Recent Content

TDM Mesh Networks - A Simple Alternative To Leaf-Spine ST2110: Application - Eurovision Song ContestAugust 18th 2021 - 09:00 AM

With over 4000 signals to distribute, transfer and route, the Eurovision Song Contest (ESC) proved to be this year’s showpiece for Riedel’s TDM based distributed mesh networked system MediorNet. Understanding the intricacies of such an event is key to realizing why TDM is such a powerful solution.

Read more

TDM Mesh Networks - A Simple Alternative To Leaf-Spine ST2110: Knowing What To ChooseAugust 11th 2021 - 09:00 AM

Broadcasters are no longer faced with the binary choice of going down the SDI or IP routes. The hybrid method of using TDM (Time Domain Multiplexing) combines the advantages of distributed networks with IP and SDI to deliver a fully integrated solution that helps broadcasters working across multiple technologies.

Read more

TDM Mesh Networks: A Simple Alternative To Leaf-Spine ST2110. Pt1 - Balancing Technical RequirementsAugust 4th 2021 - 09:00 AM

IP is well known and appreciated for its flexibility, scalability, and resilience. But there are times when the learning curve and installation challenges a complete ST-2110 infrastructure provides are just too great.

Read more

Computer Security: Part 5 - Dual Bus ArchitectureApril 21st 2021 - 09:00 AM

In the UK we have Oxford v Cambridge. In the USA it’s Princeton v Harvard. The only difference is that one is a boat race and the other is computer architecture race.

Read more

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 2April 7th 2021 - 09:00 AM

In part 2 of this investigation, we look at why Apple’s new M1 processor benefits broadcasters.

Read more

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 1March 22nd 2021 - 09:00 AM

Apple’s M1-based MacBook Air, MacBook Pro, and Mac Mini have been the focus of computer news for the last half-year because of their surprisingly high-performance.

Read more

Computer Security: Part 4 - Making Hardware SecureMarch 19th 2021 - 09:00 AM

The history of computing has been dominated by the von Neumann computer architecture, also known as the Princeton architecture, after the university of that name, in which one common memory stores the operating system, user programs and variables the programs operate on.

Read more

Computer Security: Part 3 - Circles Of ProtectionFebruary 12th 2021 - 09:00 AM

There are many different requirements and expectations in the field of computer security and it may be as well to set out what some of them are. Computation is everywhere, from the ubiquitous iPhone to the military computer in an underground installation, and it is unrealistic to think that one security approach would suit all requirements. Computer security is also awash with buzzwords and these will crop up here with definitions of what they might mean.

Read more