Who do I trust, my TV or my computer screen???

I have a final cut of a film shot in HD. The colors look good when I watch the film on my computer screen (didn't have money to color correct but did something color correction with Final Cut and it looks pretty good).
The problem is: when I burn a dvd with dvd studio pro (it looks good on it too, from the computer screen) and then watch the dvd on my TV screen the colors are too bright and even the grain of the film is different, it doesn't look as good.
On different TVs it looks different. Now, I know you can change the color settings on a TV but where do I go about trusting one or the other? How should I base my decision in terms of color for my film? What if I want to screen the movie in a theater?
Please help!!!
Thanks much!!

The reality is that we start with grade-certified monitors and use broadcast standards. COLOR is designed from the ground up to comply with CCIR Recommendations for SD and HD through an SDI-Video I/O card such as Kona3 by AJA or Blackmagic Extreme. Grade monitors vary in price and capability, but are invariably only natively accurate with SDI inputs, although there are some clever devices on the market that allow some flexibility with internal intervention. I own and operate an eCinema DCM-23 --original cost was around $14000.
There are some Flanders models that are now down around $5-6K. Not necessarily for hobbyists.
The alternative is to force a non-qualified monitor of some type into a "close-enough" mode with extensive calibration and specific tools. There are examples of people getting reasonable results with DVI and an eye-One calibration tool. However, it requires vigilance, as this grade of monitors usually don't hold their settings for very long, and can display variable behavior with different types of media, picture levels, and operation time.
It is not a simple problem and no magic solutions without a price tag.
jPo

Similar Messages

  • Who should I trust to rebuild my iphoto library

    I live in Honolulu.  I have time machine backup and somehow lost my library and my import doesnt have all the faces, event and many many duplicates.  I want a professional to fix it.  who should I trust?

    You don't need a professional. You can do it yourself.   Assuming you are running iPhoto 9 or later Apply the two fixes below in order as needed:
    Fix #1
    1 - launch iPhoto with the Command+Option keys held down and rebuild the library.
    2 - run Option #4 to rebuild the database followed by Option #1 if needed.
    Fix #2
    Using iPhoto Library Manager  to Rebuild Your iPhoto Library
    1 - download the demo version of iPhoto Library Manager and launch .
    2 - click on the Add Library button and select the library you want to add in the selection window..
    3 - Now that the library is listed in the left hand pane of iPLM, click on your library and go to the Library ➙ Rebuild Library menu option.
    4 - In the next  window name the new library and select the location you want it to be placed.
    5 - Click on the Create button.
    Note: This creates a new library based on the LIbraryData.xml file in the library and will recover Events, Albums, keywords, titles and comments but not books, calendars or slideshows. The original library will be left untouched for further attempts at fixing the problem or in case the rebuilt library is not satisfactory.
    OT

  • There is something wrong with the volumes buttons in my macbook pro, every time i pressed the one who raises the volume, it leads me to the screen where (i do not no what its called) the background is black with the date and time and a calculator.

    There is something wrong with the volumes buttons in my macbook pro, every time i pressed the one who raises the volume, it leads me to the screen where (i do not no what its called) the background is black with the date and time and a calculator. However, when i lower it, my safari tab goes out of the screen. What do you guys think i should do? I'm getting very nervous.

    hey HAbrakian!
    You may want to try using the information in this article to adjust the behavior of your function keys to see if that resolves the behavior:
    Mac OS X: How to change the behavior of function keys
    http://support.apple.com/kb/ht3399
    Take care, and thanks for visiting the Apple Support Communities.
    -Braden

  • I just got a Mac and I use the same internet connection as my mom and my brother, who has an iPad. He can click on something that has my name and then Macbook Air, and is able to see everything on my computer screen. How do I fix this?

    I just got a Mac and I use the same internet connection as my mom and my brother, who has an iPad. He can click on something that has my name and then Macbook Air, and is able to see everything on my computer screen. How do I fix this so he cant see what i am doing on my computer?

    No, I made sure nothing was checked for that section when i found out he could see my screen. At the top it says "computers on your local network can access your computer at: blah blah". I think thats how hes doing it but i dont know how to fix it.

  • HT4972 How does someone who has a 1st generation iPad but no computer update to the current operating system?

