SRT is used as part of the workflow by financial news OTT service Cheddar
SRT continues momentum to becoming the de facto low latency video streaming standard.
Haivision has gained more support for SRT, the streaming media protocol it has made open source. Imagine Communications, Net Insight, Red Bee Media, Telestream join over 200 others including Vislink, Comprimato, Harmonic, Ateme, MediaKind and Ooyala.
David Heppe, Commercial General Manager, Targeted Delivery at Imagine Communications, said, “We see SRT as a valuable tool to help our customers more reliably transport their content into our cloud-based targeted advertising workflows.”
“We are increasingly distributing video for high value live events, often on a temporary basis for customers that demand high quality over secure and reliable networks,” said Steve Russell, Head of Media Management and OTT at Red Bee Media. “SRT enables us to expand our customers’ reach while adhering to our preference for open standards.”
At NAB, Haivision and Microsoft will also be hosting a number of free-to-attend panel sessions discussing the impact of SRT.
You might also like...
It is almost a hundred years since the color space of the human visual system was first explored. John Watkinson looks at how it was done.
In the first part of this four-part series we described the basic principles of the Precision Time Protocol. In part two, we investigate PTP redundancy, specifically for media networks.
As the broadcasting industry is moving from a traditional SDI infrastructure towards the All-IP Studio providing a common frequency and – equally important – an absolute notion of time for all devices is now provided by the underlying infrastructure itself. In this fou…
In a multi-disciplinary subject such as color space, it is hard to know where to start. John Watkinson argues that the starting point is less important than the destination.
Security is becoming increasingly important for broadcasters looking to transition to IP infrastructures. But creating improved software, firewalls and secure networks is only half the story as cybercriminals look to find new and imaginative methods of compromising data.