Compare 2 Lists of Names

Compare 2 lists, with different name formats, different file formats (excel, txt, csv, pdf …) etc

  1. convert all files into csv with strings “” encoded
  2. convert to common encoding (usually utf-8 or  Win – 1252)
  3. parse names into nickname, salutation, first, initials or middle, last, suffix **
  4. match on last, then first  do exception list
  5. do fuzzy match on last, first do exception list

I ask people to give me excel files. I give them a little help on how to do that, but a search on importing and converting data into excel usually makes it pretty easy. This also usually gets the encoding into utf-8, however, that is a separate issue.

I load the data from the output of 3 into an sql table and do a number of matches

`FName` varchar(50) COLLATE latin1_bin NOT NULL DEFAULT ”,
`LName` varchar(50) COLLATE latin1_bin NOT NULL DEFAULT ”,
`H` ENUM(‘Y’, ‘N’) default ‘N’,
`P` ENUM(‘Y’, ‘N’) default ‘N’,
`K` ENUM(‘Y’, ‘N’) default ‘N’,
`R` ENUM(‘Y’, ‘N’) default ‘N’,
PRIMARY KEY (`LName`,`FName`)

The sample code I looked at for the name disambiguation is a classic string compare algorithm.

import Algorithmia
import csv
import sys
from numpy import zeros
from time import time

def apply(input):
venues = Algorithmia.file(“data://Nilojyoti/dblp/dblp_venues.csv”).getString()
wiki_venues = Algorithmia.file(“data://Nilojyoti/dblp/wikipedia_venues.csv”).getString()

vlist = venues.split(‘,\n’)
wlist = wiki_venues.split(‘\n’)
result_list = {}

for venue in vlist:
mindist = sys.maxint
for wikivenue in wlist:
distance = edDistDp(venue, wikivenue.split(‘ – ‘)[0])
if distance < mindist:
mindist = distance
wmatch = wikivenue
return result_list

def edDistDp(x, y):
“”” Calculate edit distance between sequences x and y using
matrix dynamic programming. Return distance. “””
D = zeros((len(x)+1, len(y)+1), dtype=int)
D[0, 1:] = range(1, len(y)+1)
D[1:, 0] = range(1, len(x)+1)
for i in xrange(1, len(x)+1):
for j in xrange(1, len(y)+1):
delt = 1 if x[i-1] != y[j-1] else 0
D[i, j] = min(D[i-1, j-1]+delt, D[i-1, j]+1, D[i, j-1]+1)
return D[len(x), len(y)]

Example name parser

Array (
[nickname] =>
[salutation] => Mr.
[fname] => Anthony
[initials] => R
[lname] => Von Fange
[suffix] => III
**The algorithm:**

We start by splitting the full name into separate words. We then do a dictionary lookup on the first and last words to see if they are a common prefix or suffix. Next, we take the middle portion of the string (everything minus the prefix & suffix) and look at everything except the last word of that string. We then loop through each of those words concatenating them together to make up the first name. While we’re doing that, we watch for any indication of a compound last name. It turns out that almost every compound last name starts with 1 of 16 prefixes (Von, Van, Vere, etc). If we see one of those prefixes, we break out of the first name loop and move on to concatenating the last name. We handle the capitalization issue by checking for camel-case before uppercasing the first letter of each word and lowercasing everything else. I wrote special cases for periods and dashes. We also have a couple other special cases, like ignoring words in parentheses all-together.

Check examples.php for the test suite and examples of how various name formats are parsed.

**Possible improvements**

* Handle the “Lname, Fname” format
* Separate the parsing of the name from the normalization & capitalization & make those optional
* Separate the dictionaries from the code to make it easier to do localization
* Add common name libraries to allow for things like gender detection

**Same logic, different languages**

* [Name Parser in Java](
* [Name Parser in JavaScript](
* [Name Parser in CSharp](

**Credits & license:**

* Read more about the inspiration for this [PHP Name Parser]( library by [Josh Fraser](
* Special thanks to [Josh Jones](, [Timothy Wood](, [Michael Waskosky](, [Eric Celeste](, [Josh Houghtelin]( and [monitaure]( for their contributions. Pull requests are always welcome as long as you don’t break the test suite.
* Released under Apache 2.0 license

** Nickname is important to the convention and association industry ( a big user of this functionality) as nickname is often used on badges identifying attendees instead of first name


A few ways to check email problems

Diagnosing email problems requires you to test possible causes in an iterative fashion. For any given email, there are a complex number of factors at play in sending it and having it successfully delivered.

