Essential Guide: Cloud Best Practices
April 26th 2023 - 09:00 AMWhether using cloud services in isolation or as part of a hybrid model, new working practices that may not be immediately obvious to broadcasters must be adopted from the very beginning of the design.
Broadcasters have been designing 24/7 operations since the dawn of television but much of their expertise lies in the field of circuit switched networks. SDI and AES form the backbone of this type of operation, but as broadcasters transition to IP and adopt the cloud, there are many new working practices that must be considered and implemented.
Packet switched networks employed in IP need a different mindset, and when combined with the methodologies that agile demonstrates some interesting working practices emerge. For example, chaos engineering may sound like a strange proposition, but it has the potential, when used in a controlled environment, to deliver even greater reliability and resilience for broadcasters.
Download this Essential Guide now. It has been written for technologists, broadcast engineers, their managers, and anybody looking to improve their knowledge of delivering the best working practices for cloud broadcast IP infrastructures.
Supported by
You might also like...
Microphones: Part 3 - Human Auditory System
To get the best out of a microphone it is important to understand how it differs from the human ear.
HDR Picture Fundamentals: Camera Technology
Understanding the terminology and technical theory of camera sensors & lenses is a key element of specifying systems to meet the consumer desire for High Dynamic Range.
IP Security For Broadcasters: Part 2 - The Problem To Be Solved
By assuming that IP must be made secure, we run the risk of missing a more fundamental question that is often overlooked: why is IP so insecure?
Standards: Part 22 - Inside AIFF Files
Compared with other popular standards in use, AIFF is ancient. The core functionality was stabilized over 30 years ago and remains unchanged.
IP Security For Broadcasters: Part 1 - Psychology Of Security
As engineers and technologists, it’s easy to become bogged down in the technical solutions that maintain high levels of computer security, but the first port of call in designing any secure system should be to consider the user and t…