Video to iPad/iPhone/Android Direct

The Vulkano Flow gives consumers the freedom to watch their TV anywhere in the world using smartphones, tablets and computers. Vulkano users can now instantly begin recording their favorite television programming so they never miss historic news or memorable sporting moments.

“The Vulkano line of devices has been created to offer consumers the ultimate flexibility in entertainment and we are proud to be the first to offer direct recording and DVR for mobile devices,” said Colin Stiles, EVP Sales and Marketing at Monsoon. “Consumers are making smartphones and tablets an essential part of their every day lives and are expecting to view and browse the TV content that they pay for at their leisure, no matter where they are in the world.”

Summary of Direct to Mobile Recording and DVR features on Vulkano Devices:

  • Direct to mobile recording supports iPhone, iPad, and Android phones and tablets
  • Full DVR capabilities including Pause, Rewind and Fast Forward
  • iPhone/iPad recording in mp4 formats containing H264+AAC
  • Android recording in mp4 formats containing H264+AAC
  • iPhone/iPad recording in D1 or 640×480 or 352×240 resolutions
  • Android recording in D1 or 640×480 or 352×240 resolutions
  • Insufficient memory alert

Pricing and Availability

The Vulkano Flow ($99.99) is now available at Fry’s Electronics, Amazon, MicroCenter, other leading retailers and etailers as well as at www.myvulkano.com. Android, tablet and additional smartphone applications can be purchased for $12.99 each in their respective app stores.

About Monsoon Multimedia

Monsoon Multimedia provides advanced, standards-based multimedia products and convergence technologies for the PC, Mac, iPad and major smartphones. Founded by the founders of Dazzle and Emuzed, the company has offices in California,India, Russia and Singapore. For more information, please visit www.monsoonmultimedia.com.

Final Cut Pro X Released – Some Articles

Steve says:

“Final Cut Pro X is here. The speculation, the rumors, the misinformation and the hand-wringing can now mercifully stop. The hype machine is now inert and we can all get back to work. As is my custom each time a new version of Final Cut Pro is released I set about writing an article for Ken explaining what the new features mean to the rank and file editor who will be cutting with it in their day to day operation. Therefore, this article’s primary focus will be to address how FCP X’s new editing paradigms are most likely to impact your workflow.”

Ken says:
I have also created an iPad ePub version for those of you who would like to take it with you. The link to the iPad version is at the article.

Creative Cow says:
Gary Adcock has been using Final Cut from the very beginning and he’s been a fierce FCP advocate for just as long. So, when Apple pulled back a bit of the secrecy surrounding FCP X, Gary Adcock was the perfect member of the COW to dig deep into the workings of FCP X. Want proof? He has years of experience as a deadline-driven editor dealing with massive amounts of footage and was one of the first editors to master tapeless workflows, so much so that he began teaching and training tapeless production for Local 600, as well as assisting Dave Stump A.S.C on the Camera and Metadata subcommittees of the ASC’s Technology committee. Gary has also been the Tech Chair for NAB’s Director of Photography Conference. From this background, Gary seems the perfect guy to dig into an app that aspires to meet the needs and demands of the highest-end pros.

Or does it? What if Apple told you that FCP X wasn’t meant for you?

Gary goes beyond his own knee-jerk reaction to this latest release of Final Cut, to get under the hood of FCP X, and he likes a lot of what he sees.

Larry Jordan says: 

With this release, Apple made four significant changes in direction:

* For the first time, two different versions of FCP can coexist on the same system. I’ve been running FCP 7 and FCP X on the same system for months.
* Maxing out performance to take full advantage of current hardware
* Almost exclusive support for tapeless workflows
* Distribution via the App Store

FINAL CUT PRO 7 IS NOT DEAD

To me, this is one of the highlights!”

High Frame Rate 3D Demonstration

The document speaks to the technology but make no mention of what people thought after seeing the demonstration. Generally speaking it seemed very clear that the benefits of 48 frames to the eye was easily seen. Motion judder was eliminated. The picture looked more natural.

