Presenter Mode Features
VBrick 9000 Encoder Presenter Guide 11
Borders A border value 0-50 may be selected with the default set at 0. If a
border is applied, it will be applied to all video areas in the selected
layout. Video will be scaled down to fit the border with no video lost
due to border size. It should be noted that borders are used in
Presenter Mode to control spacing between video areas and the
background color appears in the border area. Borders are not used to
frame video areas.
Margins Margins are useful when inserting branding. Margins are different
from borders in that borders are applied to all video source areas
whereas the margins define the layout area itself. Margins are
specified in pixels.
Program Name Modifies the title of the Presentation.
Video Area
Mapping
Each area in the layout you have selected is assigned a video input
channel. Only the channel is mapped, not the specific input type. For
example, channel 1 is mapped, not channel 1 VGA. You may remap
each video/audio area as needed. Note the status of each area is
noted to the side of the area.
In addition to video sources, network sources may also be selected
here. However, unlike video sources, only one network source may be
mapped at a time so if you have a network source selected and you
choose another in a different area, the first network source will be
disabled.
The caveats below should be kept in mind when switching between
sources.
If you use an encrypted network source and switch to another
encrypted network source:
• Seamless switching between the two sources occurs if both have
the same encryption.
• Seamless switching between the two sources does not occur if
different encryption methods exist between them or if one is
encrypted and other is not.
If you switch between a video source and a network source:
• If the network source requires decryption, the switch between
video and network sources is seamless between the local video
input and the decrypted stream.
• However, if the video source is playing first, the first time the
encrypted network source is selected, the switch is not seamless.
Every switch thereafter, is seamless.
Field Description