If you do not know how to copy and paste from web pages, documents and emails, you need to get someone to help you with your problems.  If you do not know how to use the Snipping tool or take a screenshot (if you are not using windows, search for snipping tool on the mac, or your tablet etc), learn how to do it so that you can send an exact copy of any messages etc you receive.

The short story (TSS) is, whoever is having problems sending email, send a plain text msg with no signature to the recipient.  You should get an undeliverable email back.  Another thing to do is to send to a deliberately bad email address (example so you can compare the undeliverable reports.  If something in your email looks like a forgery, or contains links to bad websites, or contains programs, bat files, .js files as attachments, it is possible that you can get rejected at the server level. Sometimes the error indicated is just a “suggestion” of where to look for your problems.  Try different variations, different senders, different organizations and email address etc and compare your results to see what the problem is.  You might want to run some of the Tools mentioned below. 

I do a quick scan of my spam folders daily and delete / empty them.  It makes tracking this sort of thing easier.  I use 3 different emails for different purposes. A smart thing to do with your email and passwords

Make sure you share your undeliverable “bounce back” emails with whoever is helping you.  Use Dropbox, Google Drive, One Drive, A wordpress blog, forward to a friend ….

Financial institutions, hospitals and many other organizations can have very restrictive email policies. It is not uncommon for them to reject emails with attachments or links, or pictures, or zip files etc. There are a lot of vendors serving the email market, and subtle incompatibilities between systems can arise.
S&*( Happens
If you can’t figure out the problem, start here:

1) Document your email account

How to do you access your email?

Do you use a page you access with a web browser or a program like outlook?
Do you use a service like gmail for business or outlook 365?


Email Address :
Email Application : Chrome Browser
Log into: with my user name and password

other examples: Outlook 2007, Apple Mail, I log into Squirrel Mail on my web host, …

2) Both the recipient and sender should make sure they have added all pertinent sender email addresses and domains,  in their safe senders list. This varies by email provider and application  Search for it:

For example
We searched for “office 365 add domain to safe sender”
and found this:

3) Document who you are having problems sending email to:

4) How to create a test email

Subject: Test X (where x is the number of the test in the sequence, add 1 for each email sent)

(repeat from , to)


A note about this test:
    First test after changing safe senders
    Removed email signature
    Sent Text email
    My time is Thu, October 17, 2017 3:06 EDT
    Sent from my phone, tablet, desktop running Windows

The person who is having trouble sending email should be doing these tests.

Take a minute to send your test mail.
You notify your recipient tester that it is on the way (send a txt, leave a phone message)

You may have to wait up to an hour for it to wind its way through the systems.

It is helpful to send a plain text email, with no signature or links in the subject or body.  Again, search the help for you email provider / application.  Example “ send a text email”.  If you can send a plain text email successfully, start by removing and links, pictures, codes etc from the email with a problem.  The problem could also be a link or a picture ( a type of link) in your email signature.

It is important to try and describe accurately what error codes, messages etc are associated with a test email.
The recipient and sender should always check their spam folder.
If the sender gets a message, a returned email, undeliverable etc, they notify the recipient by text or phone.
If the recipient gets a message, they notify the sender.

7) The sender should get an undeliverable message or something indicating error back.

Here is an example of an undeliverable message : Goto to example

If you can’t figure out the problem from the undeliverable report, you can copy and paste all this information into sections of a document to send it to you support person.

Sometimes the error indicated is just a “suggestion” of where to look for your problems.  Try different variations, different senders, different organizations and email address etc and compare your results to see what the problem is.

Sometimes it is useful to both copy and paste the message and to do a screenshot or snippet of what you think is the most pertinent part is.  Look for an easy to read message stating what the error is.

If you do not get an undeliverable message back,  try some of the variations mentioned above.  Have someone else in a different organization, with a different email provider try and send a test text message and see what happens.  And, make sure you have internet access etc before you call in the calvary for help. Computer Problems?

