Most microphones need a diaphragm in order to follow some aspect of the air motion that carries the sound.
When IP was first envisaged back in the 1970s, just over 4 billion unique IP addresses were allocated. However, the overwhelming international adoption of the internet with a world population of nearly 8 billion people has demonstrated there are simply not enough IP addresses to go around.
IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.
One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions through IPsec (IP Security) to alleviate these concerns.
To get the best out of a microphone it is important to understand how it differs from the human ear.
By assuming that IP must be made secure, we run the risk of missing a more fundamental question that is often overlooked: why is IP so insecure?
As engineers and technologists, it’s easy to become bogged down in the technical solutions that maintain high levels of computer security, but the first port of call in designing any secure system should be to consider the user and their interaction.
Designing IP Broadcast Systems is another massive body of research driven work - with over 27,000 words in 18 articles, in a free 84 page eBook. It provides extensive insight into the technology and engineering methodology required to create practical IP based broadcast production systems. This series builds on the foundations of the extensive library of work already published by The Broadcast Bridge on IP and scalable software defined infrastructure. This content collection delves deeper into various aspects of how IP based systems work, with detailed technical explorations of key themes including; design philosophies, discoverability, hybrid systems, remote production, cloud infrastructure and software control layers.