Closed

Create an Animation

This project received 36 bids from talented freelancers with an average bid price of $710 USD.

Get free quotes for a project like this
Employer working
Project Budget
$250 - $750 USD
Total Bids
36
Project Description

We have a 3D video that has needs to be updated since its outdated and needs to be recreated and enhanced into something more elegant and represented in better graphics, your story board is the old video, which you can either copy and paste, or you can put your own personal creative input which we wont mind.

Please send us your work that is not less than the Expected Graphics output level, we wont be accepting anything without a proper cover letter accompanied with previous works.

The old video is almost 3 min long, the new one will be 2 min and some few seconds, it wont exceed 170 seconds. write dear GOOD sir so I can make sure that you read [url removed, login to view] watch the old video, the expected graphics video and the read the Script below

Old Video:

[url removed, login to view]

Expected Graphics output (ignore the bad video editing and the sound editing and focus on the graphics) :

[url removed, login to view]

[url removed, login to view]

Link to the expected result style

Script:

Information Leakage

The most important thing to our organization is our Information. Information drives our mission and is targeted by numerous competitors. The easiest way for someone to cause harm to our organization is by compromising an insider. An insider can be anyone who works in our organization including employees and contractors. Insiders are prime targets because they have the means and methods to cause a great deal of harm since insiders are often given more access than what they need to do their jobs. Compromising information becomes a simple task. It is as easy as copying critical data to a portable drive or just emailing it out of the organization.

If you see the following behavior you should report it immediately to the security team:

• Someone asking for access to information they do not need access to in order to perform their jobs.

• Copying large amounts of information at a copier carrying a large number of documents out of the organization

• Transferring extremely large or unusable files

• Working strange hours and coming into the office when no one else is around.

• Someone trying to log into someone else's accounts or asking someone to give them access to a secure area such as a data center.

• Sending a large number of emails out of the company with attachments.

• Carrying USB drives out of the organization.

In order to minimize the impact of the information leakage threat, take the following steps to help protect yourself and our organization for any information that you are responsible for:

• Only give people access that is required for their job function this access should be reviewed on a regular basis.

• Do not copy work related information to personal drives or take sensitive information home with you unless you have prior authorization.

• Always lock your computer when you were going to be away for a long period of time.

• Never give anyone access to your account.

• Always be on the lookout for suspicious behavior

Skills Required

Looking to make some money?

  • Set your budget and the timeframe
  • Outline your proposal
  • Get paid for your work

Hire Freelancers who also bid on this project

    • Forbes
    • The New York Times
    • Time
    • Wall Street Journal
    • Times Online