What is the best software for creating SCC/MCC files for closed captioning in Premiere pro?

I have experiemented with the demo version of MacCaption to create SCC/MCC files that I am importing into Premiere Pro for Closed Captioning. It seems to work okay, but before I purchase it I was wondering if it is the best software choice for my workflow? Would anyone recommend something different? Thanks!

PMJI, but I recently started using a program called Subtitle Edit (http://www.nikse.dk/SubtitleEdit/) not to be confused with another program called Subtitle Editor. 
Subtitle Edit is open source, full featured and supports dozens of file types(in/out and convert).  I use it in conjunction with our Accordent(now Polycom) Capture Station webinar systems.  I haven't used in conjunction with AdobeCS products yet, but it does list Encore and Captivate in it's I/O list.  It's definitely worth a look-see.

Similar Messages

  • What is the best way to ensure broadcast-ready files to DMDS from Adobe Premiere Pro CC?

    After submitting my 708 closed-caption HD video to DMDB for broadcast they said there were no captions.
    I initially exported the video as a .MXF file from Premiere Pro CC. In my source preview window the closed captions appear, but for some reason DMDS could not read them. Im looking for a way to get closed-caption videos broadcast ready for submittal to DMDS.
    In addition, when close-captioning for 708, the closed caption text appears with dots between each character in a word, and the background color is shifted to the right, leaving the first letter of each caption hangin out of it's background. Im assuming it's a Premiere Pro CC glitch, but I'd like to be able to communicate this with some certainty to any clients who may ask about it.
    Pleas advise.

    Very interesting.
    I'm about to submit HD captioned spot for Extreme Reach, they specify only an mpeg2 transport
    stream for keeping the captioning data.
    I did the 608 and 708 captions just above the video 1 track in premiere cc and they check
    out when setting the caption previewer to 608 or 708 in the program monitor.
    if I import that mpeg2 file BACK into premiere and play it the captions
    are not showing.
    I Just now exported an .mxf and saw an option to EMBED captions in the file
    instead of just the side car option normally there.
    THAT WORKED!  re-importing to premiere I see the captioning on track 2 and 3
    and they do play.
    But Extreme Reach requires the captioning in an mpeg2 TS container, not mxf.
    I tried converting the mxf to mpeg TS but the captioning gets stripped out.
    any ideas or suggestions?

  • What is the best software to create a slideshow

    what is the best software to create a slideshow

    Alternatives to iPhoto's slideshow include:
    iMovie is on every Mac sold.
    Others, in order of price:
    PhotoPresenter  $29
    PhotoToMovie  $49.95
    PulpMotion  $129
    FotoMagico $29 (Home version) ($149 Pro version, which includes PhotoPresenter)
    Final Cut Pro X $299
    It's difficult to compare these apps. They have differences in capability - some are driven off templates. some aren't. Some have a wider variety of transitions. Others will have excellent audio controls. It's worth checking them out to see what meets your needs. However, there is no doubt that Final Cut Pro X is the most capable app of them all. You get what you pay for.

  • What is the best practise to provide a text file for a Java class in a OSGi bundle in CQ?

    This is probably a very basic question so please bear with me.
    What is the best way to provide a .txt file to be read by a Java class in a OSGi bundle in CQ 5.5?
    I have been able to read a file called "test.txt" that I put in a structure like this /src/resources/<any-sub-folder>/test.txt  from my java class  at /src/main/java/com/test/mytest/Test.java using the bundle's getResource and getEntry calls but I was not able to use the context.getDataFile. How is this getDataFile method call to be used?
    And what if I want to read the file located in another bundle, is it possible? or can I add the file to some repository and then access it - but I am not clear how to do this.
    And I would also like to know what is the best practise if I need to provide a large  data set in a flat file to be read by a Java class in CQ5.
    Please provide detailed steps or point me to a how to guide or other helpful resources as I am a novice.
    Thank you in advance for your time and help.
    VS

