[vc_row full_width=”stretch_row_content_no_spaces”][vc_column icons_position=”left”][rev_slider_vc alias=”new-slider-1″][/vc_column][/vc_row][vc_row][vc_column icons_position=”left”][vc_empty_space alter_height=”large” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=””][vc_empty_space alter_height=”small” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1510155358012{margin-top: 0.15rem !important;}”][vc_empty_space alter_height=”large” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1510155666182{margin-bottom: 0.85rem !important;}”][/vc_column][/vc_row][vc_row full_width=”stretch_row” hide_bg_image_on_tablet=”” hide_bg_image_on_mobile=”” css=”.vc_custom_1510298516799{background-image: url(https://dcconsulting.com/wp-content/uploads/2017/08/img_aerial.jpg?id=325) !important;background-position: center left !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”7/12″ icons_position=”left” offset=”vc_col-md-5″][vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=””]
Aerial Photography and Video Production Services
Quadcopters generally use two pairs of identical fixed pitched propellers; two clockwise and two counterclockwise. These use independent variation of the speed of each rotor to achieve control. By changing the speed of each rotor it is possible to specifically generate a desired total thrust to locate the center.
[vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=””][/vc_column][vc_column width=”1/2″ icons_position=”left”][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces” equal_height=”yes” hide_bg_image_on_tablet=”” hide_bg_image_on_mobile=”” css=”.vc_custom_1510156507802{background-color: #232e35 !important;}”][vc_column icons_position=”left” offset=”vc_col-md-7″]
[/vc_column][vc_column hide_bg_image_on_tablet=”” hide_bg_image_on_mobile=”” icons_position=”left” offset=”vc_col-md-5″]
[vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1510214066507{margin-bottom: -0.5rem !important;}”][vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1510214072035{margin-top: -2.5rem !important;}”]
[vc_row_inner][vc_column_inner fix_column=”” icons_position=”left” offset=”vc_hidden-sm vc_hidden-xs”][vc_single_image image=”513″ img_size=”full”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row” scheme=”dark” row_delimiter=”” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” hide_on_frontpage=”” css=”.vc_custom_1510214663093{background-color: #222d35 !important;}”][vc_column icons_position=”left”][vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=””]
Featured Services
- Risk Assessments
- Vulnerability Assessments
- Governance
- Compliance
- Advisory Services
- Security Controls & Frameworks
- Vendor Evaluations & Ecosystem Management
- Threat Protection & Detection
- Threat Intelligence
- Identity & Access
- Endpoint Security
- Cloud Security
- Security Resilience
- Vulnerability Management & Patching
- Security Event Management
- Incident Response
- Orchestration & Automation
- Managed Services
[vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1510218130916{margin-bottom: -2.9rem !important;}”][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces”][vc_column hide_bg_image_on_tablet=”” hide_bg_image_on_mobile=”” icons_position=”left” offset=”vc_hidden-sm vc_hidden-xs”][/vc_column][/vc_row][vc_row][vc_column icons_position=”left”][vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=””]
Our Team
[vc_empty_space alter_height=”medium” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=””][/vc_column][/vc_row][vc_row equal_height=”yes”][vc_column scheme=”dark” hide_bg_image_on_tablet=”” hide_bg_image_on_mobile=”” icons_position=”left” offset=”vc_col-md-4″]
[vc_empty_space alter_height=”large” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1510221374113{margin-bottom: 1.05rem !important;}”][vc_column_text]
Who We Are
With hundreds of hours in flight, our unique cinematic approach is solidly rooted in a decade of professional experience. Our studio’s strength lies in our diverse backgrounds in architecture, cinematography, photography and graphics.[/vc_column_text]
[vc_empty_space alter_height=”medium” hide_on_desktop=”1″ hide_on_notebook=”1″ hide_on_tablet=”” hide_on_mobile=””][/vc_column][vc_column width=”1/2″ icons_position=”left” offset=”vc_col-md-4 vc_col-xs-12″][vc_single_image image=”332″ img_size=”full”][vc_empty_space alter_height=”medium” hide_on_desktop=”1″ hide_on_notebook=”1″ hide_on_tablet=”1″ hide_on_mobile=””][/vc_column][vc_column width=”1/2″ icons_position=”left” offset=”vc_col-md-4 vc_col-xs-12″]
Jason Parkett
[vc_column_text css=”.vc_custom_1510221524920{margin-top: 0.2rem !important;margin-right: 4rem !important;}”]
Creative Director
Quadcopters differ from conventional helicopters, which use rotors that are able to vary the pitch of their blades dynamically as they move around the rotor hub. In the early days of flight, quadcopters were seen as possible solutions.[/vc_column_text][/vc_column][vc_column icons_position=”left”][vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1510221566469{margin-top: 0.5rem !important;}”][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces” scheme=”dark” row_delimiter=”” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” hide_on_frontpage=”” css=”.vc_custom_1510068085713{background-image: url(https://dcconsulting.com/wp-content/uploads/2017/08/img_our_clients.jpg?id=221) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column fix_column=”” shift_x=”tiny_negative” hide_bg_image_on_tablet=”” hide_bg_image_on_mobile=”” icons_position=”left” offset=”vc_col-md-6″][vc_empty_space hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”1″ hide_on_mobile=”1″][vc_empty_space alter_height=”medium” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”1″ hide_on_mobile=”1″]
[vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1510069488283{margin-bottom: 1.3rem !important;}”][vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1538647870025{margin-bottom: 0.3em !important;}” el_class=”custom_home-empty”][vc_empty_space alter_height=”small” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”1″]
[/vc_column][vc_column width=”1/2″ icons_position=”left”][/vc_column][/vc_row][vc_row][vc_column hide_bg_image_on_tablet=”” hide_bg_image_on_mobile=”” icons_position=”left” offset=”vc_hidden-sm vc_hidden-xs”][vc_empty_space alter_height=”large” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=”” css=”.vc_custom_1510221691969{margin-bottom: 0.6rem !important;}”][/vc_column][/vc_row][vc_row][vc_column icons_position=”left”][vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=””]
Recent Posts
According to a study by the Ponemon Institute, more than two-thirds (68%) of organizations have experienced one or more endpoint attacks that successfully compromised data and/or their IT infrastructure. More than 8 in 10 businesses have experienced some sort of endpoint malware attack – one of the most common ways cyber thieves target endpoints.[1] Enterprises today face billions of cyberthreats…
The trend toward remote work has been growing in recent years and the COVID-19 pandemic has accelerated the move to offsite work into warp speed. As offices were closed and more people moved offsite, their reliance on email increased exponentially. One study showed that email communication increased by 24% during the pandemic.[1] As email traffic grew, so did the opportunity…
The 2021 Thales Global Cloud Security Study reported that four of 10 organizations have experienced a cloud-based data breach in the previous 12 months.[1] Microsoft, Facebook, CNA Financial, and T-Mobile are among the many organizations that suffered a data breach in 2021.[2] As more businesses shift to the cloud, the greater the concern over the security of their data. 40%…
[vc_empty_space alter_height=”biggest” hide_on_desktop=”” hide_on_notebook=”” hide_on_tablet=”” hide_on_mobile=””][/vc_column][/vc_row]