Browse Definitions :
Definition

Fizt (physics tool)

Fizt (pronounced FIZZ-tee, and short for physics tool ) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs. Developed by David Baraff and Andy Witkin of Pixar Animation Studios, Fizt is said to incorporate the natural laws of physics to control the behavior of virtual objects in computer animation.

Until the development of Fizt, realistic animation of certain effects, such as hair blowing in the wind or the wrinkles in a shirt moving with its wearer, was practically impossible to achieve. However, in the animated movie, Monsters, Inc. , such effects were accomplished, including a virtual creature with more than two million movable hairs. Instead of animating each hair individually, the whole array of hairs was programmed to move according to real-world physical laws.

In addition to simulating the movements of fur, clothing, and other materials, Fizt makes it possible to portray a wide variety of emotions in animated characters by enhancing facial expressions and the realism of body language. Because Pixar believes that effective animation starts with a good script, their technical animation people now take a screenwriting workshop so that they can learn when to best insert, for example, an imbecilic grin or a dejected sag of the shoulders.

This was last updated in March 2011

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...

  • unified threat management (UTM)

    Unified threat management (UTM) describes an information security (infosec) system that provides a single point of protection ...

  • physical security

    Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close