Broadcast For IT - Part 7 - Color and Temperature March 27th 2018 - 08:00 AM

In this series of articles, we will explain broadcasting for IT engineers. Television is an illusion, there are no moving pictures and todays broadcast formats are heavily dependent on decisions engineers made in the 1930’s and 1940’s. In this article we start to look at the human visual system and col…

Broadcast For IT - Part 6 - Counting Time in 59.94 March 14th 2018 - 04:00 PM

In this series of articles, we will explain broadcasting for IT engineers. Television is an illusion, there are no moving pictures and todays broadcast formats are heavily dependent on decisions engineers made in the 1930’s and 1940’s. In this article we look at how to represent time in 59.94i frame sys…

Audio Over IP - Why It Is Essential February 8th 2018 - 11:00 AM

The impact of IP on the design of broadcast equipment and infrastructures is profound. Many broadcasters are replacing existing analog, AES3, MADI and SDI ports with a new class of interface for connecting to standard IT switch infrastructure, together with new control mechanisms for connection management and device discovery. In…

Broadcast For IT - Part 3 - Video Lines January 22nd 2018 - 01:00 PM

In this series of articles, we will explain broadcasting for IT engineers. Television is an illusion, there are no moving pictures and todays broadcast formats are heavily dependent on the decisions engineers made in the 1930’s and 1940’s. In this article we look at video lines, why we still need the…

Surviving the Early Adoption to IP January 18th 2018 - 11:00 AM

Broadcasters now find themselves on one side of a digital gap. On one side we have SDI, the other side IP. Engineers want to reach the far shore, but do so without sacrificing their investment in current SDI solutions. This article reviews some of the key concerns engineers may face…

Spectre, Meltdown and Broadcasters January 8th 2018 - 01:00 PM

The news of the potential vulnerability of processors to attack is just the latest discovery in a long line of vulnerabilities of networked computer systems. It is a salutary reminder of the game of whack-a-mole that systems administrators have to play in order to protect computer networks. Coming at a…

You might be interested in the following resources