VerticalContentAlignment="Center">
    <ContentPresenter />
    </ScrollViewer>
    </ControlTemplate>
    </Setter.Value>
    </Setter>
    </Style>
    </FlipView.Resources>
    <Image
    Width="600"
    Height="600"
    Source="Assets/images.jpg"/>
    <Image
    Width="600"
    Height="600"
    Source="Assets/images.jpg"/>
    <Image
    Width="600"
    Height="600"
    Source="Assets/images.jpg"/>
    </FlipView>
    You can pin and zoom the image in FlipView.
    Best Wishes!
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place. <br/> Click <a
    href="http://support.microsoft.com/common/survey.aspx?showpage=1&scid=sw%3Ben%3B3559&theme=tech"> HERE</a> to participate the survey.

  • Looking for LR3 plus CS5 book

    I've been playing with my recently acquired LR3 and CS5 applications, and though I'm very pleased at the ways I've been able to use them together, I suspect I'm probably just scratching the surface. I'm therefore looking for a book that will cover both applications, covering how the two integrate within a photographer's workflow. So far, I've only identified one such book,
    http://www.barnesandnoble.com/w/photoshop-cs5-and-lightroom-3-stephen-laskevitch/102335279 3?ean=9781933952673&itm=2&usri=lightroom%2bcs5
    Has anyone gone through this book, and if so what are your thoughts on it? Can folks offer other recommendations? Thanks.
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Eduardo Suastegui
    http://imagesbyeduardo.com

    Greetings!
       Well, I'm not familiar with the book you mentioned, but I do have a generalization.  If you have one book that covers both tools, they will have to cover them less in-depth than two books each covering one tool.  While it is true they both work together, I would think that there isn't that much needed to know about how they integrate.
       Having a good book on LR will give you what you can do in it, and having a good book on PS will likewise tell you what you can do there.  Then it's usually easy to tell which tool you could be using (well, preferentially, anyway!) to do what you want to accomplish. 
    In general, I think a lot of us view PS as the bit-manipulation stage, i.e., LR has already done corrections, cropping, getting it to look almost right.  Then we call upon LR to do anything fancy (filters, removing/adding things, etc).
    In any event, I'd concentrate on what they do individually first, then work on your work flow of when to edit in which tool!
    Cheers!

  • Looking for SFX template: 35mm viewfinder

    Does anyone know if there are some cool 35mm viewfinder type templates already built and available for FCP?
    I'm trying to build one now in Photoshop...it is VERY slow going because I'm such a NEWB to Photoshop....
    I'd like to use the effect for video during photo shoots...kinda like Sports Ill. does....
    Thanks
    Mark

    Mark Westman wrote:
    How this ended up in the DVDSP forum, I do not know...I was researching I guess..and just fell in.
    Sorry..>I'll repost in Final Cut
    And don't let it happen again

  • Looking for Mosquito game app

    hiya. years ago my sister downloaded this mosquito game for her mobile phone but i'm not sure if anyone has heard about it?

    The App Store is the only approved way of getting any apps/games onto an iPod touch or iPhone. You can't simply download a game off any other site and then install it. There is jailbreaking (hacking), but there necessarily won't be the game you are looking for. Plus jailbreaking instantly voids your iPod's warranty as Apple does not approve of it - if you send a jailbroken device into Apple they'll return it, no matter what's wrong with it, simple as that.
    As other people have said, the App Store would be the only way to get it and if it isn't in the App Store then you're out of luck.

  • HP Scanjet5500c dark images from TMA adapter for 35mm slides

    Scanned 35mm slides using the TMA adapter turn out very dark, not suitable for printing. So dark people in the images are identifiable.
    Should there be light showing from the TMA adapter in addition to the flatbed scanner? If so, that's my problem, a burned out bulb. Long time since I've used the TMA adapter so I can't recall if the adapter had a light when new.
    Looking forward to your responses.
    Thanks
    talker

    Hi there @talker2002 
    Welcome to the forums
    By your description, it does seem like a burnt out bulb. As HP does not replace the actual bulbs, I would suggest calling phone support directly to see what your options are.
    If you are calling within North America, the number is 1-800-474-6836 and if you are calling outside of the US/Canada,: click here.
    Best wishes,
    R a i n b o w 7000I work on behalf of HP
    Click the “Kudos Thumbs Up" at the bottom of this post to say
    “Thanks” for helping!
    Click “Accept as Solution” if you feel my post solved your issue, it will help others find the solution!

