Understanding how to make different vendors software operate coherently is critical to achieving the smooth operation of real-time broadcast facilities, especially with the new emergence of IP infrastructures. Discover who is achieving this and how.
There are many different requirements and expectations in the field of computer security and it may be as well to set out what some of them are. Computation is everywhere, from the ubiquitous iPhone to the military computer in an underground installation, and it is unrealistic to think that one security approach would suit all requirements. Computer security is also awash with buzzwords and these will crop up here with definitions of what they might mean.
The growth in customer numbers for Android TV has slowed over the last 18 months as Google aims to consolidate by scaling the middleware platform up and promoting revenue generation among its existing operator base.
Television production these days is tricky enough without adding virtual elements like augmented reality (AR) graphics, but that’s exactly what Taipei-based production company Getop did for the live telecast of the 2020 Golden Melody Awards (GMA). The highly rated annual televised awards ceremony - considered the “Asian Grammys” by many - celebrates top musical talent from across southeast Asia.
IP networks provide us with untold flexibility, but this flexibility presents us with interesting challenges of control. Developments in SDN (software defined networks) are leading the way through the separation of the control and data plane. And as we discover more of what SDN means, we soon realize that broadcasters are closer than they may think in achieving its operation.
Timing accuracy has been a fundamental component of broadcast infrastructures for as long as we’ve transmitted television pictures and sound. The time invariant nature of frame sampling still requires us to provide timing references with sub microsecond accuracy.
For content providers (studios, content owners, content aggregators, or other content licensors) and their licensees (affiliates) operating in a multiplatform world - and pirates looking to obtain illegal access to the most popular content - it’s an unrelenting game of cat and mouse. While the internet has provided a cost-effective and easy way to deliver content to consumers, it also opens up new vulnerabilities that content pirates are eager to expose.
Having a collection of PCs and MACs stacked under a desk to facilitate the multitude of operational requirements not only proves difficult to operate but challenges our modern ideas around security and makes maintenance almost impossible.
Content Origination is in the midst of significant transformation, like all parts of the OTT video ecosystem. As OTT grows and new efficiencies are pursued, Origination must play its part as a fundamental element of the delivery chain. But Origination is not just about smooth and efficient content delivery. It’s also about providing key features to the OTT service.