    How does someone who has a 1st generation iPad but no computer update to the current operating system?

    You take the iPad to someone or somewhere where you can update the device using iTunes on a computer. There is no other way to do it. You must use iTunes on a computer.
    Apple Stores will update the device for you. Make an appointment at an Apple Store for help.

  • WHO IS this TRUSTED INSTALLER?

    There is no explaination of his/her identity in the properties and I'm usually locked out of the files owned by this user...AND why does he block me out of suddenly newly appointed executionable programs that just appear in my processes?  They are usually
    suspicious looking so I look at the properties and I'm locked out (even though I am an administrator) so I must go through the sometimes un-nerving process of changing ownership and/or deleting "him"...if the process was explained in the properties
    a little better, this would help.  These things get in/past my private firewall daily and it bothers me.  Too much spying crap going on.  And ever time I run a malwarebytes scan there is ALWAYS a search file from IE that pops up as a PUP. I
    don't even use IE at all and I've blocked it in my firewall (?why? who the H is speedbit and do search and why do they change or infiltrate my startpage search engine???) due to my mistrust in the privacy I get when using them.  All of the trojans, worms,
    spyware and malware have come directly from Microsoft.  Why is that and why don't they require my permission to install programs and processes on my computer...and, no they are not coming from updates.
    please address this question clearly and directly and honestly as I'm quite tired of the deception I feel is going on between my computers operating system and my protective programming I'm suppose to feel safe with.

    Thank you for your reply Lewis but yes, I am daily aware of everything going on in regards to new programs, processes etc.  I have Norton Insight and online protection, use malwarebytes and PrivateFirewall.  I have seen AVG try to install itself
    through stealthmode applications but caught it.  I never install anything from 3rd parties and always verify the site before using it.  (ie Adobe updates for instance, I never check the McAvee box nor do I accept toolbars or any ASK products etc
    etc).  Verifiable ?  when the Norton or Malwarebytes detail screen shows the name of the PUP it will show the path as well and this is how I know where it came from.  Usually an IE search program which is really sneaky because I do not even
    use IE yet it gets in anyway.
    My question at hand though is who is this TrustedInstaller and can I edit him off of my properties to allow myself access without it affecting my computer.  I usually notice him/her as owner of MS products that are in the hidden mode and have a lock
    on the icon.  I often notice them when they appear suddenly in a process that wasn't there previously (ie: SPI32.EXE  OR SPA.EXE WHICH IS SPEEDBIT SEARCH ENGINE FOR IE)  GOOGLE is getting to be the same way in so far as introducing new programs
    and processes that are not requested or scheduled...Sorry Lewis but I come from a different generation and have seen the days of respect and privacy and understanding and I believe these companies just assume my generation are too uninvolved to notice. 
    You need to be more assertive with your questions and concerns maybe. Don't let anyone just tell you "it's ok, that just the way it is"  ASK WHY!!!!

  • Who do you trust?

    My company may need to produce a video that would be shot in English and subtitled in 7 languages. I'm currently reading up on how to incorporate multiple subtitle streams into DVDSP, but was wondering if anyone could recommend a good transcription/translation service. I'm a little worried about making sure that, "Bob is a good salesman" doesn't turn into, "Your goat drives a green Yugo".
    Who have you guys/girls worked with in the past with good results?

    Not sure there is any good voice recognition software for the Mac... doesn't look like ViaVoice works under Tiger. You mean dictation software, right? Like Dragon NaturallySpeaking for the PC.
    Subtitling software: there's Belle Nuit and there's STLEdit... check them both out and see. Probably others too; those are the ones I'm familiar with.
    We've used NCI for subtitles/closed captioning. They provide translation into 40 different languages but we've not used the translation services. They do an excellent job of transcribing our highly-technical speakers. They're not cheap, though.

  • "trust" request for a new computer...over and over??

