EyeTV to H.264… fastest way

Here’s the fastest way I’ve found to get good looking H.264 out of EyeTV, starting from your recorded program file.

1) save it as mpeg stream. This takes about 1 minute per hour of video.
2)load it into VisualHub. (Yes, I know it’s been abandoned. Deal with it.)
3) set optimize for (your device) under iTunes and standard quality, and check the H.264 box. (VH uses all your cores in the CPU, so it’s fastest)

You could be done, but if you think the output is too dark, do this:

4) load resulting movie from step 3 into QuickTime Pro. (Pro. Yeah: I know. Deal with this, too.)
5) Choose window/show controls and adjust the brightness to your liking
6) Choose File/save as (self-contained).

This process takes about 1/4 to 1/3 as much time as any other way I’ve found… at least on my setup.

Bonus section:

if you record HD on EyeTV, you’ll get a “squished” 640×480 image. Go ahead and do that, and export and manipulate as above…
…however…

before you start compression in VisualHub, change the image size to 640×360. Voila! đŸ™‚

Tag Folders

Tag Folders…
…is a free, and really useful, clever way to make use of metadata (spotlight comments.)

(I’ve written this because when you install Tag Folders, it starts asking all kinds of questions you’re not prepared to answer unless you understand what it’s doing. It’s one of those “read the manual FIRST” programs.)

Consider iTunes: you drag a music file on it, and then access it via “tags” such as artist name, genre, album, style and so on. You do _not_ access it by finding it in a folder.

In iTunes you’re using “metadata” to find the files you’re interested in.

And Leopard is all set up for that too, with files and with applications… but you have to add the metadata yourself. You do a “get info” on the file, and type in the keywords you want to use in the “spotlight comments” section.

How do you find those files then, like iTunes? You use a spotlight search that looks within the spotlight comments, of course.

Even niftier, is you can save a spotlight search as a “smart folder” (which just performs the spotlight search for you, and then shows you the results as if the files were “in” that “folder.”)

This is like choosing “classical” in iTunes, and getting a list of recordings of classical music…without any reference whatsoever as to where those files are actually located.

So, why would you even consider going to all this trouble? Well, if you only have a few files, you wouldn’t… maybe.

But leaving aside how easy or difficult it is to actually “tag” the files, let’s look at using them… and that will answer the “why” part of it.

Say you have photos of Suzy, your granddaughter. You have photos of her at home, photos at her birthday party, photos of her at the lake, and photos of her with her mom, Mary.

And being a camera-nut, you have 6,234 photos of her. And you’d like to find the shots of her with her mom during a birthday party.

Seaching thru 6,234 photos is out of the question. But if you have tagged those files with “suzy” “mom” “birthday” “lake” (where some will have just “mom” and some will have just “suzy” or “birthday”) then a smart folder looking for “suzy” and “mom” and “birthday” will show you the correct photos instantly.

You see, the secret is that you can have any number of smart folders, and you can have any number of tags.

“Great” you say “but who in their right mind would want to tag 6000 photos?”

AHA!

Here’s where the cleverness of Tag Folders comes into play. They are “smarter” smart folders. Instead of just being a one-way street (find these comment/tags), they serve a two-way function.

If you just open the folder, it performs like a smart folder, showing the files that meet the search criteria.

However (here’s the clever part) if you -drop- files on Tag Folders, they will -add- the spotlight search tags to the files!

So, if you have a folder full of files of the birthday party, just drag that to the “birthday” Tag Folder, and they are all tagged with “birthday”. And if in there you have 16 photos of Suzy, just drag them to the “Suzy” Tag Folder, and they are now tagged with “birthday” and “suzy” as well. (Remember, files can have any number of tags, and so can “belong” to any number of smart folders/ tag folders.)

In a nutshell: open the tag folder, and it shows you files with the chosen tag(s); drop to it, and it places those tags on the dropped file.

Finally, sort of as a bonus, there’s Tag Prompter… sort of like a no-tags tag folder: when anything goes into it, it will prompt you to apply tags. A reminder in a sense – a watch folder.

There are lots of programs out there using tags, not just iTunes. iPhoto, Aperture, Lightroom, Expression Media, Leap.. any many more.

Tag folders is just a nice, and free, way to get things done.

Finally, this has been a _very_ limited description of Tag Folders; in fact they can be quite sophisticated, including non-spotlight criteria and nesting… but for that, you’ll have to read the docs.

hth

Tracy

Print ’til you drop!

