Try our new AI powered Smart-Search!
In the fourth and final part of this series, we wrap up with an explanation on how PTP is used to support SMPTE ST 2110 based services, we dive into timing constraints related to using COTS (Commercial Off-The-Shelf) hardware, i.e.: servers.
People have been making pictures for both the big and small screens for almost a century. In an industry with a history that long, it’s no surprise that the perpetual search for something new has long been tempered by a certain respect for tradition. Or, to put it another way, directors of photography are very often looking for ways to make pictures look different, and different in a way that’s somehow appropriate.
Every three to five years, government delegations from around the globe gather at the Radiocommunication Assembly (RA) and World Radiocommunication Conference (WRC) conducted by the International Telecommunications Union (ITU) — the United Nations (U.N.) specialized agency for information and communication technologies. Their mission is to review emerging technologies, negotiate use of radio frequencies (RF) that enable wireless devices, harmonize frequency bands to specific applications, and codify binding international treaties.
Back in the early 1980s, Hugo Zuccarelli demonstrated Holophonics to crowds waiting in long lines at a trade show in Los Angeles. His headphone-based 360-degree spatial audio system was startling in its detail. When the sound of scissors cut a lock of your hair from behind, it was so realistic that many thought their hair had actually been cut.
This past summer the NBA did a little experimenting using 5G and mobile phones to cover their summer league. This is not User Generated Content (UGC) by any means. It also was not an off the shelf deployment of 5G and demonstration of its capability.
Few memories in broadcasting are more powerful than that rich, booming “Voice of God” sound heard on RCA ribbon microphones in early TV and radio studios. Those mics made most voices sound much better than they actually were — elevating the ego of many a disc jockey or announcer.
In the previous two parts of this four-part series, we covered the basic principles of PTP and explained how time transfer can be made highly reliable using both the inherent methods IEE1588 provides as well as various complementing redundancy technologies. In this part, we look deeper into monitoring PTP systems.
Cyber security impacts everyone and every industry. One unifying comment from cyber security experts is the bad guys are mostly winning. The good guys are fighting the good fight and we each need to do our part. One of the more challenging aspects of cyber security is cyber policy, governance, guidelines and training. I call this “good cyber hygiene”.