    I keep getting a trust request whenever I connect to my new computer over and over.Even after "allowing"

    user9293143 wrote:
    Hello,
    I need an advice on how to go about this. My Oracle 9i DBA Certificate got burnt in a fire accident and I need to get a new copy from oracle. Would like to know how to go about it. I really need a new copy ASAP. Who am I meant to write in oracle?. Its very important. Would appreciate ur feedbacks.
    ThanksAs far as I am aware Oracle does not to resends for for Certificates from once they are received. If they were doing this for free the exam prices will go up even more. No doubt there is a revenue stream in this and we'll be charged for success kits soon.
    - you can browse the support FAQ's if your like ... [http://education.oracle.com/pls/web_prod-plq-dad/db_pages.getpage?page_id=82#5Q1A] ... the section on + I have not received my certification success kit. What do I do?+ is the closest to relevant.
    - What you can usefully do for yourself is register to Certview. You can then publish details of your certification:-
    [http://blogs.oracle.com/certification/2009/11/0080a.html]

  • Can I see who has tried to log in to my computer?

    Is there a way to see who has attempted to log into my account, and what username/password combinations they tried? I found that someone has tried to Google my password hint, and I'm wondering if they tried to access my account.
    John

    Hi John
    If you launch terminal found in /Applications/Utilities and issue this command:
    last
    The output can be quite long. Last will list the sessions of users, ttys, and hosts, in reverse time order. Each line of output contains the user name, the tty from which the session was conducted, any hostname, the start and stop times for the session, and the duration of the session. Last will also show if there has been a crash or a shutdown. Why is this useful? If you know roughly when you were using the computer and eliminate those sessions then what is left is definite proof of someone else using the account to login. You can also limit the output to a specified amount of lines by adding the -n arguement, for example:
    last -20
    will output the last 20 log on attempts. You can also consult system.log as this will also log user activity as well as failed log on attempts. You can consult system.log using Console again found in /Applications/Utilities but seeing as you are in terminal anyway just issue this command:
    tail -n /var/log/system.log
    again the -n argument can be used to limit system.log to a specified amount of output (20 or 30 is a good number) otherwise the output is quite large.
    Hope this helps – Tony

  • I have a 3g ipod touch and I let my sister who has a 4g ipod touch use my computer to start her ipod. Now my computer wont pick up my ipod at all. I can't get it to anything.

    I cant get my ipod to do anything. It wont sync or update to my computer.

    Hello shinaye,
    Have you worked through each of the recommended troubleshooting procedures provided in this article to see any of it helps?
    http://support.apple.com/kb/TS1538
    B-rock

