What is the best process for adding a long text scroll into a video?

I have an hour video and need to insert a narrated poem that will either scroll or have lines fade in / out. What is the best process to create that poem? Do I use Motion? Live Type? compose it directly in FCP? I'll have either a still image or a looping video for the background. Once I know the best starting point, then I'll refine my questions. The poem is about 4 minutes narrated. Appreciate any help to get me started.

In the effects window try "Scrolling Text". Set it to be the length you need it (duration) and paste in your text and render and see how you like it. I think scrolling text has a nice little fade at the top and bottom too.
Or, you can make the text an image in something like Photoshop and keyframe it to slowly move in FCP for the duration of the video.

Similar Messages

  • What is the best process for conversion moving district data to city data?

    Hi ALL,
    I Need to write one conversion which will move the district field data into city field data in infotype 6..
    It need to apply for only one  Specific country which can be identified by Employee Personnel Area..and it should be apply for all active , Terminated employee as well...
    What is the best process so that i can catpure all the data records of  employees of the Specific country?
    my approacH is..
    LDB: PNP.
    Start-of-selection.
    RP_PROVIDE_FROM_LAST P0001 space pn-begda pn-endda.
    check p0001-weks = '5200'.
    rp_provide_from_last p0006 space pn-begda pn-endda.
    Loop at p0006.
    move p0006 to T_p0006.
    if ort01 is not initial
    Move P0006-ORT01 TO T_P0006-ORT02.
    endif.
          CALL FUNCTION 'HR_INFOTYPE_OPERATION'
            EXPORTING
              infty         = '0006'
              subtype       = P0006-subty
       objectid      = P_record-objps
              number        = p0006-pernr     "employeenumber
              validityend   = validityend
              validitybegin = validitybegin
             record        = T_p0006.
              recordnumber  = p_record-SEQNR
              operation     = 'MOD'
              nocommit      = nocommit
              dialog_mode   = '0'
            IMPORTING
              return        = return_struct
              key           = personaldatakey
            EXCEPTIONS
              OTHERS        = 0.
          Endloop.
    Is this using Loop is fine? or Using PROVIDE * from p0006 between PN-BEGDA AND PN-ENDDA
    ENDPROVIDE is fine?
    Is my code is accurate...Bapi_employee enque bapiemployee_deque i  will add apart from that is this code is fine for my requirement or any additional need to take care to capture all the employee data ?
    Regards
    sas

    Hi,
    Please use the following code: -
    RP_PROVIDE_FROM_LAST P0001 space pn-begda pn-endda.
    check p0001-weks = '5200'.
    rp_provide_from_last p0006 space pn-begda pn-endda.
    provide * from p0006 between PN-BEGDA AND PN-ENDDA
    move p0006 to T_p0006.
    if ort01 is not initial
    Move P0006-ORT01 TO P0006-ORT02.
    endif.
    CALL FUNCTION 'HR_INFOTYPE_OPERATION'
    EXPORTING
    infty = '0006'
    subtype = P0006-subty
    objectid = P_record-objps
    number = p0006-pernr "employeenumber
    validityend = p0006-endda
    validitybegin = p0006-begda
    record = p0006.
    recordnumber = p0006-SEQNR
    operation = 'MOD'
    nocommit = nocommit
    dialog_mode = '0'
    tclass = 'A'
    IMPORTING
    return = return_struct
    key = personaldatakey
    EXCEPTIONS
    OTHERS = 0.
    endprovide.
    Hope this will help you.
    Thanks & Regards,
    Gaurav

  • What is the best practice for running a long report/query against an active database?