When 60 frames to the eye was shown, not only was the judder removed but the foreground ‘resolution’ popped out. In a sense, this is unnatural since when one is focused on a distant object the foreground objects are not focused. On the other hand, directing with focus is a tool that directors use. If the director doesn’t want to limit focus, it is nice that this resolution becomes available.

Premium VOD: Will exhibs play favorites?

Unlike the hard-and-fast contracts that divvy up ticket revenue, most negotiations between distribs and exhibs are done on the fly. With the constant haggling over how a film plays out, a better relationship can impact whether it’s given the proper time and treatment to find an audience.

According to NATO president John Fithian, those relationships have been in freefall since the March surprise at CinemaCon, when exhibitors learned of the shortened PVOD window in Variety.

“Essentially everyone was emailing and texting me to try to find out what the hell was happening,” Fithian said, recalling the day the news broke. “The real problem was that the studios going forward with this plan never said anything about it and then haven’t communicated at all since … so this marks a real breakdown of trust between exhibitors and distributors.”

Read the entire Variety article at: Premium VOD: Will exhibs play favorites? – Entertainment News, Film News, Media – Variety

[Update] Final Cut Pro X Stories

AppleInsider has new shots, including Motion: AppleInsider | Images claim to show Apple’s Motion 5, Final Cut Pro X

Richard Taylor has an excellent new rundown on Ken Stone’s site: Final Cut Pro X Rundown


FCP X, the next version of Final Cut Pro will be released in June. It was shown at the SuperMeet during NAB. But the version was the same that was shown 6 weeks previous to a limited set of experts.

The following links speak to a number of issues that are interesting and provocative to other experts: What is coming and will it really be the next great thing…or will it be iMovie Plus. (Apple asserts that it will be the next great thing for post-produciton. The big news is that it is 64 bit, 4k media, background rendering, will use all the cores you can throw at it, gets rid of QuickTime as the base code – substituting AVFoundation – and $299.)

Digital Content Producer: FCPX: What It Might Mean

The Sound of 1,700 Jaws Dropping: Larry’s Blog

Terence & Philip Show: Episode 25: NAB and Final Cut Pro X

Phillip Hodgetts: What are my thoughts on Final Cut Pro X? – FilmmakingWebinars.com

Larry Jordan & Michael Kammes on FCPX | 2011 NAB SHOW BUZZ

NAB11 FCP X Sneak Peek at FreshDV

AppleInsider | Apple previews new $299 64-bit Final Cut Pro X to arrive in June

PhotographBay: Final Cut Pro User Group Supermeet – LiveBlog (Updated: Final Cut Pro X Officially Unveiled)

Apple announces Final Cut Pro X | Apple Talk – CNET News

For those of you that missed the FCP X Intro at the SuperMeet | LinkedIn

Bonus: Digital Content Producer: Encoding for the Apple iPad, Part 1

Remote Access VPN Appliances Buyer’s Guide

 

To map your requirements to individual product capabilities and features, a VPN features guide can help. For example, see SP 800-113 Guide to SSL VPNs, published by the National Institute of Standards and Technology (NIST). Those seeking VPN appliances that also speak IPsec should also consult the older SP 800-77 Guide to IPsec VPNs. Below is a summary of the VPN features you’ll find covered in these guides.

