PSE8: Who is this?

I just upgraded to PSE8 from PSE7.
I was looking at some pictures in Organizer by selecting a tag.
I noticed that there was a little 'bubble' over one of the images with
the text 'Who is This?'. I suspect this may be part of the
automatic people recognition. But I wanted to check.
The Auto-Analyzer Options are set to the default, I believe.
Recognize People Automatically is checked.
But Analyze All Media in Catalog Automatically is not checked.
What is happening here?
fwiw, I did click on the Help in the Auto-Analyzer Options Preferences
window. For some reason, I can't get the Help for that window.
Help seems to work ok for other windows, though.
It opens a browser tab and brings me to the appropriate subject.
Thanks for any help. This Auto-Analyzer looks interesting.
But I'd like to understand it a bit better before I go too far.

Thanks, John!
Now I'm getting it.
I ran through a set of images.
Sure enough as I moved through them the application got
better and better at suggesting the correct person for the face.
Pretty cool. My tags are working out fine.
As Barbara mentioned, I get the little bubble with the 'Who is this?' to
remind me to run People Recognition on the images.
I think I will leave that on to remind me.
A couple more things:
1. When I start up People Recognition I get my images in a window
with arrows on the left and right to move back and forth through the set.
But I can't tell when I am at the end of that set. As far as I can tell the arrow
is still enabled when I'm at the last image.. It doesn't look grayed out to me.
So I keep clicking thinking something is hung up. Am I missing something
on that window that clues me in to the fact that I've reached the end of
the set?
2. I think the Analyzer has finished with all my JPEGs. It now seems to be working
on the handful of .AVI files that I have. Is it my imagination, or does this take a very
LONG time to complete. I think it has been working on this one .avi file all night.
And I don't think my files are even particularly large. But of course they are monstrous
compared to a jpeg.
Thanks!

Similar Messages

  • I can't be the only person who has this problem - when a month ends on a Saturday I can't drag events into the next month and instead have to cut and paste - a real pain in the butt. I thought there was something called "scroll" but I can't find that

    I can't be the only person who has this problem with iCal- when a month ends on a Saturday I can't drag events into the next month and instead have to cut and paste - a real pain in the butt. I thought there was something called "scroll" but I can't find that.

    Yeah that works, but, it involves a click on the event, a click on edit, a click on the date, keystrokes, plus, since you can't see the next month you have to have a calendar in front of you so as to put it to the right date. It's easier just to cut it and advance the month and paste it, once you are in the right month you can move it around helter skelter willy nilly no problems. Although now that you mention it I will try it, maybe it is easier than cut and paste as I don't really care about the date, as long as it gets moved into the right month I can drag it around all I want.

  • Affinity queries ("customers who bought this item also bought...")

    Hi,
    Do you know the feature of many web shops, where you can see similar items (i.e. "customers who bought this item also bought...")?
    A simple approach would be to return similar items from the latest orders. What I would like to list are products, which were bought BY MANY OTHER CUSTOMERS in addition to the origin product. So I have to somehow count the matching products from all orders. How can I do this?
    Has anybody thought of a way how to select meaningful similar items to a product?

    You might also look at Oracle data Mining, though I haven't used it myself. From the documentation:
    4.2 Association
    An Association model is often used for market basket analysis, which attempts to discover relationships or correlations in a set of items. Market basket analysis is widely used in data analysis for direct marketing, catalog design, and other business decision-making processes. A typical association rule of this kind asserts that, for example, "70% of the people who buy spaghetti, wine, and sauce also buy garlic bread."

  • What is y3.online.sec.update and why/who is this t...

    Hello:
    What is y3.online.sec.update and why/who is this trying to call me/message me via my skype?
    Normally if there is an official skype security update/fix it is automatic when I log in so is this some type of phishing scam?   I blocked the contact.
    Thanks for your help.
    Solved!
    Go to Solution.

    you can also visit the thread below for instructions and suggestions on how to deal with such unwanted and suspicious activities;
    How to Handle Suspicious Calls, Messages and Contact Requests (Scam/Spam)
    IF YOU FOUND OUR POST USEFUL THEN PLEASE GIVE "KUDOS". IF IT HELPED TO FIX YOUR ISSUE PLEASE MARK IT AS A "SOLUTION" TO HELP OTHERS. THANKS!
    ALTERNATIVE SKYPE DOWNLOAD LINKS | HOW TO RECORD SKYPE VIDEO CALLS | HOW TO HANDLE SUSPICIOS CALLS AND MESSAGES
    SEE MORE TIPS, TRICKS, TUTORIALS AND UPDATES in
    | skypefordummies.blogspot.com | 

  • Hi I have adobe CC for teams, a team member is having problems opening indesign we are being asked for a serial number, ive checked on our admin account and he is one our our registered 'members'. I wasnt the person who set this up originally so I'm a bit

    Hi I have adobe CC for teams, a team member is having problems opening indesign we are being asked for a serial number, ive checked on our admin account and he is one our our registered 'members'. I wasn't the person who set this up originally so I'm a bit lost, i cant seem to find any serial numbers on the my account section and it seems we have no registered products? can you help?