    As you can read in the OSGi Core specification (section 4.5.2), the getDataFile() method is to read/write a file in the bundle's private persistent area. It cannot be used to read files contained in the bundle. The issue Sham mentions refers to a version of Felix which is not used in CQ.
    The methods you mentioned (getResource and getEntry) are appropriate for reading files contained in a bundle.
    Reading a file from the repository is done using the JCR API. You can see a blueprint for how to do this by looking at the readFile method in http://svn.apache.org/repos/asf/jackrabbit/tags/2.4.0/jackrabbit-jcr-commons/src/main/java /org/apache/jackrabbit/commons/JcrUtils.java. Unfortunately, this method is not currently usable as it was declared incorrectly (should be a static method, but is an instance method).
    Regards,
    Justin

  • What is the best way of creating admin-only parameters for a java iView?

    Hi,
    I would appreciate some advice from more experienced developers...
    The scenario is as follows: I have created an Org Chart maintenance application that generates and renders xml&xsl-based Org Charts. This is the maintenance iView.
    I am creating a second iView that points to each org chart(the 'Viewer' iView). This iView will be re-used many times, for different parts of our organisation. My problem is I want the portal administrator to be able to set the specific Org Chart that each instance of the 'viewer' iView points to. This needs to be editable as a configurable property.
    I imagine that this is accomplished through the use of properties, what is the best way to accomplish this?
    Many thanks,
    Mark Hockings

    I believe that you should be able to specify the 'personalization' property to be no-dialog. This doesn't allow users to be able to change the property, but can be changed when creating the iView definition
    I hope this helps
    D

  • What is the best way to create a Scheduler app for ALL mobile devices?

    I've used indesign to make apps before, (more like interactive/digital publications) and now I'm trying to make a scheduling app. What's the best way for me to accomplish this since it's a little more intricate? Indesign + DPS?? Any other recommendations?

    Skipping InDesign & using HTML5/something such as Appcelerator's Titanium would be your best bet.
    If you're set on using DPS, however, you'll need to make multiple multi-folio apps, single issue apps aren't supported iPhone or Android. DPS folios are also not responsive, although in some cases renditions will scale to support different devices.

  • WHAT IS THE BEST WAY TO CREATE AN XSD FILE (TO BE USED BY SOAP ADAPTER)

    Dear friends
    I have a simple scenario.
    OUTBOUND DATA  -->  SOAP ADAPTER  --> ( XI )  -->  RFC ADAPTER  --> INBOUND DATA
    The XML file that I got from mapping area of IR (Design) is as follows
    <?xml version="1.0" encoding="UTF-8"?>
    <ns0:MT_NAME_SOURCE xmlns:ns0="http://test3.com">
       <FIRSTNAME>DAVE</FIRSTNAME>
       <LASTNAME>SMITH</LASTNAME>
    </ns0:MT_NAME_SOURCE>
    If you notice, there are only 2 fields.
    I need to create an XSD file and import it as an external object, which I can use for SOAP Adapter.
    Which is the best way to create it.
    Also, I need to know if there is any step by step of sending a message from XML SPY. I have downloaded this software, but am not able to undertand how to use this.
    Hope to hear from any experts on this forum.
    Thanks in advance
    Ram

    Hi Ram,
    See the below blog..
    It shows how to send SOAP message using XML Spy.
    It also shows how to generate wsdl.
    /people/siva.maranani/blog/2005/09/03/invoke-webservices-using-sapxi
    Regards,
    Sumit

  • What's the best way to create and free temporaries for CLOB parameters?

