Blog Post
The Basics of 3D Image Acquisition
One of our clients is heavily involved in 3D video and has been for several years. However, several are just now starting to think about it because of the uptick of interest in the consumer electronics world. Enough questions have been posed to us recently that it seemed worthwhile to me to pull together a…
View Article
Read More
Blog Post
Thoughts on 3D After NAB
I just returned from this year’s NAB show, where I was bombarded with 3D demos in virtually every booth. Most of the factors driving this 3D superabundance originate outside of the broadcast industry itself. First, TV manufacturers are hot on 3D as a way to get everyone who just bought an HDTV to upgrade to…
View Article
Read More
Blog Post
Encoders Aren’t Commodities
My partner Ben Mesander had a really cool post the other day: An H.264 encoder written in 30 lines of C code. Ben’s encoder outputs completely valid H.264, but it doesn’t actually compress anything. (What do you expect from 30 lines!) In fact, because of the necessary H.264 headers, the output of Ben’s encoder is…
View Article
Read More
Blog Post
On the Importance of Encrypting Video
This morning brought a front-page Wall St. Journal article that’s a bit of a jaw-dropper: Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations. … The potential drone vulnerability lies in an unencrypted…
View Article
Read More
Blog Post
IACP Product Introduction
I just spent the last three days at the IACP show in Denver — the annual conference and expo for the International Association of Chiefs of Police. For anyone who was once a 12-year-old boy, IACP is about as cool as it comes because there are all sorts of cop paraphernalia on display — from…
View Article
Read More
Blog Post
The Importance of Encrypting Video Over IP
I just read a report of a new IP security vulnerability being demonstrated today at the DefCon hacker’s conference in Las Vegas. The new hack has two components:
1. The attackers are able to view video being streamed across a network, and
2. The attackers are able to use a man-in-the-middle attack to insert video controlled by the attacker to a video decoder somewhere on the network.
The linked video shows viscerally how an attacker could foil a security/surveillance video system — a modern-day Thomas Crown Affair.
Read More