  • Scanning 35mm slides into iPhoto

    Can I, and if so, how do I scan 35mm slides into an IMac? I have a Nikon Super Coolscan5000. I have plugged it into the USB port on the back of the IMac but the computer does not recognize the scanner.

    Can I, and if so, how do I scan 35mm slides into an IMac? I have a Nikon Super Coolscan5000. I have plugged it into the USB port on the back of the IMac but the computer does not recognize the scanner.
    Sure - all you need is a Mac compatible 35mm scanner with Mac software
    From the Nikon page (found using Google)
    For Macintosh
    CPU: Power PC G3 or later (G4 or later recommended).
    OS: Mac®OS 9 (9.1 or later), Mac®OS X (10.1.5 or later).
    * RAM: Mac®OS 9: 64MB or more (256MB or more is recommended), Mac®OS X: 128MB or more (512MB or more is recommended).
    ** Hard disk: 70MB required for installation (200MB is recommended) with an additional 200MB >(Mac®OS 9) or 550MB (Mac®OS X) of free disk space while Nikon Scan is running.
    Display: 800 x 600 with 16-bit color (full color recommended).
    Interface: * USB: Built-in USB 1.1 ports, USB 2.0. Others: CD-ROM drive required for installation.
    my first suggestion would be to read the Nikon manual - it probably tells everything you need to use it on your Mac
    Or take a look at Preview - it has the capability to import from scanners
    LN

  • Slide scan attachment for 5200 C

    I have an old back-up computer running Widows XP in conjunction with an HP 5200C scanner.  I have the slide scan attachment for the scanner but can't get it to work.   I no longer have any of the operating instructions.  
    What do I need to do?
    This question was solved.
    View Solution.

    Oh ok got ya.
    You must be using one of these shown in this review.
    http://www.andromeda.com/people/ddyer/photo/slide-transfer.html
    Those are a rare piece of equipment. No, there are no instructions on the net for the prism attachment. Very frustrating HP. I heard they were ok but not that great actually.
    So you are asking how to place the slide in the prism and use it, correct?
    The only instructions I can find are for a homemade version that works under the same principle.
    The key is to place the slide in the center of the scanner but position the slide to one end of the prism so I can get as much light as it can to reflect back into the film.
    Look at the example on this web page for the homemade version. The principle should be the same.
    http://www.abstractconcreteworks.com/essays/scanning/Backlighter2.html
    If this is what you are asking, then this should work.

  • Scanning 35mm slide to convert to digital.

    I am about to begin scanning 35 mm slides I have taken over the last 30 years hoping to preserve in a digital format. Are there any tips I should be aware of in preforming this task. I am particularly interested if here are any settings for size... so that when they are projected on screen I have something filling the screen without large amounts of black boarders.
    Also is there any special way they should be stored in iPhoto. (other than events, etc.)
    Any suggestions would be helpful. Thanks in advance.
    Bilco

    Lauraly.....
    I haven't actually done what you intend but here's some things to consider.
    Your 35mm slides have an aspect ratio of 3:2 ( 36mm x 24mm). Normal TVs and many Monitors have and aspect ratio of 4:3. Some widescreens TVs are 16:9. This means you wont get a 35mm slide to fit exactly. Either it will be 'letterbox' sshape on your screen or if you size to fit then something will be cropped off.
    As for scanning you should consider what resolution you need for the end display. If your display has for example a width of 1280 pixels then you should aim to scan the slide to achieve the same number of pixels - which works out to be approx 355 pixels/cm or 900 pixels/inch. For a TV you could probably get away with less.
    If your scanning the slides you may want to go flat out so that the images could also be printed out sometime in the future in which case you may want to scan at something like 3200 or 6400 pixels/inch.
    Once you've scanned the images you'll need a program to make the slide show. Photoshop Elements 5 can do this but in my opinion Proshow Gold is a better program. Don't make a Video CD (VCD) - the quality of the playback is poor. Go for high quality DVD
    Elements can't actually burn the DVD - you need another program for that. Proshow will do everything and more.
    You can download a free program from Microsoft called Photostory 3. It will allow you to make the slide show for playback on your PC - including music - but to make a DVD you need another program. If you have a DVD burner the s/w for that may be suitable.
    Hope this helps.
    Colin