    Hi There,
    We have checked the details of your team, all seat are assigned properly.
    Now there are few details that we would need in a Private Message so that I can assist you appropriately.
    Name of the user:
    Email of the user:
    Meanwhile, try the below mentioned links.
    Creative Cloud applications ask for serial number
    Sign in, activation, or connection errors | CS5.5 and later, Acrobat DC
    [Note: Details that we need is critical, make sure you send them in via Private Message only.]
    Thanks,
    Atul Saini

  • Who runs this company and where are they hiding?

    How is it that Verizon has no problem taking your money.......but has no desire to give back what is yours?  I returned something for $265.00 almost a year ago and no credit has yet to be seen.  I have had my service turned off several times and also the $5.00 late fee.  No one.... I mean NO ONE  that I have talked with which includes managers on the phone and managers in the store can handle this problem.  However I keep getting those harassing phone calls and texts about my service being turned off.  I am so tired of being harassed by Verizon not to mention all the time they have taken out of my schedule and my life to stay on the phone to figure things out.  It has been a year gone by and they want me to hold on the phone will they attempt to figure this out....WHO has this kind of time?  How many times do you have to tell someone a story to get things done?  They are harassing me over something that is their mistake......they need to be held accountable and quit harassing people and fix their issues.  Where are the people that wear the pants in this company?  That is who I want to talk to.  Not someone who has no authority to help a customer who is right and they are the ones WRONG.

    I am sorry to learn that you have some unresolved billing concerns Terrina! Your satisfaction & billing accuracy are paramount to us! Please reply to the direct message that I sent you and I will review your account for accuracy
    AntonioC_VZW
    Follow us on Twitter @VZWSupport
    If my response answered your question please click the �Correct Answer� button under my response. This ensures others can benefit from our conversation. Thanks in advance for your help with this!!

  • Who runs this community?

    I post a questions, the first reply start off with "You are wasting your time" and clearly does NOT answer my questions. I reply to that saying I have higher expectations for Apple than other cheaper products.
    My post gets deleted for not meeting community guidelines, and the above post which INSULTED my initial question, is marked as 'Answered my question'
    So my question for this post is - who runs this? Apple or some volunteers? Marking a post as 'Solved Problem' on my behalf that tells me "You are wasting your time" is not usefull!
    At this point I'd like to delete the original posit since clearly "I'm wasting my time" on here.
    Sheesh!
    Mac owner from MacPlus to MBP Retina since 1988

    "You are wasting your time" and clearly does NOT answer my questions.
    Actually, it does answer your question. Maybe not all that politely, but it is correct. Like virtually any other such device (iPad, Blackberry, Samsung), Apple does not make their own batteries. They get them from the same very few suppliers as everyone else. And like all such "performance" claims by manufacturers, they are based on absolute best circumstances and use. Typical use will not yield those results.
    who runs this? Apple or some volunteers?
    Apple owns and operates these boards. Other users handle almost 100% of the questions. Rarely will you see an Apple employee posting an answer. Of those, it is almost always one of the hosts explaining something related to the use of these boards, not an answer to a technical question.
    Marking a post as 'Solved Problem' on my behalf that tells me "You are wasting your time" is not useful!
    Well, only you can do that. No one else, not even the hosts can in any way mark a post Solved or Helpful. Only the person who started a topic can. So in the case of the only other topic under your name, you awarded the Solved and Helpful points. Therefore, your claim of someone else doing so "on your behalf" isn't possible.