    Oracle Database 11g Enterprise Edition Release 11.1.0.7.0 - 64bit Production on Solaris
    I have a procedure calling another procedure with one of the parameters being an IN OUT NOCOPY CLOB.
    I create the temporary CLOB in proc_A, do the call to proc_B and then free the temporary again.
    In proc_B I create a REFCURSOR, and use that with dbms_xmlgen to create XML.
    So the code basically looks like
    CREATE OR REPLACE PROCEDURE client_xml( p_client_id IN            NUMBER
                                           ,p_clob      IN OUT NOCOPY CLOB   ) AS
       v_rc         SYS_REFCURSOR;
       v_queryCtx   dbms_xmlquery.ctxType;
    BEGIN
       OPEN c_rc FOR
          SELECT col1
                ,col2
                ,col3
            FROM clients
           WHERE client_id = p_client_id;
       v_queryCtx := dbms_xmlgen.newContext(v_rc);
       p_clob     := dbms_xmlgen.getXML(v_queryCtx, 0);
    END;
    CREATE OR REPLACE PROCEDURE my_proc AS
       v_clob       CLOB;
       v_client_id  NUMBER;
    BEGIN
       v_client_id := 123456;
       dbms_lob.createTemporary(v_clob, TRUE, dbms_lob.CALL);
       client_xml( p_client_id => v_client_id
                  ,p_clob      => v_clob);
       dbms_lob.freeTemporary(v_clob);
    END;However, I just learned the hard way that IN OUT NOCOPY is only a hint, and that Oracle sometimes creates a local variable for the CLOB anyway.
    A solution is to change the client_xml procedure above to
    CREATE OR REPLACE PROCEDURE client_xml( p_client_id IN            NUMBER
                                           ,p_clob      IN OUT NOCOPY CLOB   ) AS
       v_rc         SYS_REFCURSOR;
       v_queryCtx   dbms_xmlquery.ctxType;
    BEGIN
       IF NOT NVL(dbms_lob.istemporary(p_clob),0) = 1 THEN
          dbms_lob.createTemporary(p_clob, TRUE, dbms_lob.CALL);
       END IF;
       OPEN c_rc FOR
          SELECT col1
                ,col2
                ,col3
            FROM clients
           WHERE client_id = p_client_id;
       v_queryCtx := dbms_xmlgen.newContext(p_refcursor);
       p_clob     := dbms_xmlgen.getXML(v_queryCtx, 0);
    END;My concern is that in case Oracle does create a local variable, 2 temporaries will be created, but there will only be 1 freeTemporary.
    Could this lead to a memory leak?
    Or should I be safe with the solution above because I'm using dbms_lob.CALL?
    Thanks,
    Arnold
    Edited by: Arnold vK on Jan 24, 2012 11:52 AM

    Arnold vK wrote:
    However, I just learned the hard way that IN OUT NOCOPY is only a hint, and that Oracle sometimes creates a local variable for the CLOB anyway.A CLOB variable in called a locator. Just another term for a pointer.
    A CLOB does not exist in local stack space. The variable itself can be TBs in size (max CLOB size is 128TB depending on DB config) - and impossible to create and maintain in the stack. Thus it does not exist in the stack - and is why the PL/SQL CLOB variable is called a locator as it only contains the pointer/address of the CLOB.
    The CLOB itself exists in the database's temporary tablespace - and temporary LOB resource footprint in the database can be viewed via the v$temporary_lobs virtual performance view.
    Passing a CLOB pointer by reference (pointer to a pointer) does not make any sense (as would be the case if the NOCOPY clause was honoured by PL/SQL for a CLOB parameter). It is passed by value instead.
    So when you call a procedure and pass it a CLOB locator, that procedure will be dereferencing that pointer (via DBMS_LOB for example) in order to access its contents.
    Quote from Oracle® Database SecureFiles and Large Objects Developer's Guide
    >
    A LOB instance has a locator and a value. The LOB locator is a reference to where the LOB value is physically stored. The LOB value is the data stored in the LOB.
    When you use a LOB in an operation such as passing a LOB as a parameter, you are actually passing a LOB locator. For the most part, you can work with a LOB instance in your application without being concerned with the semantics of LOB locators. There is no requirement to dereference LOB locators, as is required with pointers in some programming languages.
    >
    The thing to guard against is not freeing CLOBs - the age old issue of not freeing pointers and releasing malloc'ed memory when done. In PL/SQL, there is fairly tight resource protection with the PL/SQL engine automatically releasing local resources when those go out of scope. But a CLOB (like a ref cursor) is not really a local resource. And as in most other programming language, the explicit release/freeing of such a resource is recommended.

