‘Real World IP’ Event Video Series: Part 5 - Phil Myers - Lawo
Part 5 in our series from ‘Real World IP’, a one-day seminar event from The Broadcast Bridge held at BAFTA in London, Phil Myers, Senior Director – IP Systems, Lawo, discusses real-life applications for IP infrastructures including green-field sites, hybrid installations, and remote broadcast.
With over 2,000 miles of distance between the NEP Perth and Sydney facilities, Myers discusses the challenges and solutions of connecting media over IP for such large distances, especially when considering the procurement of equipment in a rapidly developing marketplace.
Myers digs deep into practical infrastructure design for hybrid systems and describes the three types of SDI to IP gateways currently available when considering challenges such as audio and video alignment, and dealing with jitter using low memory devices.
Watch the video; HERE.
Please note you must be logged in to access this video.
You might also like...
IP Security For Broadcasters: Part 4 - MACsec Explained
IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.
IP Security For Broadcasters: Part 3 - IPsec Explained
One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…
Microphones: Part 3 - Human Auditory System
To get the best out of a microphone it is important to understand how it differs from the human ear.
IP Security For Broadcasters: Part 2 - The Problem To Be Solved
By assuming that IP must be made secure, we run the risk of missing a more fundamental question that is often overlooked: why is IP so insecure?
IP Security For Broadcasters: Part 1 - Psychology Of Security
As engineers and technologists, it’s easy to become bogged down in the technical solutions that maintain high levels of computer security, but the first port of call in designing any secure system should be to consider the user and t…