If you do not get any errors, but, do not receive the expected email both sender and recipient forward a email containing the pertinent information above to your tech support teams asking them to please resolve the error.  If you do not have tech support, ask a knowledgeable friend for help.

Is there tech support for your email provider?
Document it so that both email support teams can talk to each other. Please provide contact information and whatever authentication codes etc you need to contact.


Outlook 365
Email Address :
account : My Organization

Contact email
Contact Phone
Contact chat

Email is finicky.
When you send an email it goes through a lot of steps, any of which can fail.
The most effective way to test is to test iteratively and make small changes.
But it, can be a simple process, if you follow these steps.


You can run tests to check your email accounts for various problems.  These are free systems and may produce erroneous or miss problems; however, in many cases they can be useful.  Document the results of your tests for whoever is helping you with your email problem.

If you send a lot of marketing or notification emails (bulk email), the first thing you  want to check to see if your address has been blacklisted.  In any case, it does not hurt to check your email address to see if its blacklisted.  The sites that check this come and go frequently, so you might have to search for something like “is my email address blocked”.  Here is an example page that show a way to get started on checking. .There are a lot of lists. It is helpful to know what list the recipient (and senders) email service provider use. These lists are also quite dynamic and occasionally these sites report sites that are not on their current lists or omit sites that are on their actual or live lists.  Also see below.  It checks you email for known flags etc. Here is another useful article on checking the known blacklists.

The CAN-SPAM Act of 2003 became law on January 1, 2004. According to the FTC, if you violate the law, you could be fined $11,000 for each offense—that’s $11,000 for each email address on your list. ISPs around the country have already successfully sued spammers for millions of dollars under this law. If you send commercial email (generally sales or promotional content), you should familiarize yourself with the requirements of CAN-SPAM.

A few key points of the law include:

Never use deceptive headers, From names, reply-to addresses, or subject lines.
Always provide an unsubscribe link.
The unsubscribe link must work for at least 30 days after sending.
You must include your physical mailing address.

A simple email address checker:

Enter the address and check


Document your result:

A more sophisticated checker with lots of options.


Enter the domain name to check, When it completes, check your report.

In this case, I can hit the Find Problems or do a Blacklist check or SMTP check


After hitting Find Problems


The above is an example using my a domain I own called
In this case, the The Certificate has a name mismatch is erroneous. I do not have an https address for this site.

See the show all test button, click it

With some of the test like this, you can get an option to email yourself a report, or save a pdf of the report.  At the very least you can copy and paste this.  Or you can save the page.  Lookup how to save a page for you browser.  Usually it saves and html file and associate folder with information with the page that you can send to your support people.  From the location it saved the page, check for the name it saved it as,


File ..Downloads\ Domain Health.html
Folder …Downloads\ Domain Health_files

Test you email for some spam checks and other red flags 

Follow the instructions.

In addition, learn how to do this:

See if you can do something like “View Message Source”  or “View Full Header ” for your  emails.  Someone will probably ask you to do this.

If you have no one to help you, I am available for $35 dollars an hour.


Here is a description of some of the behind the scenes details involved in Authenticating Senders

Email authentication greatly simplifies and automates the process of identifying senders. By quickly verifying a claimed domain name, it is possible to triage the incoming flood of mail. Forgeries and known spamming domains can be rejected at the connection level, without wasting any time on data transfer, or even testing a long list of possible recipient names from the spammer’s dictionary. Reputable senders can be given a pass for an entire session, allowing them to bypass the IP blacklists and statistical filters that always lose some valid messages. The remaining flow can be treated the same as we now treat all email – rigorous filtering, return challenges to the sender, etc. Successful authentication, coupled with a domain-rating system, will reward reputable senders and encourage others to clean up their outgoing mail.

There are a number of methods to authenticate a sender’s domain name ( SPF [2], SenderID [3], CSV [4] , DomainKeys [5], and others). All are very effective in stopping the kind of forgery now prevalent. None exclude the use of other methods, although there is a lot of overlap in basic function, and some incompatibilities. There are small vulnerabilities in each method, and it may be that a combination of two will be required to cover all the cracks. The most widely used will likely be the ones that require the least effort on the part of senders who are reluctant to assume any responsibility for operating public mail servers.

