Kinect Hacking
Kinect Hacking 101We wanted to experiment with the Kinect as a UI device for Kiosks and an interactive display for theEastern Kentucky University CS department. Here are some quick videos of our...
View ArticleBusiness Continuity and the Backup Budget
Backing up your critical data is a key first step in planning for disaster recovery, but this is only a small part of having a Business Continuity Plan/Disaster Recovery plan. Understanding exactly...
View ArticleWWC Computer Graphics work on Destination Truth as seen on the SyFy Channel
IntroductionWWC was approached with a unique problem. The production company for Destination Truth, Ping Pong Productions, on the SyFy channel needed a fast and cost-effective way of producing...
View ArticleExchange Calendars to RSS Adapter
Turn Microsoft Exchange Calendars into RSS FeedsThis original software package was developed by WWC in order to make shared calendars on Exchange available in a public and standard format. This...
View ArticleQuansor Corporation
The Quansor Corporation, led by John Merrill, has developed a new type of quantum resonance sensor for detecting Arsenic and other water-borne contaminants at very low concentrations and was recently...
View Articletest
Proin morbi ridiculus orci urna vitae, enim id vitae ante etiam erat pulvinar. Lacus adipiscing, dictum ultricies lobortis, donec elit nec sit faucibus lectus, adipiscing cras adipiscing nibh nec, elit...
View ArticleWeb Services
ServicesWeb PagesDoes your business need a presence on the internet? We can help with that. Visit our portfolio and see some of the other web projects we have developed. We can simply help you...
View ArticleTech Services
ServicesInfrastructure Sourcing and InstallationOur experienced and expert technical staff can help you develop a technology plan that will meet your immediate business needs while providing for future...
View ArticleBrand Management Using Drupal
Drupal is such a powerful & flexible system that it is being adopted for all sorts of things beyond a web-based content management system. Using just a few modules, some custom content types and...
View ArticleSecuring Your Network - Intrusion Detection Software
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of...
View Article
More Pages to Explore .....