sprockets The Snowman is coming! Realistic head model by Dan Skelton Vintage character and mo-cap animation by Joe Williamsen Character animation exercise by Steve Shelton an Animated Puppet Parody by Mark R. Largent Sprite Explosion Effect with PRJ included from johnL3D New Radiosity render of 2004 animation with PRJ. Will Sutton's TAR knocks some heads!
sprockets
Recent Posts | Unread Content
Jump to content
Hash, Inc. - Animation:Master

Rodney

Admin
  • Posts

    21,575
  • Joined

  • Last visited

  • Days Won

    110

Everything posted by Rodney

  1. It's hard to say without knowing more... Two things come to mind: 1) Perhaps you haven't added all the Actions required 2) Perhaps you've added the Actions but they are offset to a later time in the animation Those would be the first things I'd check.
  2. Others are joining the effort to create patent free and open media formats: http://aomedia.org/press-release/alliance-to-deliver-next-generation-open-media-formats/ From the Alliance for Open Media site: From Techcrunch:
  3. Yes, your activation code will work only on that computer.
  4. It's good to see you again Steff. Yes, a good computer is essential. I'd say using WIndows and/or Mac is important but for the brave (that sounds like you) other recipes may work too. It may be worth noting that Hash Inc doesn't support A:M on other platforms.
  5. Think you are safe from being tracked in WIndows 7 or 8? Think again: http://www.pcworld.com/article/2978239/windows/microsoft-slips-user-tracking-tools-into-windows-7-8-amidst-windows-10-privacy-storm.html
  6. I'll recommend that if travel and attendance is obtainable your daughter attend an event like this: http://www.creativemasterminds.com/ The event itself won't be entirely adequate (it's not a long term thing like diving into college) but will orient the mind and get her connecting with other creative types with similar interests. I'd call it a 'primer of the pump' which is often required to get the full flow in motion (successful understanding and achievement of realistic goals). Events like this, especially if they can be found locally can help orient a person and help them achieve realistic goals. The biggest expense is usually not the course/event itself but the transportation and lodging required to attend. As such finding a 'local' event is optimal. I once attended a week long animation course with Don Bluth. The course itself was worth the price of admission but the travel from Japan to Arizona made the event entirely too expensive. The grounding of expectations... that was worth every penny and more. There is another aspect of this that is important... besides in any course there are (at least) two tiers of people we learn from. While we will learn a lot from whomever instructs a course it is very likely that we will learn even more by interacting with other students. This is especially important to note if one considers that those students will often be the instructors (and peers) of the future. I'm a little impressed that prices of admission for events like this are in the $150 range (low end access). The downside of reality is that the underlying theme is one of 'money grants access'. While understandable... the speakers/event have to be paid for... this is always most unfortunate. The lack of financial means (i.e. money) is always going to leave key people (the yous and the mes) out in the cold. There are tons of events like this being run and more and more appear every day because there is growing interest in our media-centric world. Added: **Events like this are often attended by folks that have spent a whole lot of money and time attending colleges and courses that you (the student) can and more likely than not should avoid.
  7. If you are trying to get me excited about some secret feature of A:M... it's working. I'd guess that that may be a carry over from an early version of A:M where there was a pencil icon which... ah...er... um... I give up... I have no earthly idea that is. Edit: perhaps it's a carry over from Shift G (which provides a lazzo mode to draw around objects). Do you currently have a pen/stylus connected to your computer?
  8. As I said, there is a big difference between malware and a virus. The vast majority of issues we face are more akin to malware than virus. it is possible to create a completely secure environment... that absolutely no one can use. Not much sense in that. But reality shouldn't scare us. It should enlighten us. It's good not to trust computer security. Ashley-Madison anybody? If you think you are safe... you are in fact not. But again... the trade off... perfect security vs ability to freely operate. There are some persistent viruses out there that are hard to stop and if in contact with a system will 'do something' but most (smart) virus creators (there are many I'm told) don't want to destroy your computer. If they did that they wouldn't be able to accomplish any other goal... so many viruses don't do much if anything at all. They sit there... trying not to be noticed... one little piece of a much bigger puzzle. (The author) hoping no one will discover them. (The author) hoping the code isn't superseded and made useless by one of an endless march of installations/updates. For better or worse, installation of Win10 left a lot of old code in the digital dust. Storytime I recall my first encounter with a 'real virus' (back in the DOS days) and I managed to open it in a text editor and discovered it was pretending to be one virus but was really another. I was all happy and excited and printed the code and took the pages to the real computer people that were paid to know what was going on. They weren't interested. Even less interested when they noted I wasn't certified in their craft. About the same time someone else (in proper reporting chain) reported the true nature of the virus and the powers that be issued an antivirus update/operating system patch. The message went out, "Use this." My response, "Thanks." Bottom line here: Most people don't care about the nature of a problem. They don't want to study the problem. They don't care about the source of the problem. They just don't want the problem. This is like the illustration of taking your car in to have the engine worked on. It's generally not a good idea to let the car's owner see the mechanic rip wires and parts out of the hood and go through the process of 'fixing the car'. They just want a fixed car. If they see the process with all its gory details laid bare they will very likely be traumatized. "What are you doing to my car?