  • What is the best method to parse a java file for function names

    st="class";
    while (StreamTokenizer.TT_EOF != tokenizer.nextToken ())
       if (StreamTokenizer.TT_WORD == tokenizer.ttype)
        if (tokenizer.sval.toLowerCase().equals(st.toLowerCase())){
        System.out.print (tokenizer.nextToken() + " "); //prints the class name on the console
        fileOut.print (tokenizer.sval + " "); //prints the class name to a file
    }The above program searches a .java file for classes. I want to modify it so that it searches for function names as well. After several hours of figuring out various ways to do it with StreamTokenizer, I still havnt found a way. There seems to be no way to go back, i.e. no previousToken method, in StreamTokenizer.
    Is it possible to do search for using StreamTokenizer, and are there easier ways of doing it?

    Simple string tokenizing isn't an effective way to do this. You probably want something like ANTLR.

  • What is the best solution to create SharePoint Extranet Application for existing windows web application ?

    Hello,
    At present my SharePoint farm is having following domains:
    1) Internal Domain - Domain1
    2) External Trusted Domain - Domain2
    And Following Intranet WebApplications having Windows Mode Authentication:
    1) http://mywebapp1.Domain1.com - Single site collection
    2) http://mywebapp2.Domain1.com - Multiple site collections
    3) http://mywebapp3.Domain1.com - Multiple site collections
    Both Domain1 and Domain2 users are able to access above web applications.
    Now , we have requirement to add other trusted domains Domain3 , Domain4...etc. and create Extranet Application and I have following questions :
    What kind of topology and Authentication is required ?
    AD as User Identity storage location is better way for all other domains since there is trust ?
    Do I need to just extend all the web applications in extra net zone and create site collection for different domains to isolate security and content as per the need ?
    Is there any other best solution to implement extranet application under current environment ?
    what kind of other factors are important to consider in order to create extranet application ?
    Your help will be highly appreciated.
    Thanks and Kind Regards,
    Dipti Chhatrapati

    Hi Tom,
    I have following information till now:
    External domain will be trusted with parent domain where SharePoint is installed. 
    Authentication of external domain will be Windows Authentication.
    User Identity storage location will be Active Directory of external  domain.
    Site to be accessed by external domain will be http://mywebapp1.Domain1.com
    Now question is :
    Should I assign external AD group ( Domain2ADGroups ) to SP Web Application  http://mywebapp1.Domain1.com
    OR
    Should I extend the application in extranet zone for external domain and then assign permission to extended
    application ?
    I guess , if authentication is same then no need to extend the application - correct ?
    Thank you to look at this thread !
    Dipti Chhatrapati

  • What is the best way to create a 3d map for flash/actionscript?

    Hi
    what are good and easy to use tools to create a 3d map/world - terrain, buildings, .... - for use in flash? ideally I would be able to control the objects with actionscript.
    thanks,
    Chris

    first, you should pick a 3d framework (away3d, flare3d etc) to use.  that will determine what format/tools you can use for your 3d objects.

  • I would like to create pages for our yearbook what is the best software

    I would like to create pages for our yearbook what is the best software - pages does seem limited.

    fruhulda wrote:
    Network 23 wrote:
    Keynote...it could make a book, but it's probably questionable whether you'd want to manage hundreds of pictures and lots of pages with it.
    Why is that questionable?
    Because Keynote does not have the industrial-strength tools to handle long form text and large numbers of graphics. When you make a long or complex document, you sometimes have to go in and fix problems in bulk, like text formatting, or updating graphics, or finessing the layout on 200 pages, things like that. A program like InDesign can deal with it through things like paragraph styles, character styles, table styles (not one-off styles, but the kind that let you update a style name and have all text that uses that style update across all pages), or a powerful link manager that lets you keep graphics outside the document so you can easily update them by reference, in bulk if needed. InDesign also has some great tools like the ability to import multiple photos at once and have them place on the layout as a nice yearbook-style grid, the instant they land on the page, without having to arrange them after they come in.
    Finally, an app like InDesign knows how to print to a commercial press, or how to produce a press-ready PDF. Keynote has no idea.
    A yearbook can run a couple hundred pages and involve hundreds of photos. I would not touch such a project with anything that wasn't truly up to the task. The best software would be InDesign or QuarkXPress. Word is not good enough. Pages is not good enough. You will tear your hair out as you fix problems on page after page, photo after photo. Keynote would probably be laughable for a yearbook. I use Keynote for presentations, Keynote is the best at what it does. A yearbook is nothing like a presentation.