    We are using SQL Server 2012 EE but currently do not have the option to run queries on a R/O mirror though that is my long term goal. I am concerned I may still run into the below issue in that scenario as well since the mirror would also be updating data I
    am querying.
    I have a view that joins across several tables from two databases and is used by an invoicing program on existing data. Three of these tables are also actively updated by ongoing transactions. Running a report that used this view did not use to be a problem
    but now our database is getting larger and we have run into some timeout problems for the live transactions coming in.
    First the report query was timing out so I set command timeout to 0 and reran the query which pegged all 4 CPUs 100% for 90 minutes and so I finally killed it. Strangely there were no problems with active transactions during that time so I'm wondering if the
    query was really running doing anything useful or somehow spinning and waiting. I reviewed the view and found a field I was joining on that was not indexed so created an index on that field, reran the report, which then finished in three minutes and all the
    CPUs were busy but not at all pegged out. Same data queried both times. I figured problem solved. Of course later, my boss ran a similar invoice report, with the same amount of data, and our live transactions started timing out 100% while his query was running.
    I did not get a chance to see the CPU usage during that time.
    I looked at the execution plan of the underlying view and added the suggested index but that did not help. When I run the just the view at SQL Server it does not seem to cause any problems and finished in a couple seconds. Perhaps something else going on in
    the reporting tool using the view.
    My main question is - Given I have to use the live and active database, what is the proper way to run a long R/O query/report so that active transactions can still continue to update
    tables that I am querying? sp_who2 did show transactions being blocked so I guess a long query accessing the tables blocks live transactions accessing those same tables, but certainly I'm not the only one doing this. I
    am considering adding "with (nolock)" but am hoping there is a better standard practice as that clause can return dirty data and I understand why. Thx, Dave
    Thanks, Dave
    Dave

    Hello
    You can change the DB isolation level to Read uncommitted
    http://technet.microsoft.com/en-us/library/ms378149(v=sql.110).aspx
    or use WITH (NOLOCK)
    I do use NOLOCK option for the dirty reads to avoid locks on the tables
    Javier Villegas |
    @javier_vill | http://sql-javier-villegas.blogspot.com/
    Please click "Propose As Answer" if a post solves your problem or "Vote As Helpful" if a post has been useful to you

  • I am gifting my iMac to my niece and need to wipe the disc for her use.  I have an external backup and also (smile) a brand new iMac I'll need to set up.What is the "best" process for ensuring the safety of my information as well as providing a "new" comp

    Gang,
    I've just purchased a new iMac for myslef and am gifting my "old" iMac to Niece.  Original iMac has Snow Leopard upgrade (came with Leopard) as well as Word for Mac -student addition.  I also have an external backup drive and use Time Machine as specified.
    What are the easy and appropraite steps to provide my niece a "new" iMac (clean and free of my items) as well as protect my info so I can place on my new iMac?  Will I also need to de-authorixe audible for iTunes?
    Thank you for your help.  I know this is probably a very basic procedure but I want to get it correct and ensure I don't harm either iMac.
    Best,
    pshdawg1

    pshdawg1 wrote:
    Gang,
    I've just purchased a new iMac for myslef and am gifting my "old" iMac to Niece.  Original iMac has Snow Leopard upgrade (came with Leopard) as well as Word for Mac -student addition.  I also have an external backup drive and use Time Machine as specified.
    Well I don't think your niece is going to rob you blind or sell your company secrets to the highest bidder, so a full 7x- 35x government grade overwrite and operating install is likely overkill.
    Just likley some personal files, pictures and videos, stuff like that you want to make sure doesn't get seen.
    My suggestion is to clean out your user level files manually in each of your Documents, Pictures etc folders, any bookmarks in browsers (reset Safari, clear cache) and emails you don't want carried on.
    Then download and run the cleaning aspects of OnyX, followed by a Disk Utility > Erase Free Space option. (in your Applications/Utilities folder)
    http://www.titanium.free.fr/
    You can create another Admin account in her name/nick and delete the first one with your name and all that.
    If you really want to get rid of your name from everywhere in the comptuer, then the only option is a c boot from the installer disk, Disk Utility Erase with Zero (7x or even 35x overwrite) and then resintall OS X and shutdown the machine,
    When this is done, OS X boots into the first "Welcome to OS X" video you saw when you first setup the machine. Of course you lose Word as that's not on the installer disk. But LibreOffice is free and much much better.
    http://www.libreoffice.org/
    pshdawg1 wrote:
    Will I also need to de-authorixe audible for iTunes? 
    Your allowed up to 5 computers with your iTunes content, but you can deauthorize the computer in iTunes so it doesn't take one of your authorizations.
    Also before you do anything, make a MANUAL backup of your data to another drive just in case Time Machine/Migration ***. etc doesn't screw the new pooch on you like it's been known to do.
    I always c boot off the new installer disk on new machines and Disk Utility Erase with Zero option the entire boot drive then reinstall OS X, it's not that I'm paranoid, it's that drives are not checked for bad sectors at the factory, they just slap OS X on it and off it goes, problems appear later on as people use the drive or can't read the software correctly off the drive.
    So I map off the bad sectors ahead of time, so the software is on good sectors and never have a post issue like others do with new machines.
    If you ordered a Mac with custom software installed, obiously your going to need to reinstall it after this.