  • Scanning 35mm slides to create slide show

    My objective is to scan 35mm slides and create a presentable slide show for viewing on a computer monitor and TV. (regular TV)
    I am using an Epson 4490 Perfection scanner and Photoshop Elements 2 software.
    This should be relatively easy, but I'm running into difficulty and can find nothing in the "help" section of the software that answers my question.
    How would you set the scanning options to obtain a good quality scan, without the software automatically cropping the slide, and being of good quality when viewed on the monitor/TV?
    After completing the scans, I'll need to create the slide shows and save them to disc. Any suggestions or information you could offer in these areas would also be helpful:
    - Tutorials for creating slide shows, included in the Elements 2 program or elsewhere.
    - What would be the best quality disc to save these to?
    Thanks so much for the help

    Lauraly.....
    I haven't actually done what you intend but here's some things to consider.
    Your 35mm slides have an aspect ratio of 3:2 ( 36mm x 24mm). Normal TVs and many Monitors have and aspect ratio of 4:3. Some widescreens TVs are 16:9. This means you wont get a 35mm slide to fit exactly. Either it will be 'letterbox' sshape on your screen or if you size to fit then something will be cropped off.
    As for scanning you should consider what resolution you need for the end display. If your display has for example a width of 1280 pixels then you should aim to scan the slide to achieve the same number of pixels - which works out to be approx 355 pixels/cm or 900 pixels/inch. For a TV you could probably get away with less.
    If your scanning the slides you may want to go flat out so that the images could also be printed out sometime in the future in which case you may want to scan at something like 3200 or 6400 pixels/inch.
    Once you've scanned the images you'll need a program to make the slide show. Photoshop Elements 5 can do this but in my opinion Proshow Gold is a better program. Don't make a Video CD (VCD) - the quality of the playback is poor. Go for high quality DVD
    Elements can't actually burn the DVD - you need another program for that. Proshow will do everything and more.
    You can download a free program from Microsoft called Photostory 3. It will allow you to make the slide show for playback on your PC - including music - but to make a DVD you need another program. If you have a DVD burner the s/w for that may be suitable.
    Hope this helps.
    Colin

  • Looking for best way to convert 35 mm slides to digital images

    Hello Apple Community,
    Am researching best ways to convert several hundred 35 mm slides into digital images.  There are numerous scanners/converters out there but want to ensure I get the best unit compatable with my iMac (27 inch, Late 2009).  Any suggestions welcome.

    For scanning 35mm slides you need a scanner with a good photometric resolution and geometric resolution.
    For the photometric resolution: Get a scanner with a high density range (D-max) value, to get a good resolution of highlights and shadows.
    For the geometric resolution - sharpness and detail - try to get at least 3200 dp,i to be able to get good 8"x10" prints from your scanned slides, a higher dpi value, if you want to be able to print larger images.

  • Transfering scanned 35mm slides

    What is the suggested file size for scanned 35mm slides to transfer to iDVD? My file sizes I believe are too small at about 260Kb per image, and I think the processor is working so hard to bring them up to the iDVD format, that more often then not, during the burn process my computer will freeze up entirely. And the ones that do complete the burn process, the images are poor quality when watched on a regular television. I am currently using an Epson Perfection to perform the scanning process. thanks for any help.

    oliviagrace,
    See iDVD 6.0 Help - Preparing images for DVD slideshows at http://docs.info.apple.com/article.html?path=iDVD/6.0/en/17.html
    It will answer your qurstion.

Maybe you are looking for

  • What is the difference between exists and in

    hi all if i have these queries 1- select ename from emp where ename in ( select ename from emp where empno=10) and 2- select ename from emp where exists ( select ename from emp where empno=10) what is the difference between exists and in is that only

  • Very Strange:  ReferenceError: Error #1065: Variable txtToonName is not defined.

    I have a flash label on a movie clip with its instance name called 'txtToomName'.  This object has existed, been successfully instantiated and used for over a year without any modifications.  All of a sudden, during the getClassByName() call, I start

  • Error running applet within a jar

    I compile the jar files together with the smack.jar and smackx.jar and then signed the applet try to run with this code for my HTML file <html> <head> <meta HTTP-EQUIV="CACHE-CONTROL" CONTENT="NO-CACHE"> <meta HTTP-EQUIV="Expires" CONTENT="-1"> <titl

  • Word options do not come up when messaging

    Word options do not come up when messaging

  • How to access adata base from BPEL???

    Hi All, I want to access a data base and exceute some queires from the BPEL. eg: want to retrive a row from the database table..how can do this. Thanks Krrish