Nairobi’s Kayu FM Serves Its Listeners With Lawo RƎLAY
Kayu FM.
Radio broadcast station, Kayu FM, has chosen to serve its listeners using Lawo RƎLAY virtual radio software.
Kayu covers numerous important local and regional topics, airing its programs in Kikuyu, one of the Bantu languages spoken by the Gikuyu people, who form the ethnic majority in Kenya. Taking advantage of the refitting of a former hotel building, Kayu FM combined and renovated several rooms, converting them into full-fledged radio studios powered by Lawo RƎLAY software.
Lawo’s RƎLAY virtual radio suite empowers radio talent with a full-blown broadcast mixer, all in software: live audio mixing, processing and source routing can be performed on a touchscreen connected to an off-the-shelf PC or, for remote and on-location shows, a laptop computer.
RƎLAY allows Kayu FM to mix 24 audio sources, as well as AES67-compliant AoIP signal streams, directly on the station’s PC for pristine audio production and output. Rose Kimotho, CEO of Kayu FM, says that “RƎLAY brings professional radio production to our radio station, complete with Audio-over-IP and internal routing.”
You might also like...
IP Security For Broadcasters: Part 3 - IPsec Explained
One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…
The Resolution Revolution
We can now capture video in much higher resolutions than we can transmit, distribute and display. But should we?
Microphones: Part 3 - Human Auditory System
To get the best out of a microphone it is important to understand how it differs from the human ear.
HDR Picture Fundamentals: Camera Technology
Understanding the terminology and technical theory of camera sensors & lenses is a key element of specifying systems to meet the consumer desire for High Dynamic Range.
IP Security For Broadcasters: Part 2 - The Problem To Be Solved
By assuming that IP must be made secure, we run the risk of missing a more fundamental question that is often overlooked: why is IP so insecure?