CSV, SPF, and SenderID authenticate just a domain name. DomainKeys uses a Digital Signature to authenticate domain names and the entire content of a message. CSV and SPF can reject a forgery before any data transfer. SenderID must see at least the headers, and DomainKeys must transfer the entire message. CSV is the quickest. DomainKeys is the most thorough. CSV checks only the HELO name at the start of each SMTP session. SPF checks the return address on each message “envelope”. SenderID checks the From address in the headers of each message. Domainkeys can detect any alteration in the headers or body of a message.

CSV, SPF, and SenderID work by checking the IP address of the actual sender {4} against a list of addresses authorized by the alleged sender. If the sender says “HELO this is sending to you from address”, the receiver can query AOL’s records in the Domain Name System ( DNS ), and see if that is indeed an address authorized to send mail on behalf of AOL. So far, it looks like DNS is secure {5}.

DomainKeys also uses DNS to retrieve secure information from the alleged sender, but instead of a list of authorized addresses, the sender provides a public key for his domain. This key can be used to verify the signature on the message, independent of any IP address. Freedom from IP addressing means the message can go by any route, including through a forwarder.

The use of forwarders is common for small domains which prefer not to manage their own mail server, and for individual recipients, who prefer to keep their personal address when they change jobs or ISPs. SPF and SenderID can also work with forwarders, but the extra steps add complexity and some vulnerability to the system (see below). CSV limits its focus to one-hop authentications, and assumes a signature method will be used for end-to-end authentication.

Use of the DNS database to register authentication information for a domain is relatively new. The new information is added to existing DNS records, and queries for this information are handled the same way as any other DNS query. Publishing authentication records in DNS is voluntary, and many domains probably won’t bother. However, any legitimate domain, even those that don’t intend to operate public mail servers, will most likely want to block others from using their name to forge emails. A simple code in their DNS record will tell the world, “Block all mail claiming to be from our domain. We have no public mail servers.”

An Example Undeliverable Message Source

When you see … it means a whole lot of random characters that are of no interest to humans, this is just a sample of what you might see. Lots of things have been deleted, and these vary by both sender and recipient mail system

Received: from from ( by with HTTPS

Delivery has failed to these recipients or groups: (
Your message couldn’t be delivered. The Domain Name System (DNS) reported that the recipient’s domain does not exist.

Contact the recipient by some other means (by phone, for example) and ask them to tell their email admin that it appears that their domain isn’t properly registered at their domain registrar. Give them the error details shown below. It’s likely that the recipient’s email admin is the only one who can fix this problem.

For more information and tips to fix this issue see this article:

Diagnostic information for administrators:

Generating server:
Remote Server returned ‘550 5.4.310 DNS domain does not exist [Message=InfoDomainNonexistent] [] []’
Original message headers:

DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;;
s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;
Received: from
( by
( with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id; Tue, 17
Oct 2017 21:08:01 +0000
Received: from ( by ( with Microsoft SMTP
Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id via Frontend Transport; Tue, 17 Oct 2017 21:08:01 +0000
Received: from ([]) by ([]) with mapi id
15.20.0077.022; Tue, 17 Oct 2017 21:08:01 +0000
From: Gary ? Johnson
To: “”
Subject: This is the subject line
Thread-Topic: This is the subject line
Thread-Index: AQHTR4wCXhbZPgww706li0imsCfhvw==
Date: Tue, 17 Oct 2017 21:08:01 +0000
Accept-Language: en-US
Content-Language: en-US
authentication-results:; dkim=none (message not
signed) header.d=none;; dmarc=none action=none;
x-incomingtopheadermarker: OriginalChecksum: …
x-ms-exchange-messagesentrepresentingtype: 1
x-tmn: [5tZAHpL1A+VBmZ1x15R7VQEN4LHcVqOQ1pBIFXvOmbu5IcPjW77yWM1ZXzfh4hOY]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; ……=
x-incomingheadercount: 44
x-eopattributedmessage: 0
x-ms-office365-filtering-correlation-id: 276019eb-9aba-45c7-f4ae-08d515a32668
x-microsoft-antispam: UriScan:; ….
x-ms-traffictypediagnostic: BY2NAM01HT152:
x-exchange-antispam-report-test: UriScan:;
x-forefront-prvs: 04631F8F77
x-forefront-antispam-report: SFV:NSPM;SFS:(7070007)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative;
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Oct 2017 21:08:01.0589
X-MS-Exchange-CrossTenant-fromentityheader: Internet
X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2NAM01HT152

Copy from the Original


A young monk arrives at the monastery. He is
assigned to helping the other monks in copying
the old canons and laws of the church, by hand.
He notices, however, that all of the monks are
copying from copies, not from the original manuscript.
So, the new monk goes to the Old Abbot to question
this, pointing out that if someone made even a small
error in the first copy, it would never be picked up!
In fact, that error would be continued in all of
the subsequent copies.
The head monk, says, “We have been copying
from the copies for centuries, but you make a
good point, my son.”

