Work on ST 2110 continues although the main elements of it have been standardised for well over a year now, but many companies are thinking beyond ST 2110.
The EBU’s Willem Vermost presents the wider picture of next generation broadcast facilities charting the need and desires of public broadcasters in Europe. We look here at the need for many broadcasters to move buildings and the problems they face doing so – only one of them being implementing a ST 2110 infrastructure.
The talk then goes on to the problems that broadcasters face and the need for a way of working which defines some common approaches. This has arrived in the form if a document with the lengthy title JT-NM TR-1001-1:2018 which outlines many practical approaches to making ST 2110 work. Many are simple, such as using DHCP but without an agreed set of practices, incompatibilities will come in.
Willem talks about the interoperability tests for this, the results of which are publicly available rather than previous closed-door tests. And before rounding off the talk with questions, he looks at the increasingly well-known EBU Pyramid which shows the availability of different parts of the IP ecosystem; media transport being green, configuration and security being red.
Join Willem at IBC to find out more about ST 2110 at a panel from IET Media discussing ST 2110 and NDI. NDI provides video over IP and is more widely supported than ST 2110, yet major broadcasters seem blind to its benefits. Is this because NDI doesn’t meet the needs of these broadcasters or are there other reasons? What are the use cases where both can be used together?
Join Willem Vermost, The Broadcast Knowledge Editor Russell Trafford-Jones, Marc Risby CTO of Boxer and Liam Hayter from Newtek/NDI to find out more at IBC, IABM Theatre, Future Zone. Friday 13th 15:00-15:45.
Building security into your infrastructure is more and more important for broadcasters with many now taking very seriously a topic which, only 6 years ago, was only just being discussed. Attacks on broadcasters like TV5 Monde have brought into focus that it’s not just copmanies who have high value rights who are ripe for breach – attacking a broadcaster is a high impact way of getting your message accross.
We have seen how the internet, which was built on very open and trusting protocols, has struggled in recent times to keep abuse to a minimum and to implement security to keep data safe and to keep out unauthorised persons.
And so AMWA is looking at its recent specifcations to ensure there is a clear and interoperable way of implementing security. The benefit of IP should be that that as an industry we can benefit from the work of other industries before us and here, having based these specifications on HTTP interfaces, we can do exactly that. Just like sites on the internet can implemnt HTTPS, we, too use the same mechanism of security certificates and TLS (colloquially known as SSL) encryption to ensure that not only is our data encrypted but also that no one can impersonate anyone else on the network.
Simon Rankine from BBC R&D explains the work he has been part of in defining this secure interface which not only protects from mal-intentioned actors, but also offers some protection from accidental mistakes by staff.
Simon gives a good intorduction to not only how this is a benefit but also how the underlying mechanisms work which are just as applicable to the NMOS APIs as they are to general websites.
As security continues to be forefront in broadcasters’ minds, Akamai continues to monitor internet security threats. Herem they tell you what to expect in the year to come as they review the biggest events and best research from Akamai’s 2018 State of the Internet / Security: A Year in Review report.
Why low-and-slow, high-leverage application-level attacks can be just as damaging as high-bandwidth attacks
How specialisation among adversaries is driving marketisation and economies of scale in the hostile ecosystem of malicious actors
What the biggest attacks of the previous year, like memcached and the Mirai botnet, indicate about the evolution of reflection and
botnet attack vectors
What our researchers have uncovered over the past year about the dark side of APIs, emerging and popular adversarial tools, new vulnerabilities, and more
What security trends we can expect in 2019 and how attacks and threats will evolve in the year ahead