Mike Perkins
Blog Post

If Only We Had Better Test Content…

I just saw this news about research that says you notice compression artifacts less if you like the content of a particular video clip: Using four studies, Kortum, along with co-author Marc Sullivan of AT&T Labs, showed 100 study participants 180 movie clips encoded at nine different levels, from 550 kilobits per second up to... View Article
Cardinal Peak
Blog Post

Creating Single-Frame Movies

Create high-quality photo-video hybrids effortlessly using ffmpeg! Optimize your AVI or MP4 files for flawless playback on any platform. Boost your media game today!
Mike Perkins
Blog Post

The Basics of 3D Image Acquisition

One of our clients is heavily involved in 3D video and has been for several years. However, several are just now starting to think about it because of the uptick of interest in the consumer electronics world. Enough questions have been posed to us recently that it seemed worthwhile to me to pull together a... View Article
I just saw this news about research that says you notice compression artifacts less if you like the content of a particular video clip: Using four studies, Kortum, along with co-author Marc Sullivan of AT&T Labs, showed 100 study participants 180 movie clips encoded at nine different levels, from 550 kilobits per second up to... View Article
Create high-quality photo-video hybrids effortlessly using ffmpeg! Optimize your AVI or MP4 files for flawless playback on any platform. Boost your media game today!
One of our clients is heavily involved in 3D video and has been for several years. However, several are just now starting to think about it because of the uptick of interest in the consumer electronics world. Enough questions have been posed to us recently that it seemed worthwhile to me to pull together a... View Article
Mike Perkins
Blog Post

Thoughts on 3D After NAB

I just returned from this year’s NAB show, where I was bombarded with 3D demos in virtually every booth. Most of the factors driving this 3D superabundance originate outside of the broadcast industry itself. First, TV manufacturers are hot on 3D as a way to get everyone who just bought an HDTV to upgrade to... View Article
Howdy Pierce
Blog Post

Encoders Aren’t Commodities

My partner Ben Mesander had a really cool post the other day: An H.264 encoder written in 30 lines of C code. Ben’s encoder outputs completely valid H.264, but it doesn’t actually compress anything. (What do you expect from 30 lines!) In fact, because of the necessary H.264 headers, the output of Ben’s encoder is... View Article
Mike Perkins
Blog Post

The Math Behind Analog Video Resolution

NTSC video signals remain vital for many applications due to their affordability and sufficient resolution for security needs. Learn why NTSC still matters today!
I just returned from this year’s NAB show, where I was bombarded with 3D demos in virtually every booth. Most of the factors driving this 3D superabundance originate outside of the broadcast industry itself. First, TV manufacturers are hot on 3D as a way to get everyone who just bought an HDTV to upgrade to... View Article
My partner Ben Mesander had a really cool post the other day: An H.264 encoder written in 30 lines of C code. Ben’s encoder outputs completely valid H.264, but it doesn’t actually compress anything. (What do you expect from 30 lines!) In fact, because of the necessary H.264 headers, the output of Ben’s encoder is... View Article
NTSC video signals remain vital for many applications due to their affordability and sufficient resolution for security needs. Learn why NTSC still matters today!
Howdy Pierce
Blog Post

On the Importance of Encrypting Video

This morning brought a front-page Wall St. Journal article that’s a bit of a jaw-dropper: Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations. … The potential drone vulnerability lies in an unencrypted... View Article
Cardinal Peak
Blog Post

Uploading Kodak Zi8 Videos to Flickr

Fix your Kodak Zi8 video upload issues to Flickr with our straightforward conversion solution using ffmpeg. Enjoy seamless sharing now!
Mike Perkins
Blog Post

IACP Product Introduction

I just spent the last three days at the IACP show in Denver — the annual conference and expo for the International Association of Chiefs of Police. For anyone who was once a 12-year-old boy, IACP is about as cool as it comes because there are all sorts of cop paraphernalia on display — from... View Article
This morning brought a front-page Wall St. Journal article that’s a bit of a jaw-dropper: Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations. … The potential drone vulnerability lies in an unencrypted... View Article
Fix your Kodak Zi8 video upload issues to Flickr with our straightforward conversion solution using ffmpeg. Enjoy seamless sharing now!
I just spent the last three days at the IACP show in Denver — the annual conference and expo for the International Association of Chiefs of Police. For anyone who was once a 12-year-old boy, IACP is about as cool as it comes because there are all sorts of cop paraphernalia on display — from... View Article
RTP vs RTSP streaming media protocols
Blog Post

The Many Ways to Stream Video Using RTP vs RTSP

RTP and RTSP are commonly used protocols to stream video over the internet. This blog post highlights the differences between them, pros and cons, and how to implement them on your devices.
Howdy Pierce
Blog Post

The Importance of Encrypting Video Over IP

I just read a report of a new IP security vulnerability being demonstrated today at the DefCon hacker's conference in Las Vegas. The new hack has two components: 1. The attackers are able to view video being streamed across a network, and 2. The attackers are able to use a man-in-the-middle attack to insert video controlled by the attacker to a video decoder somewhere on the network. The linked video shows viscerally how an attacker could foil a security/surveillance video system — a modern-day Thomas Crown Affair.
RTP and RTSP are commonly used protocols to stream video over the internet. This blog post highlights the differences between them, pros and cons, and how to implement them on your devices.
I just read a report of a new IP security vulnerability being demonstrated today at the DefCon hacker's conference in Las Vegas. The new hack has two components: 1. The attackers are able to view video being streamed across a network, and 2. The attackers are able to use a man-in-the-middle attack to insert video controlled by the attacker to a video decoder somewhere on the network. The linked video shows viscerally how an attacker could foil a security/surveillance video system — a modern-day Thomas Crown Affair.