He goes down into the dark caves
underneath the monastery where the original
manuscripts are held as archives,
in a locked vault that hasn’t
been opened for hundreds of years.
Hours go by and nobody sees the Old Abbot.
So, the young monk gets worried and goes down to look for him.
He sees him banging his head against the wall and wailing.
“We missed the
! We missed the

We missed the bloody
His forehead is all bloody and bruised and he is crying uncontrollably.

The young monk asks the old Abbot, “What’s wrong, father?”
With a choking voice, the old Abbot replies,
“The word was …

Making a Video while walking using a Smartphone


I am trying this rig.  I cut holes on the side of my smartphone case, looped some fishing line through it so I could attach a camera strap.

example of Gary using the rig

Landscape mode, no zoom

Wear Sneakers / comfortable shoes

You must teach your mind to coordinate body movements (Kinesthetic Memory).
Learn to walk without moving your upper body up and down, side to side, or with any changes in forward speed at all.
Pick a line and walk towards it, make that line level and smooth, walk slow
Heel to toe, roll on foot
Walking heel to toe in a smooth, flowing motion helps to keep your body stable.
Take small steps
Stop with the weight on one foot.
Distribute weight from heel to toe.
Walk with wide open feet (side to side bouncing).

Walk smoothly, like Groucho Marx  in a partial squat, with his knees bent and flexed. Use your leg muscles to absorb all shock.

Do not walking sideways.

Keep both arms in.
Hold both elbows near your chest. This helps create a solid platform for your camcorder, and helps prevent the accidental tilting of the camera that can occur with your arms extended away from your body.
Keep your elbow at a 90 degree angle to help with controlling the rig.

Use a Winsock
Start 2 seconds before shot

Before you pan (pivot horizontally), pre-select your start and finish compositions and plant your feet facing exactly midway between them. Twist only your upper body to frame the opening of the shot and then swivel smoothly to the end position.

When panning and/or tilting, plan a beginning and an ending before you shoot

More high tech gadgets out or coming:

search for smartphone gimbal

or zhiyun smooth q gimbal at around &150 shown in this video:

Creating a Watchable Video

With smart phones and a few guidelines

TSS (The Short Story)

  • Framing – in Landscape mode
    If Interview – Rule of thirds.
    If Presentation (Like the news) Subject in middle, eyes on top rule of thirds horizontal line
    Use some space around the subject top, right, bottom, left and back and front.
  • Stability – not handheld
  • Lighting – subject faces the light, shoot near a window
    [ Subject   <- Camera (between light and subject, but not blocking light)  <- Light]
    Do not shoot into the light
  • Audio – get close
  • Set / Sound – quiet
  • Make a test video


Be yourself. Your knowledge and enthusiasm make the video interesting.
Be aware of your sound quality. Speak loudly and clearly.  Enunciate every word and use variety in your pitch and inflections.
Use clear, concise sentences.
Use videos to enhance, rather than repeat, material about your topic that is already in a brochure or web pages.
Practice a couple of times.
Put some pizazz in your presentation — this is no time to be shy — you’re a pro gangdammit.
Show Some Enthusiasm!  Channel your inner movie star!

Camera Operators

Get to know your equipment!   Press all the buttons. My Nexus 5x  video camera screen has 3 icons on the right and a menu on the left.  Far right is the setting for  flash, on or off.  Next to that is the setting for lighting, auto and 4 other types of lighting, Cloudy, Sunny, Fluorescent and Tungsten, and next to that the selector for what type of grid (see rule of thirds below). After you start up either your photo or video camera, tap the screen, this sets your focus and exposure level for the shot (autofocus). Depending on your version of Android, you may get a slide control that lets you manually change the exposure level.