  • What is the best resolution for adding and viewing pictures/images in ibooks?

    I'm trying to add pictures/images and I was wondering what the best resolution is for viewing?  Any help would be great.

    iBook Author seems to scale the images automagically during the book generation, so targeting iPad's native resolution should be fine.
    Havign said that, I'm currently creating art based on the assumption the next generation of the device will have double resolution screen, so a photograph should be scaled to 2048x1536 pixels if you want it to be full screen at 1:1 pixel mapping.
    If you're creating widgets, the art (probably) won't be scaled, and you'll need to use the pixel dimensions you want the art to appear on screen.

  • What is the best method for adding non-domain contacts into the Lync address book without Exchange

    Hi All,
    I have a large number of standards based video endpoints who we can route calls to form Lync via a third party application/infrastructure device (oh the day when Microsoft offer this bridge facility out of the box - but that's another story). They are not in
    Active Directory (although I suppose I could add them as 'Contacts'), but wondered if there is a more preferred way to do this?
    Many Thanks
    Chris

    Hi Swinster,
    You should add them as Contacts to AD. All the information in Lync Address Book come from AD.
    The Address Book Server uses data provided by User Replicator to update the information that it initially obtains from the global address list (GAL). User Replicator writes the Active
    Directory Domain Services attributes for each user, contact, and group into the AbUserEntry table in the database and the Address Book Server syncs the user data from the database into files in the Address Book Server file store and into the Address Book database
    RTCab.
    Best regards,
    Eric

  • What is the best MacBook for a UNI student studying design (also making videos, websites, etc)?

    I'm starting university next year and am wanting to study design. I also make videos and websites and what not on the side. I've never had a Mac before, I have an iPhone but have never owned or used a MacBook but I hear they're the best for graphics, etc. Which MacBook out of the all would be the best for designing and video making, etc?
    Thanks!

    I have a late 2011 MBP with 16GB of RAM and a 512GB SSD - it may not be as fast as the most expensive Retina model, but it's pretty close. I use the Adobe CS6 Design & Web Premium suite but I'm not much into video editing. However, were I you...
    I'd get the top-of-the-line non-Retina MacBook Pro and opt to spend the extra $100US on the HD antiglare screen. You can upgrade the RAM to 16GB yourself and, if you decide that the drive that comes with it is just too slow, you can always upgrade to a SSD. I'd also look at a good external monitor for your 'home' studio - I have the Apple Thunderbolt Display (which I've not even taken out of the box yet) but I'd ask for recommendations for a less expensive monitor if you don't need all the extra ports on the ATD.
    That's my recommendation - video editing can take a toll on the CPU and, particularly, the hard drive. That's why I recommend the fastest processor you can get and the possible move to a SSD.
    Good luck,
    Clinton

  • What is the best process for creating, opening, editing, etc PDFs from within Visual Studio 2008?

    I am the project manager on a web-based application that will need to:
    Create, open, edit, save, etc PDFs from within a Visual Studio 2008 web application (Visual Basic).
    Populate PDFs from SQL server 2010 database.
    Allow users to use PDF editing tools from within the website.
    BTW, the application is being written in Visual Basic.
    Will the SDK allow us to do this? What licenses do we need to purchase?
    Are there 3rd party plugins that make doing these things much faster and simpler?
    Any input is GREATLY appreciated!!!
    Sincerely,
    Mike

    I don't think Acrobat, or the Acrobat SDK can help you. Acrobat cannot be run on a server.