  • Urgent help of the person who coded this...

    could the person who posted this code pls get back to me..cuz i can't seem to find u
    cuz i would like to use this code of urs but i'm not sure exactly how it works out.
    import java.awt.*;
    public class DrawArrows
         public void drawArrow(Graphics g,int x1,int y1,int x2,int y2,int headLength,int headwidth)
         double theta;     
         double theta2;     
         int deltaX;     
         int deltaY;     
         int lengthdeltaX;     
         int lengthdeltaY;     
         int widthdeltaX;     
         int widthdeltaY;     
              deltaX=(x2-x1);     
              deltaY=(y2-y1);     
              theta=Math.atan((double)(deltaY)/(double)(deltaX));     
         if(deltaX<0.0)theta2=theta+Math.PI;     
         else theta2=theta;     
         lengthdeltaX=-(int)(Math.cos(theta2)*headLength);     
         lengthdeltaY=-(int)(Math.sin(theta2)*headLength);     
         widthdeltaX=(int)(Math.sin(theta2)*headwidth);     
         widthdeltaY=(int)(Math.cos(theta2)*headwidth);     
         g.drawLine(x1,y1,x2,y2);          
         g.drawLine(x2,y2,x2+lengthdeltaX+widthdeltaX,y2+lengthdeltaY-widthdeltaY);     
         g.drawLine(x2,y2,x2+lengthdeltaX-widthdeltaX,y2+lengthdeltaY+widthdeltaY);   
    }i could only work out till the line
                                               deltaX=(x2-x1);     
              deltaY=(y2-y1);     
              theta=Math.atan((double)(deltaY)/(double)(deltaX));    pls let me know if u are still reading this or anyone else who can figure out the later part of the code.
    thnx n cheerz

    i could only work out till the line
    deltaX=(x2-x1);
    deltaY=(y2-y1);
    theta=Math.atan((double)(deltaY)/(double)(deltaX));
    I'm not the poster but these lines seem to compute the
    angle of the arrow line.
    BTW (to the posters): wouldn't the use of a
    Polygon be better suited for this purpose ?Looks indeed like it is calculating the angle to the origin of a line segment.

  • In April 3o,2012 and May 9,2012 some purchases of $38.75 and $24.51 were made and they were not made by me because i never spend that much. Thing is that on February 7,2012 my ipod was stolen and i havn´t gotten it back since, i need to know who did this!

    In April 3o,2012 and May 9,2012 some purchases of $38.75 and $24.51 were made and they were not made by me because i never spend that much. Thing is that on February 7,2012 my ipod was stolen and i havn´t gotten it back since, i know have a new ipod and have made some purchases but never that much. I need to know who did this !!!!!!

    The most immediate thing you need to do is to call your credit card company and report the unauthorized charges. Your card company can contact Apple if they need additional information.
    Next, log into your iTunes Store account and see if the purchases are reflected in the Purchase History. If they are, immediately change the password to your iTunes Store account, making sure it's not something easily guessed or looked up. Then go here:
    http://www.apple.com/support/itunes/contact/
    and follow the instructions to report the issue to the iTunes Store. Whether or not they'll do anything for you I don't know, particularly if you didn't change the password after your iPod was stolen.
    If the charges are not reflected in the Purchase History, then it's most likely a fraudulent charge to your credit card directly rather than an unauthorized purchase through your iTunes Store account in which case it will be up to your bank to handle.
    Regards.

  • Warning when trying to launch application over mapped drive "We can't verify who created this file. Are you sure you want to run this file?"

    We have 2 load balanced application servers that map drives with programs on them for users from a central server that are giving the warning "We can't verify who created this file. Are you sure you want to run this file?". Basically how it works
    is a user logs in to one or the other application servers (for example, 10.0.0.1 or 10.0.0.2) and runs a log on script that maps an L:\ drive to the users folder on the central storage server (10.0.0.100). When the user goes to launch the .exe from the L:\
    drive it presents that warning.
    I've looked around and have seen recommendations that you need to add the site to the local intranet zone for IE, but when I try to add L:\ it tells me that I have entered an invalid sequence. It appears that you can only put network shares in that location,
    which is not how we're mapping the drive.
    Has anyone run in to this before and knows how to resolve it?
    Thanks!

    Hi,
    A mapped drive letter is not supported so please try to input \\server or \\server\folder to see if it will help. 
    If you have any feedback on our support, please send to [email protected]

  • Why does a different number come up when i use imessage instead of text? my friends keep responding to my msg with 'who is this?' since ios 5 update.!!?

    Why does a different number come up when i messaging to other i phones? My friends keep responding to my imessage with 'who is this' and apparently it comes from another number-not my usual number like texts...

    Thanks. The number shown against 'phone' is not my number. But it is the number my friend showed me that was coming up when she got my mgs.... Still confused!