  • Authentication: VPN security is based upon authentication — preferably mutual. SSL VPNs usually support many user authentication methods, including password, smart card, two-factor token, and certificate. Many IPsec VPNs use IKEv2 to support any method conveyed by the Extensible Authentication Protocol (EAP). Choose an appliance that supports your required authentication method(s) and integrates with your user database (e.g., Active Directory). Less common features to look for include single sign-on and roaming without re-authentication.
  • Encryption and integrity protection: Secure tunneling protocols like SSL, TLS, DTLS, and IPsec all use cryptography for message encryption, integrity, replay protection, and (sometimes) source authentication. The IPsec Encapsulating Security Protocol (ESP) is applied at Layer 3 to protect the entire IP packet; the others may be applied at Layer 3 or 4. Choose an appliance that satisfies your in-transit data protection policies, including cipher, certification, and interoperability requirements.
  • Access controls: Early VPN appliances tunneled all traffic from user to gateway or only traffic destined for private subnets (i.e., split tunneling). With SSL VPNs came increased granularity, including access to specified applications, URLs, or even actions (e.g., file read but not write). This continues to be an area of innovation; look for new features such as policies that transparently adapt for each user, based upon endpoint risk, compliance, or location, and group/role-based access controls.
  • Endpoint security controls: Varying access based on risk requires recognizing the endpoint, assessing its health, evaluating its compliance, or a combination thereof. For example, if access is attempted from a managed notebook, a “checker” may verify the endpoint has required OS patches and anti-malware. If access is attempted from a smartphone, these may not be possible — but the VPN can still look for an IT-installed “watermark.” This is another area of rapid innovation, both in OS breadth and depth of controls. For notebooks, consider advanced features such as data vaults. For mobile devices, look for server-side aids like fingerprinting.
  • Intrusion prevention: Pre-connect checks are helpful, but may not be enough. To reduce risk, VPNs can grant narrow access to riskier endpoints — or apply ongoing intrusion prevention to stop malware from riding secure tunnels. This is another area of differentiation between VPN products, as vendors scramble to integrate security offerings and drill deeper — especially into port 80 traffic to enforce per-application policies and block malicious activity. Features here run the gamut from mobile security agents to reputation-based web defenses, but beware of a la carte feature licenses that inflate TCO.
  • Manageability: This is an important characteristic for any product, but especially for remote access VPNs. Factors like purchase price, maintenance fees, installation effort, policy tuning, and routine maintenance all impact total cost of ownership (TCO), but enterprises with large workforces often cite managing users as their single-highest VPN cost.
  • High availability and scalability: Enterprise-class remote access VPN products offer high-availability and scalability options, such as hot-synced active/active load balanced gateways. Look not only at scalability and survivability, but also at licensing. For example, those deploying remote access VPN for disaster planning may want “burstable” or pay-as-you-go licenses.
  • Customization: Remote access VPNs often benefit from customization. This can range from organizing resource links on per-user/group portal pages to adding proxy VPN translations for proprietary applications. Especially for small mobile devices, look for aids like auto-display-adaptation and bookmarks to improve usability.

Product roll call

These are just some of the many features and capabilities found in contemporary remote access VPN appliances. Vendors in this market include Cisco Systems, Citrix Systems, Check Point, F5 Networks, Juniper Networks, and SonicWall (to name just a few).

To more fully illustrate this category, EnterpriseNetworkingPlanet will profile several remote access VPN lines, including SonicWall’s Aventail E-Class SRA appliances, Cisco’s ASA 5500 Series appliances, and Juniper’s MAG Series JunOS Pulse Gateways. Stay tuned …

Lisa Phifer owns Core Competence, a consulting firm focused on business use of emerging network and security technologies. With over 25 years in the network industry, Lisa has reviewed, deployed and tested network security products for nearly a decade.

Major IPv6 Cisco Upgrade (IOS)

“Our biggest goal in IOS now is to have parity between IPv4 and IPv6,” Faraz Aladin, Director, Marketing Cloud Switching and Services at Cisco told InternetNews.com. “Whatever you can do in IPv4, you should be able to do with IPv6.”


From an article at: Cisco Upgrades IOS for IPv6 – www.enterprisenetworkingplanet.com

 


While Cisco has been providing support for IPv6 for nearly 12 years on its network equipment, IPv6 isn’t just about basic packet forwarding. Joel Conover, Director Marketing, Borderless Networks at Cisco toldInternetNews.com that getting IOS ready for IPv6 is a big job that includes a lot of incremental bits.

“When you look at the massive size of IOS, with over 2,500 features, if every single one needs to be re-written to support IPv6, that takes time,” Conover said.

One feature that has taken time to land in IOS involves time itself. The Network Time Protocol (NTP) is now available in IPv6. Conover noted that it was previously not supported by IPv6 and needed to be re-written.