Where is the microphone for the rear camera?
On my Nexus 5x its is the tiny hole in between the USB port and the Aux ports at the bottom of the device. I get better audio when I take my phone out of its case.


Your smartphone camera is an amazing device.  A child can make a make a pretty good video.  With a little practice, so can you.  I am an android smartphone user.  These tips are mostly not iPhone or Android specific. This link talks about using exposure lock and not using digital zoom, other than that, it has the same tips as in this article.

Sunny Lenarduzzi has some short, to the point videos

How to Make Videos with your Phone

How to Get Comfortable on Camera

MAKE SOME VIDEOS.  Use these tips and find out what works for you!

More Tips and Tricks

Chose a good location. Determine if the background is appropriate to your topic.
An office background is fine; however,  make sure there is no movement or distracting items.  You want the focus on the subject. You do not want something in the background drawing the viewer’s attention.

Record in a quiet place and use the best quality microphone available.
If you’re not using a mic, get as close to the subject as possible.
If you shoot outside, or inside in a public area, a microphone is critical.
Close all windows and doors. Turn off any fans, heaters or other noises in the room.

Try and have a nice natural light shine on your subject.
The subjects should face the light (the window, etc.)!

Shoot a test video.

View it to determine if there is wind or any other noise. Do a soundcheck! Check for reflections and shadows, glare, etc.  If your test video is too dark, try using a lamp off to the to side, and shining down on subject

The Rule of Thirds and The Golden Ratio

What are those Grid Lines on your camera’s viewfinder?  When shooting a single speaker, it is fine to frame your subject in the center, with the eyes along the top line of the rule of thirds grid.  For other landscape scenes, take a look at the next 3 links.
Rule of third examples
The golden ratio examples

File Formats

If multiple people are making videos, make sure they all shoot in landscape!
The video format standard to use, or save as, or convert to is Container mp4,  Video Codec H.264. Youtube will convert a lot of formats when you upload to a decent streaming format.

Video Stability

Use a tripod or some kind of fixed stand.

SmartPhone Tripod Adapter $1.62
Amazon and Best Buy are pricey, try Walmart and Ebay.

Homemade Tripods

A couple of really easy do- it-yourself tripods can be found here: My favorite:


Does the camera have to move? Let me google smartphone dolly for you.

Example Mic

Older microphones use the TRS plug standard. It has 2 rings. Mikes that plugin to your phone use the 3 ring TRRS standard. On android, you need to use Open Camera to select the microphone as the audio input.  Let me google “microphone for iPhone” for you

Example Winsock for Shooting Outdoors

One of the real pains in shooting outdoors is wind noise.  A winsock aka dead cat (let me google that for you ) really cuts down and this problem.

Homemade Winsocks

spongewinsock Trim it with scissors, and color it black , it does the trick

Example Video with Tips on Making Types of Promotional Videos I have included this link as an example of how to present in a video.  Notice the gentlemen’s style. Relaxed, yet enthusiastic.

More on Lighting LED Lights.
A nice LED light for $25 LED that you can mount on a tripod.  nice tip on white balance.

Video Editing

You need an opening credits and closing credits,  Sprinkle in some slides.
I use NCH Videopad.  Learn how to trim clips, add transitions and add music.  Overlay text to make important points.

Use Some Public Domain Music

Video Hosting

Use Youtube or another suitable streaming video platform to host your video.
Container mp4,  Video Codec H.264.

Learn about your Smartphone’s Video Assistant Capabilities.

I use an Android Nexus 5x with Google Project Fi.  I go to I click on assitant, and I can create animations, collages and a number of other cool things. The capabilities on my phone are even more amazing.  I can create a movie using up to 50 pictures.

Making a video can get out of control, hopefully, this this will help put things in perspective:

The Millennial Marriage Proposal :

Taking it to the next step, the Upgrade
In Boston, you can rent really nice equipment to make videos. More gear.

My Youtube Account  SCEH Youtube page

Other Resources

Boston Film and Video Production

Android users may find it a little more difficult to get more detailed information about their devices. There are many more manufacturers for Android devices. Luckily, you do not need much more than what’s here to make a good video.

