Bruce’s Shorts | 4.7 - Security - What Does That Mean?

In a new series of Bruce’s Shorts, Bruce Devlin looks at computer security. There are many aspects to security and in this Short, Devlin introduces the topic in preparation for more detail in upcoming episodes.

Security in a hoot topic with many instances of hacks reported in the news. Everyone likes to have good security.

Security protects against specific threats. Devlin raises questions about access, authentication and authorization.

Security is about trade-offs between cost and security. There is no such thing as perfect security, and it is always a compromise. Future episodes will look at the technology behind security.

You might also like...

TAG Introduces Realtime Media Platform

TAG Video Systems takes advantage of over 70,000 globally deployed probing points to give users the ability to dive deep into streaming content monitoring. The company anticipates more than 100,000 probing point deployments by the end of 2021.

Flexible IP Monitoring - Part 2

In the last article in this series, we looked at why integrated monitoring is a necessity in modern broadcast IP workflows. In this article, we dig deeper to understand what is new in IP monitoring and how this integrates with…

Low Latency Encoding The Key To Variety Of File Streaming Use Cases

Television ratings service Nielsen recently released a report that showed streaming platforms pulled in a bigger share of viewers’ time then broadcast networks did. In fact, Netflix and YouTube alone now make up about 12 percent of the time Americans spend i…

Essential Guide: Cloud Workflow Intelligent Optimization

Optimization gained from transitioning to the cloud isn’t just about saving money, it also embraces improving reliability, enhancing agility and responsiveness, and providing better visibility into overall operations.

Flexible IP Monitoring - Part 1

Video, audio and metadata monitoring in the IP domain requires different parameter checking than is typically available from the mainstream monitoring tools found in IT. The contents of the data payload is less predictable and packet distribution more tightly defined…