Immersive audio has the great potential to transform our human listening experience, captivate our imagination, and inspire our inventiveness.
Part 2 of our Immersive Audio series investigates the standards and technology that delivers the immersive audio experience. From Dolby Atmos and AC-4 to MPEG-H and DTS-UHD, we uncover the technologies that make immersive audio tick.
Stefan Meltzer, Chief Business Development Manager at the Fraunhofer Institute discusses the intricacies of MPEG-H, outlines its benefits, and explains how broadcasters implement MPEG-H into their workflows.
Continuing from this deep technical dive, industry experts Lawo, Sennheiser, and Genelec all explain their approach to immersive audio. Through a series of case studies and technical explanations, each company explains their solutions with real-world examples.
Sennheiser delivers an Ambiosonics Primer, detailing how this technology works and its implications for broadcasters. Specialist microphones and software processing are introduced, and their relevance explained.
Genelec provide and outstanding case study on the practical aspects of immersive audio infrastructure design with their case study at The Farm post-production house, London.
Lawo discusses the real-world applications of mixing immersive audio through their interview with Felix Krückels, professor for Broadcast Production and System Design at the University of Darmstadt.
This eBook Essential Guide is aimed at anybody who wants to gain a deeper understanding of Immersive Audio and its applications. This easy to understand, plain speaking Essential Guide is a must for anybody looking to improve their knowledge in this new and exciting audio genre.
Download this Essential Guide now to understand standards and compatibility in Immersive Audio.
You might also like...
Errors are handled in real channels by a combination of techniques and it is the overall result that matters. This means that different media and channels can have completely different approaches to the problem, yet still deliver reliable data.
Hackers are always improving the level of sophistication and constantly finding new surface areas to attack – resulting in the surging volume and frequency of cyberattacks.
In the fourth and final part of this series, we wrap up with an explanation on how PTP is used to support SMPTE ST 2110 based services, we dive into timing constraints related to using COTS (Commercial Off-The-Shelf) hardware, i.e.:…
In the data recording or transmission fields, any time a recovered bit is not the same as what was supplied to the channel, there has been an error. Different types of data have different tolerances to error. Any time the…
In the previous two parts of this four-part series, we covered the basic principles of PTP and explained how time transfer can be made highly reliable using both the inherent methods IEE1588 provides as well as various complementing redundancy technologies.…