  • Unable to load custom trust store in cluster

    Weblogic 9.2 cluster with three nodes. Each is configured to use custom trust store. The same jks is copied to every node.
    On node1 ssl works perfectly but on node2 and node3 certificate validation fails. Interesting is the stack that is thrown after first validation request, when Weblogic starts to load truststore:
    ####<Jan 17, 2011 5:46:51 PM EET> <Debug> <SecuritySSL> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279211972> <000000> <SSLSetup: loading trusted CA certificates>
    ####<Jan 17, 2011 5:46:51 PM EET> <Debug> <SecuritySSL> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279211984> <000000> <SSLContextManager: loading server SSL identity>
    ####<Jan 17, 2011 5:46:51 PM EET> <Debug> <SecurityKeyStore> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279211986> <000000> <MBeanKeyStoreConfiguration: constructor - using mbean trust config>
    ####<Jan 17, 2011 5:46:51 PM EET> <Debug> <SecurityKeyStore> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279211989> <000000> <PreMBeanKeyStoreConfiguration: constructor - explicitly configured=true>
    ####<Jan 17, 2011 5:46:51 PM EET> <Debug> <SecurityKeyStore> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279211992> <000000> <PreMBeanKeyStoreConfiguration: constructor - TrustKeyStore[0]=FileName=/bea/keystores/MyTrust.jks, Type=jks, PassPhraseUsed=true>
    ####<Jan 17, 2011 5:46:51 PM EET> <Debug> <SecurityKeyStore> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279211994> <000000> <MBeanKeyStoreConfiguration: constructor - TrustKeyStore[0]=FileName=/bea/keystores/MyTrust.jks, Type=jks, PassPhraseUsed=true>
    ####<Jan 17, 2011 5:46:51 PM EET> <Notice> <Security> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <> <1295279211998> <BEA-090171> <Loading the identity certificate and private key stored under the alias beal2.srv.sise from the jks keystore file /bea/keystores/MyIdentity.jks.>
    ####<Jan 17, 2011 5:46:52 PM EET> <Debug> <SecuritySSL> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279212009> <000000> <Failed to load server trusted CAs
    java.lang.NullPointerException
         at weblogic.security.utils.SSLContextManager.getRealmName(SSLContextManager.java:594)
         at weblogic.security.utils.SSLContextManager.getServerSSLIdentity(SSLContextManager.java:535)
         at weblogic.security.utils.SSLContextManager.createServerSSLContext(SSLContextManager.java:276)
         at weblogic.security.utils.SSLContextManager.getDefaultServerSSLContext(SSLContextManager.java:221)
         at weblogic.security.utils.SSLContextManager.getServerTrustedCAs(SSLContextManager.java:183)
         at weblogic.security.utils.SSLSetup.getTrustedCAs(SSLSetup.java:505)
         at weblogic.security.utils.SSLSetup.getSSLContext(SSLSetup.java:384)
         at weblogic.security.SSL.SSLSocketFactory.setSSLClientInfo(SSLSocketFactory.java:218)
         at weblogic.security.SSL.SSLSocketFactory.<init>(SSLSocketFactory.java:36)
         at weblogic.security.SSL.SSLSocketFactory.<init>(SSLSocketFactory.java:28)
         at weblogic.security.SSL.SSLSocketFactory.getDefault(SSLSocketFactory.java:55)
         at com.liferay.portal.security.auth.WeblogicSocketFactory.createSocket(WeblogicSocketFactory.java:21)
         at com.liferay.portal.security.auth.WeblogicSocketFactory.createSocket(WeblogicSocketFactory.java:30)
         at org.apache.commons.httpclient.HttpConnection.open(HttpConnection.java:707)
         at org.apache.commons.httpclient.HttpMethodDirector.executeWithRetry(HttpMethodDirector.java:387)
         at org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMethodDirector.java:171)
         at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397)
         at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323)
         at com.liferay.portal.servlet.filters.sso.cas.Cas20ProxyTicketValidator.retrieveResponse(Cas20ProxyTicketValidator.java:73)
         at com.liferay.portal.servlet.filters.sso.cas.Cas20ProxyTicketValidator.validate(Cas20ProxyTicketValidator.java:46)
         at com.liferay.portal.servlet.filters.sso.cas.CASFilter.processFilter(CASFilter.java:172)
         at com.liferay.portal.kernel.servlet.BaseFilter.doFilter(BaseFilter.java:91)
         at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:42)
         at weblogic.servlet.internal.WebAppServletContext$ServletInvocationAction.run(WebAppServletContext.java:3242)
         at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:321)
         at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:121)
         at weblogic.servlet.internal.WebAppServletContext.securedExecute(WebAppServletContext.java:2010)
         at weblogic.servlet.internal.WebAppServletContext.execute(WebAppServletContext.java:1916)
         at weblogic.servlet.internal.ServletRequestImpl.run(ServletRequestImpl.java:1366)
         at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
         at weblogic.work.ExecuteThread.run(ExecuteThread.java:181)
    >
    ####<Jan 17, 2011 5:46:52 PM EET> <Deb...
    during the validation I get following:
    ####<Jan 17, 2011 5:46:52 PM EET> <Debug> <SecuritySSL> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279212020> <000000> <Cannot complete the certificate chain: No trusted cert found>
    ####<Jan 17, 2011 5:46:52 PM EET> <Debug> <SecuritySSL> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279212020> <000000> <Validating certificate 0 in the chain: Serial number: 1283510590
    ####<Jan 17, 2011 5:46:52 PM EET> <Debug> <SecuritySSL> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279212023> <000000> <validationCallback: validateErr = 16>
    ####<Jan 17, 2011 5:46:52 PM EET> <Debug> <SecuritySSL> <beal2.srv.sise> <bea2A> <[ACTIVE] ExecuteThread: '12' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1295279212025> <000000> <weblogic user specified trustmanager validation status 16>
    I have run out of ideas. The certificate is in trustore. I think my issues are related to that NullPointer but because it is Weblogic internal code I have no idea what's causing it. I know somehow node1 has to be different but I don't know where to look anymore.
    After decompiling SSLContextManager getRealmName looks like this:
    private final String getRealmName()
    return runtimeAccess.getDomain().getSecurity().getRealm().getName();
    What configuration am I missing?

