Blog Post
If Only We Had Better Test Content…
I just saw this news about research that says you notice compression artifacts less if you like the content of a particular video clip: Using four studies, Kortum, along with co-author Marc Sullivan of AT&T Labs, showed 100 study participants 180 movie clips encoded at nine different levels, from 550 kilobits per second up to... View Article
Blog Post
Creating Single-Frame Movies
Create high-quality photo-video hybrids effortlessly using ffmpeg! Optimize your AVI or MP4 files for flawless playback on any platform. Boost your media game today!
Blog Post
The Basics of 3D Image Acquisition
One of our clients is heavily involved in 3D video and has been for several years. However, several are just now starting to think about it because of the uptick of interest in the consumer electronics world. Enough questions have been posed to us recently that it seemed worthwhile to me to pull together a... View Article
I just saw this news about research that says you notice compression artifacts less if you like the content of a particular video clip: Using four studies, Kortum, along with co-author Marc Sullivan of AT&T Labs, showed 100 study participants 180 movie clips encoded at nine different levels, from 550 kilobits per second up to... View Article
Create high-quality photo-video hybrids effortlessly using ffmpeg! Optimize your AVI or MP4 files for flawless playback on any platform. Boost your media game today!
One of our clients is heavily involved in 3D video and has been for several years. However, several are just now starting to think about it because of the uptick of interest in the consumer electronics world. Enough questions have been posed to us recently that it seemed worthwhile to me to pull together a... View Article
Blog Post
Thoughts on 3D After NAB
I just returned from this year’s NAB show, where I was bombarded with 3D demos in virtually every booth. Most of the factors driving this 3D superabundance originate outside of the broadcast industry itself. First, TV manufacturers are hot on 3D as a way to get everyone who just bought an HDTV to upgrade to... View Article
Blog Post
Encoders Aren’t Commodities
My partner Ben Mesander had a really cool post the other day: An H.264 encoder written in 30 lines of C code. Ben’s encoder outputs completely valid H.264, but it doesn’t actually compress anything. (What do you expect from 30 lines!) In fact, because of the necessary H.264 headers, the output of Ben’s encoder is... View Article
Blog Post
The Math Behind Analog Video Resolution
NTSC video signals remain vital for many applications due to their affordability and sufficient resolution for security needs. Learn why NTSC still matters today!
I just returned from this year’s NAB show, where I was bombarded with 3D demos in virtually every booth. Most of the factors driving this 3D superabundance originate outside of the broadcast industry itself. First, TV manufacturers are hot on 3D as a way to get everyone who just bought an HDTV to upgrade to... View Article
My partner Ben Mesander had a really cool post the other day: An H.264 encoder written in 30 lines of C code. Ben’s encoder outputs completely valid H.264, but it doesn’t actually compress anything. (What do you expect from 30 lines!) In fact, because of the necessary H.264 headers, the output of Ben’s encoder is... View Article
NTSC video signals remain vital for many applications due to their affordability and sufficient resolution for security needs. Learn why NTSC still matters today!
Blog Post
On the Importance of Encrypting Video
This morning brought a front-page Wall St. Journal article that’s a bit of a jaw-dropper: Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations. … The potential drone vulnerability lies in an unencrypted... View Article
Blog Post
Uploading Kodak Zi8 Videos to Flickr
Fix your Kodak Zi8 video upload issues to Flickr with our straightforward conversion solution using ffmpeg. Enjoy seamless sharing now!
Blog Post
IACP Product Introduction
I just spent the last three days at the IACP show in Denver — the annual conference and expo for the International Association of Chiefs of Police. For anyone who was once a 12-year-old boy, IACP is about as cool as it comes because there are all sorts of cop paraphernalia on display — from... View Article
This morning brought a front-page Wall St. Journal article that’s a bit of a jaw-dropper: Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations. … The potential drone vulnerability lies in an unencrypted... View Article
Fix your Kodak Zi8 video upload issues to Flickr with our straightforward conversion solution using ffmpeg. Enjoy seamless sharing now!
I just spent the last three days at the IACP show in Denver — the annual conference and expo for the International Association of Chiefs of Police. For anyone who was once a 12-year-old boy, IACP is about as cool as it comes because there are all sorts of cop paraphernalia on display — from... View Article
Blog Post
The Many Ways to Stream Video Using RTP vs RTSP
RTP and RTSP are commonly used protocols to stream video over the internet. This blog post highlights the differences between them, pros and cons, and how to implement them on your devices.
Blog Post
The Importance of Encrypting Video Over IP
I just read a report of a new IP security vulnerability being demonstrated today at the DefCon hacker's conference in Las Vegas. The new hack has two components:
1. The attackers are able to view video being streamed across a network, and
2. The attackers are able to use a man-in-the-middle attack to insert video controlled by the attacker to a video decoder somewhere on the network.
The linked video shows viscerally how an attacker could foil a security/surveillance video system — a modern-day Thomas Crown Affair.
RTP and RTSP are commonly used protocols to stream video over the internet. This blog post highlights the differences between them, pros and cons, and how to implement them on your devices.
I just read a report of a new IP security vulnerability being demonstrated today at the DefCon hacker's conference in Las Vegas. The new hack has two components:
1. The attackers are able to view video being streamed across a network, and
2. The attackers are able to use a man-in-the-middle attack to insert video controlled by the attacker to a video decoder somewhere on the network.
The linked video shows viscerally how an attacker could foil a security/surveillance video system — a modern-day Thomas Crown Affair.