At IHSE, KVM is king. Few companies know the value of a keyboard, video and mouse (KVM) system better than IHSE, which has been supplying compatible extenders and matrix switches for more than 40 years. In that time, a wide and ever evolving product portfolio has allowed multiple users to reliably access source computers over medium and long distances.
Oberteuringen, Germany-based IHSE, together with sister-company kvm-tec (in Tattendorf, Austria), offers direct KVM and KVM-over-IP solutions that benefit many industries, such as broadcast, air traffic management, defence, civil and blue light emergency services, industrial, commercial and maritime. These benefits include enhanced security, improved user environments, reduced equipment cost and versatility in operational procedures.
The company says it’s all about empowering the user with resource access and asset management, easier hardware and software maintenance, user accountability, mitigation of external cyber threats and meeting the specific demands of the individual application.
Any number of source devices and users can be accommodated, with each user having immediate connection to remote shared computers at will—subject to internal access restrictions defined and managed by the system administrator. Extensive configuration capability and a wide feature set enables the creation of an infrastructure for each unique application that delivers adaptable, reconfigurable and dynamically adjustable connectivity services.
“KVM technology delivers highly reliable operation, lossless and delay-free data transmission of high bandwidth signals,” said Steve Montgomery, Senior Marketing Manager at IHSE, “coupled with flexibility in configuration and redundancy scenarios that meet every situational requirement and specification.”
All common computer-based video formats are supported across the product line, including high resolution video up to 8K and above on HDMI, DVI and DisplayPort connections. USB interfaces are managed for interactive HID devices and USB 2.0 and USB 3.0 for mass data transfer with blocking of unauthorised routes to preserve data integrity and secrecy.
Using KVM, system integrators can design the optimal infrastructure for all types of applications in mission-critical and high-security environments.
“From the smallest and simplest point-to-point extension to massive multi-switch matrix systems with thousands of concurrent endpoints, extensive KVM systems can be created using directly-connected devices over copper or fibre links for the most secure and responsive operation, or through IP connections to more widely spread and easily relocatable endpoints,” said Montgomery. “Combining both systems together achieves the best of both worlds in the creation of extended, secure and configurable solutions that are able to serve local and wide-area users over tens to hundreds of kilometers away.”
Montgomery added that the biggest challenge for system builders of extensive computer resource networks is ensuring that all types of data sources can be transmitted without latency or signal degradation in transmission, while also providing the highest reliability and no disruption to service.
“IHSE meets these criteria through a future-proof design philosophy that ensures compatibility with all common data formats using the latest lossless compression and data transmission technology, backed by multi-level redundancy schemes,” said Montgomery.
In addition to system reliability, data security is ensured through a multi-level approach, including proprietary signal encoding, restricted and authorised connection routes to compliance with the strictest military-grade security certifications.
You might also like...
How to tune for legal & standards compliance and performance, during installation and daily operations.
Broadcast transmitter facility planning, design and construction… and what an engineering consultant can help with.
Having looked at the traditional approach to moving pictures and found that the portrayal of motion was irremediably poor, thoughts turn to how moving pictures might be portrayed properly.
At the heart of virtually every IP infrastructure and its inherent IT network is a software layer that acts like a conductor to make sure the system is working smoothly. Some call it the orchestration layer because it instructs each…
This is the third of a multi-part series exploring the science and practical applications of RF technology in broadcast. Here we focus on things to consider when planning systems, how to tune transmitters and monitoring requirements.