    Maybe this helps....
    I would try to check the following steps:
    - Are node2 and node3 on the same machine as node1?
    - Is present and readable "/bea/keystores/MyTrust.jks" on each machine?
    - Who signs the trust certificate in "MyTrust.jks"? I.E.: it is needed a trust chain to validate MyTrust?
    From your decompilation it seems that one of these
    - runtimeAccess;
    - runtimeAccess.getDomain();
    - runtimeAccess.getDomain().getSecurity();
    - runtimeAccess.getDomain().getSecurity().getRealm();
    is null ...
    Bye
    Mariano

  • Trusted User Authentication

    Hi,
    Our solution currently offers three SSID's.  One corporate SSID for trusted users (employees) with trusted (company managed) devices, one guest SSID for external guests who are not trusted and use non-trusted devices and then a third "guest" SSID that allows trusted users (employees) to connect using untrusted (personal) devices to access the Internet via a separate proxy system.  The guest SSID for trusted users is the focus of this question.
    We currently use a local RADIUS database on ACS 5.2 for the users, which works but requires another user account and obvious password management overhead.  Given that a global employee directory exists which has its own account & password management system in place has made me consider this as an alternative to local authentication on ACS.
    The external identity store is an LDAP database and I have configured network access for the ACS to query the schema.
    I understand that web authentication can use LDAP as an authentication mechanism, however I would like to keep the SSID as secured using 802.1x if possible and not use an open or PSK secured solution as this would contravene current security standards.
    So, can I configure the WLC to send an authentication request to the ACS via RADIUS over 802.1x and then for the ACS to forward that request on to an external identity store using LDAPS?
    I am currently reveiwing the configuration document and believe I have each individual component in ACS configured but cannot see the LDAPS traffic ever leaving it to query the external identity store.
    Any thoughts or comments would be appreciated....
    Thanks,
    Dave

    Hi Dave,
    That is surely possible and that is what LDAP identity store is fore.
    You create the LDAP identity store and point the WLCs to use the ACS (not the LDAP server).
    Now, when a wifi client tries to connect the WLC sends the request to the ACS.
    At this point the request reached ACS. So, in order to proceed with quering the LDAP server for that user, you need to tell the ACS for this user that is connecting to this SSID please send the query to the LDAP server and trust what it tells you about the user authentication status.
    Have you configured this piece of configuraiotn on ACS? to send the traffic to the LDAP DB?
    In the Access policy you need to choose the configured LDAP identity store. Have you done that?
    If you still have problems please try to provide screenshots of you config.
    Regards,
    Amjad
    Rating useful replies is more useful than saying "Thank you"

  • By default, which right has a user on a "external trusted" domain ?

    Hi,
    I would like to know what are the rights for users in DomA when a bidirectionnal external trust is in place with DomB ?
    By default, the user in DomA is member of "DomB\Domain User" (otherwise, how can the user in DomA can list the users in DomB for example ?)
    Is there any specifics things to know if DomB is in Win2000 compatibility domain/forest level ?
    I know this ressource
    https://technet.microsoft.com/en-us/library/cc755321%28v=ws.10%29.aspx and this
    https://technet.microsoft.com/en-us/library/cc757352(v=ws.10).aspx but didn't find my answer.
    Thank you ! :)

    I've created many trusts in my day and they can get confusing... quickly...
    #1 Who is the "trusting Domain" (who is saying "yeah I, domA, will let DomB in the door")
    #2 Who is the "trusted domain" (who is "walking through the door (DomB)")
    *** I know you said "bidirectional" but it helps you visualize the "security trust" for what is actually required. **
    #3 Is that "Domain User" part of a Group? Is the Group Domain or Universal? Only certain types of groups can work across a trust.
    #4 Are you doing a domain level trust or a forest level trust? External trusts are "domain to domain". However the domains can exist in separate, non-related forests.
    If you do a two-way domain External trust -- Domain Users from DomA can access all the resources on DomB, if explicitly provided they have access to those resources. What I mean by that is if Domain User Doesn't have domain admin privileges in DomA, it won't
    get domain admin privileges to DomB and vice versa.
    This is where the trick is though. In a two-way domain External Trust -- All domain / enterprise admins in DomA will have domain /enterprise admin access in DomB and vice versa. They can grant themselves privileges to any servers and resources.
    This is why one way trusts are popular...because you only want to let one domain into the other domain. "big brother" type of trust.
    Kind of make sense?
    Entrepreneur, Strategic Technical Advisor, and Sr. Consulting Engineer - Strategic Services and Solutions Check out my book - Powershell 3.0 - WMI: http://amzn.to/1BnjOmo | Mastering PowerShell Coming in April 2015!