Security is also now being improved in Cisco IOS for IPv6 with a technology called first hop security. Aladin explained that a possible risk that had existed with IPv6 before was that another device could have been sitting on a network, spoofing a user’s address. First hop security provides a degree of authentication, to ensure that the address server is authentic and the user can trust the IPv6 address information.

Cisco is now also leveraging the Location/ID Separation Protocol (LISP) to help network administrators deploy IPv6 with IPv6 over IPv4 tunnels. LISP is an emerging standard for routing Internet traffic.

Who Wants IPv6?

With the exhaustion of the free pool of IPv4 address space, the need for IPv6 is now well understood. According to a Cisco survey of 101 U.S IT leaders, 78 percent are currently planning for an IPv6 transition.

Security is the top concern in IPv6 transition efforts with 92 percent of survey respondents noting that their IT organization’s security department is part of the IPv6 migration.

As organizations move to IPv6 though, they still expect certain things to work that did in the IPv4 world.

“When we talk to customers — they tell us they want to implement IPv6, but here is a list of things that I can do with IPv4, and unless I can do them in IPv6 I can’t make the transition,” Aladin said.

Sean Michael Kerner is a senior editor at InternetNews.com, the news service of Internet.com, the network for technology professionals.

[Update] Scathing 2D/3D Light Boston.com Article…True?

There are many problems with 3D presentations, especially those with the supposedly high-gain, polarizing-friendly ‘silver screens.

(See: 
23 degrees…half the light. 3D What? 
Scotopic Issues with 3D,  
Silver ScreensRealD and Polaroid — Possible Promise PR). 

But at first glance through the breathy-for-scandle article, it seems like there is un-required hyperbole that makes one want to wait for Sony’s and RealD’s response.

This also amplifies the need for professional projectionists constantly in the projection booth, and a method for maintaining consistent quality control. If it takes a grass roots effort because of articles like this, perhaps it is OK.

But the real solution is probably to have the same “Constant Vigilance” policy for post-installation quality control as there is for security – an effort that has to come from studios, distributors, and exhibition management. In a sense, those exhibitors who signed VPF deals with studios have signed that they will make their exhibitions according to the SMPTE specification. Perhaps if the grass root effort wore t-shirts that said “48 Candelas or not at all”. 

Here are a couple of shots of the lens and the projector, one with the RealD polarizers over the lenses. One suspects that this is sometimes the problem that is being talked about. 

Sony Projector with Dual lens  removed

RealD Polarizers over Sony dual lens system

There are other shorter articles with a little more data at the links below. Sometimes the comments are the most interesting part, though a lot of them are just steam…though steam that the industry should be aware of.

Are 3D-capable theaters delivering dim 2D movies? – Digital Trends

Report: 3-D Lenses and Lazy Theaters Dim 2-D Projection by Up to 85 Percent | Movieline

Cinema chains dimming movies “up to 85%” on digital projectors – Boing Boing

Movie theaters could screw up your 2D movies by leaving the digital projector set up for 3D — Engadget

Finally, the graphic from the article: Just looking at the curve of the bulb life and the description of the Polarizing is enough to make me wonder about the truthiness of the entire article.

Sony 3D and RealD Light Problem according to Boston globe article

Asserted to be a Sony Press Release – 1 June 2011

The projectionist that Boston.com spoke with clearly has little to no understanding of how the systems work and is likely a manager that also works in the booth to start shows, the projectionists of yore are long gone in most cases. While the 3D lenses in the Sony are polarized, the images do not alternate, they are projected at the same time and split through a prism system in the lens, but really that’s besides the point. All of the 3D systems we have installed have been selected based on a number of variables such as screen size and auditorium length. Based on that information we can determine if the Sony projector will be able to light the screen to SMPTE spec. The SMPTE specifications on light are very clear and the DCI specification for digital equipment follows in line with that. Basically 2D digital projection should have 14 footlamberts (a measurement of reflected light) at the center of the screen, in comparison 35mm spec is 16fl of light through an open gate (meaning no film and no shutter movement) if a projector is installed to meet that spec the light output of the digital will be seen to exceed that of film. in any house where we cannot make the required light we use a bigger system, most recently these have been made by Barco.