  • What is the best process for creating a webi document?

    I inherited a BI 4.0 environment with published repositories, dashboards, and webi documents.
    For development purposes, I tried creating the webi document local to my machine (due to how slow it was to create the document using BILaunch pad and/or the webi rich client on the "console")
    I created it as 'standalone, pointing to a local universe'; however, I can't figure out a way to move it back into my enterprise world.
    I was able to convert and publish the local universe to my enterprise repository; however, because I created the document in standalone mode, it doesn't appear to want to let me change the data source to a universe.
    So right now .. I have a webi document that won't let me select a universe for a data source.
    Any help or proven methods for creating documents then moving them to an enterprise environment would be appreciated.
    Thanks in advance.

    I don't think Acrobat, or the Acrobat SDK can help you. Acrobat cannot be run on a server.

  • What's the best app for taking a video on ipad2?

    I am a tennis coach and am looking for an app for my iPad2 to do video analysis. I need to be able to video someone doing a serve and then show it to them in slow motion and be able to pause it. What's the best app for this?

    Do some research into HTML5 video. Unless the user is using a modern browser with video playback capabilities, they would need to have an app to provide video playback, as well as the codecs for the video file format that you will be serving them. At this point in time, MP4 is the "clear(est)" winner of the online video formats. However not all browsers provide built-in playback. For instance, Firefox currently does not support MP4. Future Firefox builds will rely on whatever video playback the native OS provides. So coming back to your question - no, there's no real way of guaranteeing video playback on the web. You do the best you can and provide links to users where they can download the appropriate codecs and players and call it a day.

  • I have an IPad2.  I've received two different ideas on charging the battery.  One person indicates I should let the battery run almost down before recharging; another person indicated I should keep it charged closer to 100% .  What is the best process?

    I have an IPad2.  I've received two different ideas on charging the battery.  One person indicates I should let the battery run almost down before recharging; another person indicated I should keep it charged closer to 100% .  What is the best process for the best battery life over time?

    I do exactly as Thomas Reed does. Always have from day one. Going on 15 months now and I get at least 10 hours of use out the battery every day. No matter how much juice is left on the device when I go to bed - I put the iPad on the charger - doesn't matter what the battery gauge says - I plug it in and let it charge all night.

  • What is the best app for word processing on the i pad

    What is the best app for word processing using an i pad

    Have a look at the following:
    http://itunes.apple.com/sg/app/quickoffice-pro-hd-edit-office/id376212724?mt=8&l s=1
    http://itunes.apple.com/sg/app/office2-hd/id364361728?mt=8&ls=1
    http://itunes.apple.com/sg/app/documents-to-go-premium-office/id317107309?mt=8&l s=1
    http://itunes.apple.com/sg/app/polaris-office/id513188658?mt=8&ls=1

  • I have problems in the initiation of the Encore process when opening presents the following error message : "Encore CS6 Cannot Run in Non-Royalty Serialized".... What is the best solution for this problem ?

    Help Me.
    What is the best solution for this problem ?

    Encore is activated when you activate Premiere Pro... so, as Stan asked, how did you install P-Pro?
    Ask for serial number http://forums.adobe.com/thread/1234635 has a FAQ link
    -and a fix for Encore http://forums.adobe.com/thread/1421765?tstart=0 in reply #7
    -plus more Encore http://helpx.adobe.com/encore/kb/cant-write-image-fie-larger1.html

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What is the best resolution for pics in the drop zones of idvd?

    What is the best resolution for pics in the drop zones of iDVD?
    Also: iDVD always seems to align a pic to the left, can I change this anywhere?
    thanks

    Hello, Hans.
    Re: drop zone pic resolution - I generally don't go below 1000 pixels wide (iDVD will resize these images to a slightly smaller format, but I've controlled the largest part of the downsizing in Photoshop Elements).
    The alignment in iDVD is goofy.  The best I've achieved is trial and error -- adding blank background or cropping my image in the downsizing process (see above) to position my image.
    John

Maybe you are looking for