  • HP desktop computer can not play Blu-ray DVDs. Who is responsible for this?

    In 2010, I blought an HP Pavilion Elite HPE 250-f desktop computer (running Windows 7). This computer was advertised as having a Blu-ray DVD player, as well as players for regular DVDs and CDs. All these years, I've been successfully playing regular DVDs and CDs. Until now, I have not attempted to play a Blu-ray DVD.
    I recently rented the "Divergent" Blu-ray DVD (as well as the "Divergent" regular DVD) from my local library. When I tried to play the Blu-ray DVD, the HP MediaSmart software and the Windows Media Player detected the Blu-ray but were not able to play the Blu-ray.
    I then downloaded the Media Player Codec Pack, http://download.cnet.com/Media-Player-Codec-Pack/3000-13632_4-10749065.html    This Codec Pack was supposed to help Windows Media Player play the Blu-ray. That did not work. When I got rid of the Codec Pack using System Restore, HP MediaSmart and Windows Media Player became unable to detect the Blu-ray in the Blu-ray drive. After another System Restore, HP MediaSmart and Windows Media Player were once again able to detect the Blu-ray (but were still unable to play the Blu-ray).
    I then downloaded Cyberlink PowerDVD 14, which played the Blu-ray for only about 7 seconds before crashing. I then got rid of Cyberlink PowerDVD 14 with a System Restore.
    I downloaded TotalMedia Theatre version 6.0.1.123. However, this software did not detect the Blu-ray. I then got rid of TotalMedia Theatre with a System Restore. After that, I was not able to play ANYTHING, including CDs and regular DVDs. CDs and regular DVDs were not being detected by playing software. After another System Restore, I was once again able to play CDs and regular DVDs. However, I do not want to risk trying to play the Blu-ray again.
    So, what's going on here? HP advertised this computer as having a Blu-ray DVD player. Wasn't HP responsible for providing software that could play Blu-ray DVDs? And why is the Blu-ray DVD, sometimes detected, and sometimes not detected, by playing software? Is there some kind of hardware issue?
    Who is responsible for the fact that my computer can not play Blu-ray DVDs? HP, for bad playing software and/or bad hardware? Or is there something in the Windows 7 operating system that prevents the playing of Blu-ray DVDs? Is Microsoft responsible?
    Thanks for any information.

    Talon820 wrote:
    In 2010, I blought an HP Pavilion Elite HPE 250-f desktop computer (running Windows 7). This computer was advertised as having a Blu-ray DVD player, as well as players for regular DVDs and CDs. All these years, I've been successfully playing regular DVDs and CDs. Until now, I have not attempted to play a Blu-ray DVD.
    I recently rented the "Divergent" Blu-ray DVD (as well as the "Divergent" regular DVD) from my local library. When I tried to play the Blu-ray DVD, the HP MediaSmart software and the Windows Media Player detected the Blu-ray but were not able to play the Blu-ray.
    I then downloaded the Media Player Codec Pack, http://download.cnet.com/Media-Player-Codec-Pack/3000-13632_4-10749065.html    This Codec Pack was supposed to help Windows Media Player play the Blu-ray. That did not work. When I got rid of the Codec Pack using System Restore, HP MediaSmart and Windows Media Player became unable to detect the Blu-ray in the Blu-ray drive. After another System Restore, HP MediaSmart and Windows Media Player were once again able to detect the Blu-ray (but were still unable to play the Blu-ray).
    I then downloaded Cyberlink PowerDVD 14, which played the Blu-ray for only about 7 seconds before crashing. I then got rid of Cyberlink PowerDVD 14 with a System Restore.
    I downloaded TotalMedia Theatre version 6.0.1.123. However, this software did not detect the Blu-ray. I then got rid of TotalMedia Theatre with a System Restore. After that, I was not able to play ANYTHING, including CDs and regular DVDs. CDs and regular DVDs were not being detected by playing software. After another System Restore, I was once again able to play CDs and regular DVDs. However, I do not want to risk trying to play the Blu-ray again.
    So, what's going on here? HP advertised this computer as having a Blu-ray DVD player. Wasn't HP responsible for providing software that could play Blu-ray DVDs? And why is the Blu-ray DVD, sometimes detected, and sometimes not detected, by playing software? Is there some kind of hardware issue?
    Who is responsible for the fact that my computer can not play Blu-ray DVDs? HP, for bad playing software and/or bad hardware? Or is there something in the Windows 7 operating system that prevents the playing of Blu-ray DVDs? Is Microsoft responsible?
    Thanks for any information.
    You're not going to get any help from HP or Microsoft on a 4 year old computer.   Maybe your optical drive is no longer able to play Bluray discs.  Windows 7 Media Center with Bluray playback was not included in all versions of Windows 7.  Each computer with Bluray has an individual license; yours may have expired after not using it for 4 years.  Best advice - don't flog a dead horse.  Just get regular DVDs.