$&!" This is important. It's amazing what can get installed on a computer without even knowing it was installed. For the longest time my dislike of Chrome intensified because it allowed extensions to be installed without my knowledge. I've been a long time user of Chrome and I almost moved away from it when finally they shifted their strategy to more properly exclude extensions by default. But Chrome isn't the problem. Don't surf porn sites. Be wary of most download sites. Fact: If you surf carelessly you will get malware/viruses (or a reasonable facsimile thereof). If you are an at risk computer user... know what you are getting into... and then inoculate yourself with common sense, proper protection and follow up processes. After you've installed a new and fairly unknown program... does everything still work optimally? Slight change of subject: We have moved into a very new realm of information warfare and it can be hard to tell whether code on your computer is put there by the good guys or the bad guys**. The only thing you can count on is that the code s already there without your knowledge (5th Generation Warfare) so you look for clues that belong to a bad guy. A core tenet of invisible warfare is that the circumstances will dictate. A process that is "deleting all my files" can then be treated differently than one that is "making me install a program I don't want". I haven't vetted this fully but I'd say that as a general rule of thumb; given a choice between an IT guy helping to fix my computer so that it will operate 'optimally' and a virus being installed on my computer, 9.9 times out of 10 I'd prefer the virus. **Most malicious code is put in place by 'the good guys' although they very likely didn't mean to put it there for nefarious purpose; the program is simply not operating as intended/required/authorized. This is why many/most companies screen their software first before allowing use by employees. If malicious code is placed purposefully (especially with intent to do irreparable harm) the effect should be obvious.
  9. Seriously? That's the only real solution? The following is long and a bit rambing but old frustrations from my years as a workgroup manager persist. As such I'll offer the following thoughts: For most browser based infections another solution is to reinstall the browser. I'd at least do that before formatting my harddrive. The number of times I've formatted my harddrive in the past I dunno how many years approaches zero. This isn't to say a formatted harddrive can't be a good thing. A squeaky clean harddrive will definitely clean out the cobwebs... but it'll also clean out pretty much everything else. So your efforts could prove to be more damaging than the imaginary virus you are trying to rid yourself of... And restoring from a backup to the new squeaky clean harddrive could (theoretically if not practically) reinfect your system. So, formatting a hard drive isn't the full-fix answer to these type of problems. I'm tempted to give you my recipe for success but... then someone could spice up that recipe and take advantage of known vulnerability against me. Never a good thing. Here's a starting place (a recalibration if you will allow) to consider in absense of the full recipe: Assume you have a computer that has no viruses and doesn't even have a dedicated anti-virus program installed. Assume it suddenly gets infected by something (we know this because stuff keeps getting installed that we don't want installed). Consider the cause was very likely that we said 'yes' to something we didn't want to say yes to and installed a program (for argument's sake we could call this a virus although technicially most nuisances of this type aren't). One of the first things we need to do is stop the program from operating. We can do this multiple ways and some work better than others. One method would be to temporarily install an antivirus/malware program and sweep the computer for known programs. After the results are in, bad programs removed or quarantined then uninstall the antivirus/malware program and you are back to square one again. Some persistent malware programs install in RAM and continuously launch/install new programs in an effort to stay one program ahead of the person trying to uninstall them. One method to stop and get to the point where antivirus/malware software can be properly dispatched would be to kill any programs that are running, then reinstall the browser and... then reboot the system. It might not be wise to reboot the system before killing the programs and reinstalling because the virus/malware might have left installation instructions that go into effect upon reboot. Reinstalling the program (usually browser) will usually overwrite that instruction. I generally don't care to reboot my system while having a major problem until after I've isolated the problem. This is where antivirus/malware programs can come in handy because they will quaranteen programs so they cannot run (especially upon reboot). In today's age it is quite possible to operate a computer with the default protection of the operating system alone. The trick is to stay clear of sites that are known to spread malware (and malware like programs that trick users into installing software) and to use other software for special purposes as needed; preferably uninstalling them when not needed which is generally any time you are directly working with/against a problem. It does help to stay up to date on your primary browsers. Malware writers study current vulnerabilities and exploit them where possible. When those vulnerabilities are removed by a new update of any give software/browser the malware writer has to then update his malware to work around/through the changes in the new software... and the process starts again. There is a trend now for software companies not to publish all of their changes in order to keep malware creators in the dark. This is a good move in my opinion but it does make a lot of folks nervous because they'd like to know what software changes/updates were installed. "Why is Windows updating? What is it updating? This is proof positive that is evil! What are they doing with my information? Are they sharing images of my pets with nefarious types in Russia? China? North Korea? Hoboken NJ? Etc. etc. Well, for starters, first most companies need to provide minimal protect for you so they can get more money from your wallet. So trust that they *initially* have your good interests at heart.. Trust but verify thereafter. Where is all of this going? I dunno. I guess I'm just saying that I think