Correctly applied zero trust security methods stop intruders from entering networks and computing systems at all entry points within the infrastructure. And to help broadcasters understand security vulnerabilities further, organizations such as CVE are there to help.
While commercial deployments of 5G networks are steadily increasing, many commentators predict that the rise of more immersive communication, holographic telepresence, and social experiences powered by Extended Reality (XR)… IE ‘the metaverse’, will create vast amounts of generated data and applications that will rapidly exceed the current and future capabilities…
Shock waves are interesting phenomena that take place in a number of different media. For an arcane physical process, they have done quite well to be adopted by the mainstream media as one of their clichés, along with Mae West life jackets and aircraft black boxes (which are orange).
Machine Learning, under the banner of Generative AI, is encroaching on creative aspects of Audio and Visual content generation, even down to production of movie scripts and screenplays. This builds on established applications of ML lower down the production chain, such as generation of clips and quality enhancement.
For many people the idea of “serverless” software applications might seem counter-intuitive, or even confusing. Software surely needs to run on some kind of computer system somewhere? Isn’t that always called a “server”? So what does it mean when we talk about serverless, how can this approach help us, and when …
Highly accurate timing has always been required for video and audio signals due to the sampling requirements, and this has been an inherently hardware trait. But as we move to IP and cloud, we now have the opportunity to evaluate whether sub nanosecond timing is really needed and to consider…
Software continues to demonstrate flexibility and scalability, but the new breed of software defined hardware architectures build on the success of software to keep latency very low and flexibility and scalability high.
Security for cloud and internet systems is playing an ever-increasing role in broadcast infrastructures. High value media assets and communication channels to broad audiences are at risk so it is reasonable to assume that unidentified hostile actors are lurking in every corner.