In addition to the light levels the digital projectors are color corrected to within ±.005 of the DCI color spec. This means that when we correct with the polarizers in place on the Sony system for 2D movies that the color will be virtually identical to that seen on a DLP projector without a polarizer in the light path.

They also fail to mention some of the advantages of the way the Sony system works, such as reduced eye fatigue. DLP systems alternate images as implied in the article, they do so by electronically shifting the polarizer state for the left and right eye 3 times per frame per second. This ultimately results in the same situation you find with shutter glasses in that there is flicker that causes headaches and sometimes motion sickness, the difference is that the glasses do not actively perform this task, but close on eye while watching a 3D film ad you may see it (you may not, the system is projecting 144fps or 72 per eye, though make no mistake the content is still 24fps). The Sony system does not have this issue as it splits the 2K image across the top and bottom of the chip and then overlays them on the screen, the dual polarizers on the Sony are completely passive with not electronics involved.

To give a brief background of my knowledge base, I have been a technician for going on a decade, I have been installing digitals since the first “wide” roullout of 100 screens that Disney purchased for Chicken Little 3D. I have industry certifications through Sony, Barco and Dolby on D-Cinema equipment as well as my department’s highest level of internal certification and I am Net+ and A+ certified.

As far as why the film and digitally projected showing had such a difference, I think it’s likely one of two things, the 35mm could have been way above spec, which can happen easily due to the way the lamps are adjusted in many cases or the lamp in the digital was not adjusted properly. The biggest issue I run into is a lack of training within the theaters. I do my best to train when the systems are installed or when I am onsite for service calls, but these days so many people get rotated through the booth that should a lamp go out Friday night they just slap one in without making any of the necessary adjustments.

I’d like to know what was wrong with the management of that theater though, how do you host a premiere without making sure everything is perfect first? I myself haven’t done any due to my location within the country, but I have talked to a number of my coworkers about them and they are on site days before they happen making sure every detail is perfect. In fact many directors want to specify special color corrections for their premieres in digital or ask that sound be tweaked out of spec and so on.

I think the biggest problem digital cinema faces is that the operations departments of most chains think we can take a hands off approach to this equipment, and that is not currently the case. Proper lamp maintenance is crucial in any theater, but even more so in digital. 5-10 years from now when the laser light sources are in the field no-one will ever have need to go in the booth outside of cleaning the port glass and the maintenance calls myself and my cohorts perform.

 

Photopic Sky Survey

Photopic Sky Survey Milky Way ShotWe deal in light, they deal in light. We’ve waited 15 years for d-cinema to mature. They’ve waited billions of years for dust to become sand and sand to become computers and computers to become cameras. 

The site says: “The Photopic Sky Survey is a 5,000 megapixel photograph of the entire night sky stitched together from 37,440 exposures. Large in size and scope, it portrays a world far beyond the one beneath our feet and reveals our familiar Milky Way with unfamiliar clarity.” Take a break. Check it out: Photopic Sky Survey

More Military Systems Hacked

Notice – plural, networks of Lockheed Martin. – plural, networks of other US military contractors.

On Friday, Reuters news agency reported that unknown hackers have managed to break into the networks of arms manufacturer Lockheed Martin as well as those of other US military contractors. According to the report, the intruders exploited the information about cryptography specialist RSA’s SecurID products that was seized by hackers during an attack in March. It is currently unclear whether the intruders actually managed to obtain valuable information; however, the fact that all the systems attached to the network are likely to contain documentation relating to weapons systems which are currently in use, or are in development, doesn’t bode well.

When last reported, it was the Defense department itself, and through the Defense Department the hackers broke into military systems all over the world. See: Infected USB caused biggest US military breach ever

The article is short, so we recommend that you read it all. But the highlights are that this is a continuing escalation, using codes from the RSA recent attack.

The US Defense Department reportedly told Reuters on Saturday that it was working with Lockheed to determine the scope of the attack. Lockheedconfirmed, in a statement, that it had detected a “significant” attack on its network on 21 May and had reacted “almost immediately” to institute counter measures; it said that its “systems remain secure”. The company is currently investigating the attack but is already claiming that “no customer, program or employee personal data has been compromised”. It is still working to restore employee access to its network.