  • HT1338 Is anti virus necessary for iMac? if so, what is the best software?

    Is anti virus necessary for iMac? if so, what is the best software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging "zero-day" threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • What is the best USB powered portable 1TB hard drive for a macbook pro that allows Time machine to work, windows (thru Parallels software) and mac storage and is available in Australia?

    What is the best USB powered portable 1TB hard drive for a macbook pro that allows Time machine to work, windows (thru Parallels software) and mac storage and is available in Australia?

    I agree with teh OWC sggestion above, but why must it be USB powered? I find that far more unreliable, and the low power devices slow.
    I'd frankly get a good external enclosure and buy a bare drive.  But the OWC stuff is quite good - vastly better than some of the majors (WD being aprime example of stuff that's boderline quality and often not compatible)
    Grant

  • What is the best way to create shared variable for multiple PXI(Real-Time) to GUI PC?

    What is the best way to create shared variable for multiple Real time (PXI) to GUI PC? I have 16 Nos of PXI system in network and 1 nos of GUI PC. I want to send command to all the PXI system with using single variable from GUI PC(Like Start Data acquisition, Stop data Acquisition) and I also want data from each PXI system to GUI PC display purpose. Can anybody suggest me best performance system configuration. Where to create variable?(Host PC or at  individual PXI system).

    Dear Ravens,
    I want to control real-time application from host(Command from GUI PC to PXI).Host PC should have access to all 16 sets PXI's variable. During communication failure with PXI, Host will stop data display for particular station.
    Ravens Fan wrote:
    Either.  For the best performance, you need to determine what that means.  Is it more important for each PXI machine to have access to the shared variable, or for the host PC to have access to all 16 sets of variables?  If you have slowdown or issue with the network communication, what kinds of problems would it cause for each machine?
    You want to located the shared variable library on whatever machine is more critical.  That is probably each PXI machine, but only you know your application.
    Ravens Fan wrote:
    Either.  For the best performance, you need to determine what that means.  Is it more important for each PXI machine to have access to the shared variable, or for the host PC to have access to all 16 sets of variables?  If you have slowdown or issue with the network communication, what kinds of problems would it cause for each machine?
    You want to located the shared variable library on whatever machine is more critical.  That is probably each PXI machine, but only you know your application.

Maybe you are looking for

  • Store results into a variable...

    How can I get a result I need into a variable, that I can use in a subsequent query. My initial thought was something like: select emp_id into MyVariable from emp where emp_NAME='Kevin'; select * from emp where emp_id='&MyVariable'; I'm doing this in

  • Error in J1IH for Other Adjustments in ECC 6.0

    Hello All, We are going to ECC 6.0 Version upgradition now we are in testing phase. We are facing the below problem in J1IH t.code using for Other Adjustment postings. When we try to do manual debit in RG23A and RG23C in transaction through J1IH. Sys

  • Import javax.mail not found

    Hello, I am new to Java Mail. I wanted to test my first programme. When I compile, I get this errors. package javax.mail not found in import and so on. I have set my classpath to so set classpath = %classpath%;C:\j2sdk1.4.0\lib\mail.jar;C:\j2sdk1.4.0

  • Aperture 3.3.2 UI is broken.

    Hi there, I have an issue with Aperture 3.2.2 today as the attached screenshot. Some area of Aperture UI is gone offscreen and everything in viewing area is misalign. I have no idea how this bug happened. Have anybody know how to fix this? Thanks! I

  • Premiere CS3 Reinstall Problem

    I am currently running Windows XP Pro on a Matrox Axio system in which the CS3 Creative Suite was already installed for me upon purchase. As of late I've had problems with Quicktime (Premiere and After Effects no longer see it as a compatible format)