Inspired by something I read this morning, here’s my own anecdotal experience.

Epson inkjet printers: when it says “Ink Low!” (implying “your dog will DIE if you don’t replace the offending cartridge RIGHT NOW!”

…ignore it.

Modern Epsons (at least – I have no experience with other inkjets) will print merrily along for many more pages before they will finally say “OK: enough is enough – I simply refuse to print any more!” at which point, you replace the cartridge.

Again, YMMV, but with mine, even if it’s half way thru printing an image, it will pause, and present you with the cartridge tray, and let you replace the empty cart with a new one…and then happily resume printing right from where it left off. You’ll never see the difference.

However: the key to this is to NOT go into “replace-the-cartridge-mode” (meaning don’t hit cancel; don’t hit pause; don’t do a thing except replace the cartridge. If you do otherwise, you’ll lose what’s been printed so far, and will have to start over.)

And, as to laser printers, at least with my HP color one: it will start whining early on about how low the toners are. There’s two things to that:

1) there’s a menu selection (buried, of course) that you can use to tell it to quit complaining and just keep printing; and

2) once it starts complaining, (or you see the “low supplies” in the print dialog box) you probably have a ways to go.

I’m at that point now, and I printed out a report on the “remaining consumables” – and it turns out it, each of those “dangerously low” cartridges were fully capable of printing…

…wait for it..

345 -more- pages!

FWIW.

Users and computers on a network: a basic introduction

Unix (which is what Mac OSX is) was designed for colleges and businesses. There are, in those institutions, dozens of different computers, and thousands of different users.

So the first thing to get straight is that users (human beings) are separate and distinct from computers (boxes of electronics.)

All the users want access to all the computers.

To do this, all the computers have to be on the same network.

To avoid confusion then, the COMPUTER NAMES are all different.

By using different COMPUTER NAMES, the USERS can mount any or all of them, and tell which is which.

So, for example, let’s say there are 9 computers on the network, and they are named “one” “two” “three” “four” “five” “six” “seven” “eight” and “nine”.

You could be running on computer “three” and have “one” and “eight” mounted on your desktop.

Everything is still clear and understandable, eh? No confusion about which computer is which?

Next, let’s assume you have 26 USERS (human beings) who want access to all 9 COMPUTERS. Let’s say their 26 names are “Alpha Name” “Beta Name” “Charlie Name”… and so on thru to “Zero Name”.

The USER creates his own account on each of the nine COMPUTERS.

Why? Because with all those people (26 of them) on the computer, we don’t want private information, or individually purchased applications; or passwords etc, to be discoverable by the other 25 people; because some are administrators of the entire computer, and some cannot do administration things. So each can have is own desktop, and settings… etc.

So Alpha Name creates his user account on COMPUTER “one” and then goes to COMPUTER “two” and does the >exact same thing<... and so on down the line to computer "nine". On each of these computers, he creates an account named exactly "Alpha Name". The COMPUTERS automatically supplies a "short (user) name" for the account, which is the USER's first name, in lower case. So the "short name" of USER "Alpha Name" is "alpha." >AT THE TIME OF ACCOUNT CREATION< the USER can select a different "short name" from the computer-suggested lower-case first name. So "Alpha Name" may decide she likes "honeybear" as a short name instead of "alpha"... she can make that change when the account is established. Just like the full USER name, the "short name" is tied and permanently fixed to that account. Neither can be changed. Why? Because that would allow the defeat the privacy of each user. Still with me? So: COMPUTER "one" has accounts with USER  short names for 26 users: "honeybear" "beta" "charlie" "delta"... and on to "zero". COMPUTER "two" has accounts with USER  short names for 26 users: "honeybear" "beta" "charlie" "delta"... and on to "zero". COMPUTER "three" has accounts with USER  short names for 26 users: "honeybear" "beta" "charlie" "delta"... and on to "zero". COMPUTER "four" has accounts with USER  short names for 26 users: "honeybear" "beta" "charlie" "delta"... and on to "zero". Now: USER  "honeybear" can choose any one of the COMPUTERS named "one" "two" "three" "four" "five" "six" "seven" "eight" and "nine" and always sign into any or all of them as "honeybear." So: when you choose "go" from the finder to mount a new drive * you are telling it which computer to try to mount, either by name (if you choose "browse")  or IP address. Right there, you have specified the computer you want. Next it pops up a dialog with a list of users. That's because you could be any one of the 26 users on that computer, and it has no way of know which one you are unless you choose a user name and supply the password. Once you do that, you are signed into that chosen computer, as that particular user, just was if you were sitting in front of it, and using its own keyboard. Tracy * I almost never do this with my local network, except for the first time. Once I have a remote computer mounted on my desktop, I just create an alias to it, and leave that alias on the desktop. Then when I restart, and want to re-mount that computer, I just click on the alias. Much simpler.