There is way, way, way more to photography and video than these tips.   Take for instance this very short tip on Depth Of Field:

The first rule for understanding aperture and depth of field is very simple: the larger the aperture, the shallower your depth of field will be, meaning a smaller portion of your image will be in focus. The smaller the aperture, the deeper your depth of field will be, resulting in more of your image being in focus. Now here’s the tricky part: aperture size is denoted by a number, and the smaller the number, the larger the aperture. Setting your aperture setting to f2.8 will yield shallower depth of field than setting it to f11. Another way to think of it is that a smaller number means less depth of field.

A more comprehensive tutorial on the subject has, not all kinds of light are equal, Overexposure, underexposure, iso shutter speed, etc.

Finchie needs to speak.

From the Daily Mirror

So after the past few weeks of shite that’s been floating around on Facebook iv tried to stay out of it.

But I can’t, not anymore. Finchie needs to speak.


What’s the craic lads! I don’t think we have officially met. Finchie here from Ireland, we are that non aggravating, laid back post English island to the west of the bulls***.

So how’s yourself? Been busy I hope. I see from the shallow media outlets and “copy paste” fear posting on social media that ye have been up to your neck in it the past few months. Good for you!

Sorry to be bothering ye boys while ye are busy planning the world’s biggest burning man festival in the name of Alan, (or what ever he’s called) but something has come to our attention to past few days that we need to have a quick “chat” about it.

What’s this I hear about ye adding us to a list of countries called “The Global Coalition” in some mad 80’s themed propaganda video? Ah lads come on will ya, shtep down from 3 legged horse now for a second and rewind the cassette cuz I think ye got it wrong.

First of all, lads were only here for the craic! We have been through too much sh**e hawking over the past couple of thousand years to be goin all “rouge and sh**” and joining in fights we clearly don’t want to be part of

“It’s like when a fisht fight breaks out in primary school between Vince and Iano Kelly. Most of us just watch, shout a bit and kick a bin to make noise or whatever, but we don’t bother getting involved (well Vince is English so any sly opportunity for a shneaky kick to the shins and were all over it) we couldn’t be a***d with the hole thing, we’re simply too laid back.

Now keeping that in mind let me let you in on a few tips if you do decide to come over here and pi** in our cornflakes.

Don’t judge us on the actions of the lads across the pond. We don’t like that craic. I get that ye have yer fight an all, but dont drag us into it, we don’t give a left b****ck for Alan and what he tells ye to do.
Sharon’s law, (or whatever it is) won’t work here. I know a Sharon, and she’s a c***. We don’t like her either.

Don’t bomb our sh**. We just finished building it back after breaking free from the very enemy you also have on your hit list. (if you want tho you can destroy leitrim, absolute sh**ehole lads I’m not joking)

We have more than one army. 1 official army (actually went training in north cork recently to prepare for your arrival. And yes north cork is exactly like Damascus, especially fermoy on a Friday night).

We also have a few non official, highly secretive, multi talented armies all with the same name (you get used to it after a while) who hate each other but have one very important thing in common…all mad b****rds. Let that sink in

By the way the unofficial armies are all trained in guerrilla warfare. Meaning your f***ed. Like actually f***ed. Unless you want to buy weapons, then some of them will turn a blind eye to “the cause” and sell ya a few AKs while you visit.

Don’t even think about blowing up Leo Burdocks!!! Consider this your harshest warning!

If any single pub is damaged during your short stay here, we will consider this an act of war!!! And we praise to our God Arthur, we will strike down on you with great vengeance and furious anger on those who attempt to destroy our drinking patterns during a time of crises!.

On a final note, remember these and you should be fine:

1. Offies close at ten

2. Don’t leave the immersion on

3. PM me for Bono’s address

4. Don’t bomb sh** when the toy show is on

5. Start with leitrim

6. If your looking for virgins you won’t find any on Harcourt street

7. Get a Tesco clubcard. Trust me.

8. If you want to blow up a stadium, go to dalymount please.

9. Go to a water protest, they don’t judge you for where your from, just if you pay or not.

10. Finally, if asked for change, eyes down and keep F***ing walking!

So ISIS its good to meet you. Do yourself a favour and us, stay where you are. You don’t want to come here, were not bothered with the issues you have.

But if you do, we will beat the sh** out of all of you using mammies wooden spoon, kilkenny hurlers and the bouncers from the copper faced Jack’s.

Yours unintentionally

Finchie and the rest of Ireland