  • SSRS Report Server Could not establish connection. The underlying connection was closed. Could not establish trust relationship for the SSL/TLS Secure channel

    Hi
    Had to un-install and then re-install MS SQL Server 2012 with SSRS.
    After we re-installed we are able to get to the Web Services page but not the Report Server page and get the above error message. We need to use SSL and when we bind the cert in RS Configuration Manager it says it does this successfully on the WebServices
    tab. We also do a similar exercise on the ReportServer page. 
    Any help warmly welcomed :D
    Thanks

    Hi Rich Whight,
    According to your description, after you re-installed SQL Server 2012 with SSRS, you are able to access Web Service URL, but when you tried to access Report Manager URL, the error occurred: The underlying connection was closed. Could not establish trust
    relationship for the SSL/TLS Secure channel.
    The issue may be caused when the certificate isn't installed correctly in the trusted root for the local computer. To verify and install the certificate, Please refer to the steps blow:
    In RsReportServer.config file(default location: C:\Program Files\Microsoft SQL Server\MSRS11.MSSQLSERVER\Reporting Services\ReportServer), change the “SecureConnectionLevel” element value from 0 to 3.
    Add correct value to <UrlRoot> element.
    Add the same value to the <ReportServerUrl> element as step2.
    Go to Microsoft management Console, add the certificate which you use to access the report server under “Trusted Root Certification Authorities”.
    For more information about SSL configuration and Managing Trusted Root Certificates, please refer to the following documents:
    http://blogs.msdn.com/b/mariae/archive/2007/12/12/ssl-configuration-and-reporting-services.aspx
    http://technet.microsoft.com/en-us/library/cc754841.aspx
    If you have any more questions, please feel free to ask.
    Best Regards,
    Wendy Fu

Maybe you are looking for

  • Overflow when trying to assign Float to Double

    Please excuse me if this has already been anwered. I'm trying to pull a long decimal (0.110494842038439 to be exact) from an Oracle database table where it's stored as a Float. Dim z As Double = rsAgg("st_dev") Returns the error "Arithmetic operation

  • Utilizing all ports on a 4 port NIC for VMs

    I have in my environment two Dell Host, Dell N3024 iSCSI switch and an EMC-3200 storage. A Broadcom 1Gb 4 port NIC that connect the Dell host to the EMC storage via the N3024. An Intel 1Gb 4 port NIC that connects the Dell hosts to the LAN (I port in

  • How do I completely uninstall Aperture 3.6?

    How do I completely uninstall Aperture 3.6? Can't find any instructions on Apple's support pages. Thanks in advance!

  • Forms and JIitiator

    can anyone tell me how to incorparate this into the run time system of an JInitiator session I'm trying to run a forms based application through iexplorer through microsoft proxy 2 and of course it cannot find the route to the socks server. What woul

  • Can't update Apple tv using I-tunes

    Cant update Apple tv ( 3rd gen ) using I-tunes