
Essential Guide: The Liberation Of Broadcast Technology
May 5th 2020 - 09:00 AM
For many years broadcasters have been working with static systems that are difficult to change and upgrade. Although we have video and audio routing, the often-tangled mess of jackfield patch-cords is testament to how flexible broadcast systems really need to be to meet the demands of modern program making.
COTS systems have gone a long way to help make broadcast infrastructures more scalable, but the introduction of flexible software licensing has revolutionized how we think about broadcasting infrastructures.
This Essential Guide discusses the development of COTS systems and more importantly, the applications of flexible licensing. Although this concept has been available in mainstream IT for many years, the recent improvements in COTS hardware speeds leading to higher data throughput and faster processing has led to its adoption in broadcast television.
Dynamic systems are the future of infrastructure design and optimizing for peak demand has never been so important. No longer do we have to build constrained systems that are costly and not used to their optimum efficiency. Instead, we are free to greatly improve performance, scalability and flexibility.
This Essential Guide, sponsored by TAG VS discusses the practical applications of flexible licensing, when to use them and how.
Download this Essential Guide today if you’re an engineer, technologist, or somebody involved in greatly improving the efficiency of your broadcast operation.
Supported by
You might also like...
IP Monitoring & Diagnostics With Command Line Tools: Part 5 - Using Shell Scripts
Shell scripts enable you to edit your diagnostic and monitoring commands into a script file so they can be repeated without needing to type them manually every time. Shell scripts also offer some unique and powerful features that help to…
IP Monitoring & Diagnostics With Command Line Tools: Part 4 - SSH Public Keys
Installing public SSH keys created on your workstation in a server will authenticate you without needing a password. This streamlines the SSH interaction and avoids the need to use stored and visible passwords in your scripts.
IP Monitoring & Diagnostics With Command Line Tools: Part 3 - Monitoring Your Remote Systems
Monitoring what is happening in a remote system depends on being able to ask for something to be checked and having the results reported back to you. There are many ways to do this. This article looks at some simple…
IP Monitoring & Diagnostics With Command Line Tools: Part 2 - Testing Remote Connections
In the previous article, we set the scene for working with the Command Line Interface (CLI) on a UNIX system. Now we will explore some techniques for performing basic tests on our network infrastructure to check for potential problems.
IP Security For Broadcasters: Part 12 - Zero Trust
As users working from home are no longer limited to their working environment by the concept of a physical location, and infrastructures are moving more and more to the cloud-hybrid approach, the outdated concept of perimeter security is moving aside…