Herve Creff (Business Development Manager) discusses Broadpeak’s transition to all-OTT video delivery and their involvement with the Android TV ecosystem.
Presented by Randall Heer, CEO and Co-Founder at Vista Studios
This presentation features a case study of the live, global broadcast of a 2-hour episode of WE tv’s Growing Up Hip Hop (WE tv is owned and operated by AMC Networks Inc.). Vista Studios combined traditional studio production expertise with live-audience interaction via phone in, Skype and social media platforms to produce and broadcast this unscripted, compelling ‘reunion’ episode. This approach is highly cost effective compared to using remote trucks and crews. Vista also discusses use of its new dark fiber capacity to enhance the distribution process.
This 2 day course will build your understanding of the fundamentals of networking, in which data is transported as packets switched and routed around a common infrastructure. You will learn the key network protocols used and the network layers that are commonly used to understand their scope and function in routing packets between IT hosts and from network to network. The emphasis will be on Ethernet (layer 2) and Internet Protocol (layer 3). You will learn the essentials of enterprise networks and the ways that a network infrastructure can used for media applications.
Nestor A. Amaya (President, Coveloz Technologies Inc.) presents a detailed look at the control and management of IP Infrastructures inside a media facility including registration and discovery, connection management/control and Quality of Service (QOS). [maxbutton id="136" url="https://theiabm.org/wp-content/uploads/2017/10/NestorAmaya.pdf"]
Terri Morgan (Co-Founder and Lead Designer, LumaTouch) talks about the advancements in the gear, accessories and apps that have helped fuel tremendous new growth in mobile cinematic filmmaking
In today’s fast-moving media landscape, broadcasters require scalable and reliable storage solutions to grow collaboration between teams and facilities, optimise the value of their media assets and create high-quality media quicker and easier than thought possible.
Avid NEXIS is the world’s first software-defined storage platform that enables true storage virtualisation for any media application. Powered by MediaCentral, the most open, tightly integrated and efficient platform designed for media, Avid NEXIS delivers unrivalled media storage flexibility, scalability and control for both Avid-based and third-party workflows. The latest addition to Avid NEXIS is Avid NEXIS | E5 NL – a high-density on-premises nearline storage solution. Avid NEXIS | E5 NL enables media organisations to seamlessly and efficiently manage media across online, nearline and archive storage.
IABM BaM Awards Finalist
Edgeware, the pioneer of TV CDN technology, has introduced Ad Enabler – a brand new product that segments the content stream in an extremely accurate manner to make sure the ad comes on exactly when it is supposed to.
Ad Enabler provides frame-accurate segmentation that prevents fractions of old ads being shown or parts of content to be lost, both causing glitches to the end-viewer. Edgeware’s Ad Enabler is one of the first to support live OTT ad insertion on the MPEG-DASH standard, which is the native format for Android devices.
Created: 04 Jan 2018 Guidance for enterprise administrators in relation to the recently published processor vulnerabilities ‘Meltdown’ and ‘Spectre’ What are Meltdown/Spectre? 'Meltdown' and 'Spectre' are two related, side-channel attacks against modern CPU microprocessors that can result in unprivileged code reading data it should not be able to. [bctt tweet="'Meltdown' and 'Spectre' are two related, side-channel attacks against modern CPU microprocessors that can result in unprivileged code reading data it should not be able to - 'Meltdown' and 'Spectre' guidance, IABM"] Most devices - from smartphones to hardware in data centres - may be vulnerable to some extent. Vendors are working on (or have already released) patches to mitigate the issue. The NCSC advise you to patch your devices as soon as possible. What are the vulnerabilities? Processors in most devices employ a range of techniques to speed up their operation. The Meltdown and Spectre vulnerabilities allow some of these techniques to be abused, in order to obtain information about areas of memory not normally visible to an attacker. This could include secret keys or other sensitive data. These vulnerabilities comprise: Spectre (bounds check bypass and branch target injection): CVE-2017-5753 and CVE-2017-5715 Meltdown (rogue data cache load): CVE-2017-5754 For more...