most problems faced on a computer can be fixed without resorting to formatting harddrives. I'm a bit old fashioned and naive in this but the first option I go for has never been and suspect never will be to reformat my harddrive. Although, I suppose I'd consider that option if I just happened to have just bought a new harddrive and was already planning to start from scratch.. Sorry if this is off topic... um.... Rusty changed the topic! Disclaimer: I've dealt with a problem similar to Rusty's experience on several occasions and (in my estimation) the true/underlying fix to the most recent was updating my (Chrome) browser (which was locked not to allow automatic updates... although I wanted automatic updates... did the malware do that too? Probably not.). It was a little more complicated than space here (and a imperfect recollection) will allow but... the final results (defeat of very persistent and well programmed malware) was what mattered. Note1: Historically, most antivirus software has been worse for your computer's operation than the viruses they claim to prevent. For this reason I tend to recommend temporary installation of antivirus software over permanent installation. Install it. Uninstall it. Press on. Of course, don't invite trouble. Use your operating system and browser default protection at all times.
  10. In addition to Fuchur's tutorial... Somewhere out there, Will Sutton has a video tutorial on connecting a rig to BVH.
  11. Those lessons go pretty deep... at least for non-mathy-types like me. Here's proof that I made it to the animation course**: https://www.khanacademy.org/computer-programming/longbounce/5236735532466176 * *Definitely needs more spin. If'n you want to learn about subdivision surfaces and the like... it's a nice intro. **Although... not proof that I was paying attention!
  12. Pixar has teamed up with Khan Academy to offer a free course on how animated movies are produced. Introduction: https://www.khanacademy.org/partner-content/pixar/start/introduction Course page: https://www.khanacademy.org/partner-content/pixar The folks at Pixar can now point aspiring creators to the Khan Academy when they ask those inevitable questions about CG animation. The basic breakdown of course material: Environment modeling Explore how blades of grass in Brave were created using parabolic arcs. Modeling grass with parabolas Calculating parabolas Character modeling Explore how clay models are transformed into digital characters using weighted averages. Modeling with subdivision surfacesMathematics of subdivision Animation Explore how animators bring characters to life using different kinds of animation curves. Introduction to animation curves Mathematics of animation curves Crowds Explore how swarms of robots in Wall-E were made using combinatorics. Building crowdsCounting crowds Sets & Staging Explore how virtual sets are constructed using geometric transformations. Geometric transformations Mathematics of rotation Rendering Explore how pixels are painted digitally using algebra. Rendering 101 Mathematics of Rendering
  13. Its not a new term of service. So, technically they've always had the upper hand.
  14. Which goes a long way toward explaining why folks held out on support enough that Apple didn't continue basic (read: free) support going into 64bit. And a reason other companies (like Cisco) are researching and developing new patent free codecs.
  15. When an Action Object is created those are automatically constrained to the initial Model so you might not have to use many additional constraints. Each Action Object can be selected separately in the Chor and independently animated as well. The bigger issue might be that if using Action Objects you won't be able to use Netrender as there is a reported issue with rendering Action Objects there. I must assume that importing the separate models into one master model isn't an option. Added: It seems to me that one of the difficulties is getting all three models to be of the same level (i.e one must be the main model while the other two are the Action Objects). A way to overcome this would be to use an empty model as the main model and then have all three models (with geometry) be Action Objects. The empty model could then be named something relevant such as 'Robot container'. Aside: For those this applies to a downside of combining Action Objects with the goal of later combining them into an external master model is that Export to Model format is not an option from the main model in an Action. The workaround is to assemble everything (drag the Action onto the empty model) in a Chor... THEN export to a new master model. I haven't tested to see if constraints and such make it through but they should.
  16. Thanks for that link Nancy... that's a great interview. (Haven't watched it all yet but playing through now) In about the 5th episode she says the important thing, "the easiest way to learn to make games is to make games." Then she goes on to add even deeper insight. This aspect is a reason why game design courses yield success. The students enrolled create games. And in the process learn. She likens the process to cooking. The way to tell whether your recipe will be a tasty meal is to put it together, place it on the stove, cook it and then taste it (or better yet... have some other folks taste it).
  17. Rodney

    Pollen

    Trippy! Congratulations!
  18. Has a bouncing ball (through a window) look to it at present.
  19. Also... Don't forget that in realtime you might see some differences from final render. Before you spend excessive time trying too many adjustments... render a test out to final.
  20. Glad to see everything worked out!
  21. Hey I remember that guy! The cartoony guy that is. Sorry Tom! Nice interactivity. Edit: Ah... wait a sec... the reason I don't recognize Tom is because... that ain't Tom.
  22. It's working the proper way here (v18 64bit/Win10). I seem to recall it not working properly (and working as you describe) some time back and after running 'Help/Reset Settings' from the menu the proper response worked again. So, you might try a reset.
  23. Partially mistaken. The operating system shouldn't have anything to do with activation. Although, it's a good idea to be running a fairly current version of Windows for performance reasons..
  24. A suggestion to get to the root of the issue: One of the easiest ways to solve the problem (in the short term) would be to request a trial version. If you can activate that trial you'll know better how to install and activate your most current purchase.
×
×
  • Create New...