While military facilities and their suppliers were previously thought to be fully protected against cyber attacks, even their experts now concede that no protection is one hundred per cent safe. SecurID tokens which create one-time passwords (OTPs) every 60 seconds used to be quite an efficient protective mechanism. However, in addition to source code, the hackers who attacked RSA are also believed to have obtained the “seed” components. These seeds would enable hackers to generate valid OTPs for any system.

Therefore, security experts are now assuming that SecurID tokens provide less security, and that the system must be regarded as having been cracked. The only remaining protection is provided by the password that is also required. In its recommendations, RSA has therefore emphasised that users should be particularly wary of phishing attacks.

[Update] IPv6, Security, Future Near

The 27th Chaos Communication Congress – subtitled We Come In Peace had an excellent presentation on IPv6 by Marc Heuse, an expert in the field and creator of several tools to test IPv6 security.

IPv6 is the coming standard for intranets, the internet and most IT/IP interconnect equipment. It is quite different from the IPv4, which is currently in place in all of our network systems. The IPv4 protocols use the typical 4 octet system, e.g. 192.168.1.1 (taking 32 bits), while IPv6 uses 128 bit address of numbers and letters. The comparison is 232 v 3.4 x 1038 – the number is 340 undecillion unique addresses.

Other advantages include autoconfiguration of IP addresses and networking, a hierarchical address structure which reduces operational cost and several Integrated security features. 

As Mr. Heuse points out, all major operating systems and most modern routers already support IPv6, but it is turned off. For most intranet installations, IPv4 will probably continue to be sufficient and won’t need to be replaced by IPv6. But as with all new protocols, there are some advantages that might move manufacturers to use the system to uniquely identify equipment for communication security, or other features that are not available with IPv4. Therefore we need to stay abreast of its advantages and potential pitfalls. Especially when one of the current problems being worked out is security weaknesses in tunneling, when using IPv4 and IPv6 together (like that will ever happen!). And though it handles multicasting more securely than with IPv4, that area is also one that has some issues. 

The issues with security come from the standard’s original outline being laid out 15 years ago. It dealt with the security problems of the time. Recommended practices have been developed to upgrade the protocol’s implementaion, but there are many, and they aren’t always dealt with the same way by all manufacturers.

Notwithstanding this, IPv6 is being tested this month in a ‘live on the internet’ plug fest fashion. It will be rolled out in the coming months. The Youtube video that follows isn’t for everyone, but it should be for everyone who claims to be a professional in the entertainment technology field of digital cinema, as cinema is by its nature ‘unique addresses’, on the internet and very concerned with security.

This link points to a page that has several slide presentations on the subject:
27C3: Recent advances in IPv6 insecurities
Don’t miss this slide presentation: 
Recent Advances In IPv6 Insecurities

Side note before the 53 minute video, if you run across any interesting information in this field, or recommendations or comments by the technologists in the d-cinema field about IPv6, please forward it to the editor.

Other articles: 
Last of the IPv4 Addresses Allocated
Understand IPv6 Addresses

YouTube – [27C3] (en) Recent advances in IPv6 insecurities

{youtube}c7hq2q4jQYw{/youtube}

Stuxnet and SCADA – New News

New Siemens SCADA Vulnerabilities Kept Secret

SCADA systems — computer systems that control industrial processes — are one of the ways a computer hack can directly affect the real world. Here, the fears multiply. It’s not bad guys deleting your files, or getting your personal information and taking out credit cards in your name; it’s bad guys spewing chemicals into the atmosphere and dumping raw sewage into waterways. It’s Stuxnet: centrifuges spinning out of control and destroying themselves. Never mind how realistic the threat is, it’s scarier.

Last week, a researcher was successfully pressured by the Department of Homeland Security not to disclose details “before Siemens could patch the vulnerabilities.”

Read the entire article and some cogent comments at: 
    Schneier on Security: New Siemens SCADA Vulnerabilities Kept Secret

…Like Tangents In Rain