In the fourth and final part of this series, we wrap up with an explanation on how PTP is used to support SMPTE ST 2110 based services, we dive into timing constraints related to using COTS (Commercial Off-The-Shelf) hardware, i.e.: servers.
Every three to five years, government delegations from around the globe gather at the Radiocommunication Assembly (RA) and World Radiocommunication Conference (WRC) conducted by the International Telecommunications Union (ITU) — the United Nations (U.N.) specialized agency for information and communication technologies. Their mission is to review emerging technologies, negotiate use of radio frequencies (RF) that enable wireless devices, harmonize frequency bands to specific applications, and codify binding international treaties.
Back in the early 1980s, Hugo Zuccarelli demonstrated Holophonics to crowds waiting in long lines at a trade show in Los Angeles. His headphone-based 360-degree spatial audio system was startling in its detail. When the sound of scissors cut a lock of your hair from behind, it was so realistic that many thought their hair had actually been cut.
This past summer the NBA did a little experimenting using 5G and mobile phones to cover their summer league. This is not User Generated Content (UGC) by any means. It also was not an off the shelf deployment of 5G and demonstration of its capability.
Few memories in broadcasting are more powerful than that rich, booming “Voice of God” sound heard on RCA ribbon microphones in early TV and radio studios. Those mics made most voices sound much better than they actually were — elevating the ego of many a disc jockey or announcer.
In the previous two parts of this four-part series, we covered the basic principles of PTP and explained how time transfer can be made highly reliable using both the inherent methods IEE1588 provides as well as various complementing redundancy technologies. In this part, we look deeper into monitoring PTP systems.
Cyber security impacts everyone and every industry. One unifying comment from cyber security experts is the bad guys are mostly winning. The good guys are fighting the good fight and we each need to do our part. One of the more challenging aspects of cyber security is cyber policy, governance, guidelines and training. I call this “good cyber hygiene”.
Lawo’s Christian Struck looks at the potential for production automation in immersive sports broadcasting, and how it can help move towards a personalized, object-based experience.