Quality control (QC) is an important process consideration at many points in file-based workflows, and one that can have a tangible impact on the business if neglected or improperly implemented. Defects that can be seen or heard by the end viewer such as missed or faulty commercial spots can result in lost advertising revenue, and poor or spotty picture quality can affect the brand and ultimately lead to subscriber loss. Quality or delivery compliance issues that occur prior to broadcast can add costs if the program material must be rejected and sent back to the content provider for costly rework.
Every year the NFL Super Bowl creates a level of excitement uncommon for most sporting events and this year’s event was no exception. The broadcast provided viewers with a dazzling Lady Gaga half-time show and the stunning and record-breaking, come from behind 34 – 28 win by Tom Brady and the New England Patriots.
The acronym “FUD” stands for “fear, uncertainty, and doubt”. FUD neatly describes the unsettled attitude of many Directors of Engineering (DOEs) towards the approaching double-whammy of the FCC’s Spectrum Repack, and the advent of ATSC 3.0 Over-the-Air (OTA) broadcasting.
Ask some in our industry about Media Asset Management (MAM) and they either recoil in horror or simply roll their eyes. Even so, most will tell you that they can see the value, but their particular implementation hasn’t quite realised the expected workflow benefits.
What is two-factor authentication (2FA) and why is your identity at risk if you don’t use it? In a continuing series of short films, Bruce Devlin takes a light-hearted look at aspects of internet security.
In the previous Cloud Broadcasting article, we looked at the differences between public and private clouds. In this article, we delve further into Cloud Born systems and define the business case for cloud computing.
In the last decade, there has been a significant shift what viewers like to see on their televisions with much of that content recorded as live reality style shows. Capturing such spontaneous content brings many challenges, but one of the biggest is managing the huge amounts of media created. Fortunately, with the help of timecode and synchronisation, it is possible to wrestle back some control over the content while saving money.
Internet Security depends on trust and identity. What does that really mean and how do you achieve it? In Bruce’s Shorts, Bruce Devlin takes a light-hearted look at aspects of internet security.