Formatting your drive

On using Disk Utility (DU) for changing the formatting type:

First: the obvious – changing the formatting type will totally erase the target disk, causing you to permanently lose everything on it (unless you have a backup, of course.)

Next: there are drives (the physical hard disk) upon which reside one or more volumes. When you see an icon on your desktop, you’re looking at the volume. The finder does not have a way of working directly with drives. That’s what Disk Utility (DU) is for.

When you open DU, you’ll see two panels. On the left is the listing of the drives and volumes that DU can recognize.

You’ll see something like:

465.8 GB ST3500630AS
MacintoshHD

The uppermost one begins with the size of the hard disk, and its model number. This one is the drive itself
Underneath that, and indented slightly, is usually one or more volume names. If you do not see anything underneath a disk, then it is not formatted yet (and you need to format it.)

You select a drive or a volume to work on in the larger right hand panel, by highlighting it in the left hand panel.

If you select a volume, then above the right hand panel you’ll see: First Aid / Erase / RAID / Restore

If you select a drive, then above the right hand panel you’ll see: First Aid / Erase / Partition/ RAID / Restore (note the addition of “partition”)

To select the formatting of a drive, first select a drive in the left hand column.

Next, click the “partition” button above the right hand column

Now in the right hand column, you’ll see

Volume Scheme: Volume Information:

Beneath Volume scheme, you’ll see a popup menu, probably saying “current” and beneath that, a diagrammatic representation of all the space on the drive.

Below that, you’ll see + – Options…

These are likely grayed out.

click on the popup menu directly underneath the words “Volume Scheme”, and select the number of partitions, (volumes) you want on the drive. “1 Partition” is the most common, although you may choose more.

Once you do that (choosing anything other than “Current”) the “Options…” button at the bottom of the diagram will become active.

Click on it, and select the format you want for the drive: GUID Partition Table; Apple Partition Map; Master Boot Record.

Then Click OK.

Click to confirm that you want to go ahead, and the drive will be reformatted in the selection method.

——————-

And… only so it’s all in one place, here the bit from my previous post about those different formats:

And in that vein, here’s a bit about GUID (aka GPT) vs APM.

[GPT = GUID Partition Table = Globally Unique IDentifier Partition Table]
[APM = Apple Partition Map]

When you buy a bare drive, it’s formatted as… none of the above: it’s MBR – Master Boot Record – which is what PC’s use, and why you need to format it with one of the others. (MBR is recognized by the Mac OS, but its structure imposes limits on what can be stored on the disk.)

You need APM to boot a PPC Mac, or use on a PPC Mac that isn’t running at least 10.4.8.

If you’re on an Intel mac, there is no reason at all to use APM (unless, of course, you’re planning on using the drive on a machine that meets the above criteria.)

And… if you’re on a PPC machine, and are running 10.4.8 or later, then the only drive you need formatted as APM is the boot drive (&, of course, any drives you’re cloning to with the intent of doing a drop in replacement.) The rest of your drives can be GUID, which offers some advantages.

Entirely anecdotally, the seem a smidgen faster to me… although it seems it’s somewhere in the 8-10% range (and I could simple be delerious, too.)

That said, they employ checksums on the partition map and header, as well as duplicates of each of those and the partition maps are larger. There are other tidbits which, like those I just mentioned, are not anything you’d ever notice in use… but make geeks like me really happy.

(OK… it makes your drive a bit more resistant to some kinds of corruption.)

But (since block copy was mentioned here recently) one needs to be sure that you’re using a block-copy program which is written for the GUID formatting, since programs only “familiar” with APM may yield a problematic copy (depending on its intended use). See Apple TN2166.

Upshot?

Intel: GUID all the way.
PPC: OS less than 10.4.8 – APM all the way
PPC: OS 10.4.8 > : APM for boot; GUID for everything else.