  • On my itunes all of a sudden on the left side under 'shared' it says 'abdulmalek fahad' and it has an eject button but when i press it nothing happens. who is this abdulmalek fahad and how do i get rid of this from my itunes

    on my itunes all of a sudden on the left side under 'shared' it says 'abdulmalek fahad' and it has an eject button but when i press it nothing happens. who is this abdulmalek fahad and how do i get rid of this from my itunes

    Just go to your iTuens preferrences and disable sharing.

  • HT201441 i have iphone that he has a apple acount but i don't now her acount and password because he come's from england and i don't now a person who was this iphone before me.can you help me to find this person

    i have iphone thet he has an apple acount but i don't now her acount and i need help to find a person who was this iphone before me to ask her for a apple acount and password.please help me acount start k,,,,,@k,,,,,.uk if anyone now this person tell me please

    Welcome to the Apple community.
    Unfortunately, you cannot do very much with your phone unless you get assistance from the previous owner, they should either provide you with the password to unlock it or remove their account from the phone entirely remotely through iCloud.com > Find My Phone.
    If you have this persons email address, try sending them an email and asking them to remove their ID as described above.

  • APPHANGB1 when browsing the web, or just keeping it open. Happens once in a 5 minutes, and it freezes for 30 seconds. I found many people who have this problem too ....

    APPHANGB1 when browsing the web, or just keeping it open. Happens once in a 5 minutes, and it freezes for 30 seconds. I found many people who have this problem too ....

    Odds are only someone that develops apps for iOS would have access to whatever this is and, even then, this information may still not be available.
    I would do a backup of your phone & then erase it and restore from the backup to see if the odd behavior goes away. If so, something went funny with your update the first time around. If not, there's something in your backup that's making the phone throw a fit.
    I resolved my battery issues (more or less) by disabling the "set date/time automatically" setting. I haven't re-enabled it yet but my battery life has been much better with it off.
    ~Lyssa

  • WHO IS this TRUSTED INSTALLER?

    There is no explaination of his/her identity in the properties and I'm usually locked out of the files owned by this user...AND why does he block me out of suddenly newly appointed executionable programs that just appear in my processes?  They are usually
    suspicious looking so I look at the properties and I'm locked out (even though I am an administrator) so I must go through the sometimes un-nerving process of changing ownership and/or deleting "him"...if the process was explained in the properties
    a little better, this would help.  These things get in/past my private firewall daily and it bothers me.  Too much spying crap going on.  And ever time I run a malwarebytes scan there is ALWAYS a search file from IE that pops up as a PUP. I
    don't even use IE at all and I've blocked it in my firewall (?why? who the H is speedbit and do search and why do they change or infiltrate my startpage search engine???) due to my mistrust in the privacy I get when using them.  All of the trojans, worms,
    spyware and malware have come directly from Microsoft.  Why is that and why don't they require my permission to install programs and processes on my computer...and, no they are not coming from updates.
    please address this question clearly and directly and honestly as I'm quite tired of the deception I feel is going on between my computers operating system and my protective programming I'm suppose to feel safe with.

    Thank you for your reply Lewis but yes, I am daily aware of everything going on in regards to new programs, processes etc.  I have Norton Insight and online protection, use malwarebytes and PrivateFirewall.  I have seen AVG try to install itself
    through stealthmode applications but caught it.  I never install anything from 3rd parties and always verify the site before using it.  (ie Adobe updates for instance, I never check the McAvee box nor do I accept toolbars or any ASK products etc
    etc).  Verifiable ?  when the Norton or Malwarebytes detail screen shows the name of the PUP it will show the path as well and this is how I know where it came from.  Usually an IE search program which is really sneaky because I do not even
    use IE yet it gets in anyway.
    My question at hand though is who is this TrustedInstaller and can I edit him off of my properties to allow myself access without it affecting my computer.  I usually notice him/her as owner of MS products that are in the hidden mode and have a lock
    on the icon.  I often notice them when they appear suddenly in a process that wasn't there previously (ie: SPI32.EXE  OR SPA.EXE WHICH IS SPEEDBIT SEARCH ENGINE FOR IE)  GOOGLE is getting to be the same way in so far as introducing new programs
    and processes that are not requested or scheduled...Sorry Lewis but I come from a different generation and have seen the days of respect and privacy and understanding and I believe these companies just assume my generation are too uninvolved to notice. 
    You need to be more assertive with your questions and concerns maybe. Don't let anyone just tell you "it's ok, that just the way it is"  ASK WHY!!!!

Maybe you are looking for