Data Center Networking and Compute Sessions at CLEUR

It is incredible how many Data Center sessions there are planned in the DevNet Zone at Cisco Live Barcelona. How incredible? How about over 40 hours of Data Center sessions! That means you could attend a Data Center Session, Workshop or DevNet Breakout for every one of the 37 hours that the DevNet Zone is open.

Spotlight

embedUR systems

We help Network and Telecom equipment vendors and Broadband Service Providers to de-risk new product development and service deployment, in order to get to market faster by leveraging our embedded software expertise and networking IP.

OTHER ARTICLES
Data Center Networking

Five ways to win at antenna integration

Article | July 5, 2023

Antennas are fundamental to the performance of connected devices, but are often implemented as an afterthought, resulting not only in sub-optimal performance, but also in less-than-ideal form factor. It can also have a negative impact on cost for the device as a whole. It is therefore essential that organisations prioritise antenna design as part of a holistic device design philosophy – bear in mind that it is practically impossible to fix bad antenna design. Early decisions need to be made regarding the relative merits of embedded or external devices and then attention can turn to optimising antenna integration.

Read More
Network Infrastructure, Network Management

Four reasons why NB-IoT is the enabler of mass IoT apps and tracking

Article | July 27, 2023

Everyone understands the need to track and trace and tracking was one of the first apps that kick-started the M2M industry at scale about two decades ago. It now encompasses everything from routine shipments to monitoring of high value equipment and has even further proved its worth in the pandemic, enabling tracking of essential shipments and cold chain logistics for vaccines. With narrowband IoT (NB-IoT) now rolling out across the world, the technology is powering tracking applications for the mass-market, bringing new capabilities and functions to tracking and opening up new markets and use cases. Four essential attributes of NB-IoT, in addition to the fundamental ability of throughput, were discussed in a recent Quectel webinar

Read More
Network Infrastructure, Network Management

Verizon and Unity Collaborate to Integrate 5G and MEC in Gaming

Article | July 10, 2023

Telecommunications conglomerate Verizon has partnered with 3D development platform Unity to create entertainment applications and enterprise toolkits that can render 3D environments almost instantaneously, without the need for expensive hardware. In a press release, Verizon said products from this collaboration will address the demand for instantaneous content in industries such as gaming, retail, and sports, where emphasis is placed on real-time digital immersion. “We are entering an era of technology-led disruption where 5G and MEC will not only transform the full enterprise lifecycle, it will change the way consumers experience gaming and entertainment,” said Verizon Chief Executive Officer Tami Erwin. These products will utilise 5G and Mobile Edge Computing (MEC) technology, taking the best of both worlds to enhance the digital experience for consumers. The concept of edge computing has actually been around for roughly three decades, but it wasn't until recently that we've been able to apply it to Internet of Things (IoT) devices. Edge architecture reduces latency by moving computer services closer to the source — the "edges" — of the data. This not only decongests the centralised cloud of information, but also decreases the distance the data needs to cover to reach user terminals. Meanwhile, 5G is the highly anticipated next generation broadband network that promises to deliver high speeds with just millisecond latencies. Despite the pandemic, its rollout hasn’t slowed down at all, with countries like China, South Korea, and the US getting a first taste of the technology. The promise of lightning-fast connections, however, comes at a steep cost: 5G stations consume plenty of energy to work. Though much of 5G's advantages come from its streamlined digital routing capabilities, it's also underpinned by a powerful network of hardware components — more precisely, printed circuit boards (PCBs). To answer the demand for more energy, engineers use ties to meet PCB requirements for solving the challenges that come with powering a standard board. These include considerations like signal paths and planar delays, among others. Placing the net ties at the right junctions distributes energy more evenly, thus providing efficient power delivery to 5G networks. Despite all the touted capabilities of 5G, experts have flagged cybersecurity as one major concern. As a new innovation, 5G is still fairly unregulated, leaving loopholes and security gaps that cyber criminals can exploit. For instance, the expansion of bandwidth coverage actually opens up vulnerabilities and additional avenues for cyber attacks. Furthermore, the hyper connected nature of IoT devices makes it easier for hackers to gain access to different networks, both private and public; and unwitting users can potentially expose their contacts to virtual attackers. Because of these threats, experts urge telecom companies to lay down a solid bedrock for 5G security before finalising the pivot towards it. For now, it remains to be seen how legislators and regulators will implement standards to guide the public in its use of 5G. Amid this concern, Verizon and Unity are hopeful that their collaboration — and the marriage of 5G and MEC technology — will be a game changer in the gaming, retail, and entertainment industries. “We know the world is demanding high-speed, AAA content, whether it’s an educational augmented reality application or a robot running a simulation of a digital twin,” Unity Vice President for Solutions Ryan Peterson said. “5G is the key piece for us to facilitate these real-time 3D experiences broadly and to better meet the demands of the real-time economy.”

Read More
Network Security

Why Security Vulnerability Assessments Are Necessary?

Article | October 26, 2021

Cybercrimes have increasingly become a matter of concern for companies worldwide. Over the past few years, the rise of big-ticket ransomware attacks and exposure of perilous software supply chain infections has awakened organizations to various digital dangers. So, the big question is, how to combat the security threats that are on meteoric growth? The best solution is to adopt a security vulnerability assessment. What is Security Vulnerability Assessment? A vulnerability assessment involves a systematic review of security hazards, which helps identify IT infrastructure’s weaknesses, risks, and vulnerabilities. When it comes to mitigating vulnerabilities and resolving issues, the collective imperative is to analyze the problem areas before getting them fixed. A security assessment is critically important to combat the complexities and with an effective vulnerability assessment program, organizations use the tools required to comprehend the probable security weaknesses and enable the protection of systems and data from intruders and unauthorized breaches. For most organizations, ensuring the safety of devices, networks, applications, and digital assets are part of a broader vulnerability management strategy. It includes an extensive assessment, in-depth processes, and mitigation methods to explore the entire threat spectrum. Typically, it is conducted regularly. Vulnerability assessment offers a firm assurance in the security of data, especially when some alterations have been implemented or a new service has been added, or, for that matter, and installation of new equipment has taken place. Each assessment provides a perspective about the risk in its periphery and suggests solutions to control the risk factors and the evolving threats. Why Security Vulnerability Assessment Is Necessary? The perpetual threat of cybercrime has necessitated the demand for vulnerability assessments significantly. They make organizations realize their security defects and contribute towards mitigating them. Hackers are forever ready to make phishing attacks. As per reports, hackers are at work every 39 seconds. Thus, it is extremely important to be vigilant or complacent to activate hackers’ and cybercriminals’ machinations. Over the period, cybercrimes are fluctuating and thus need ongoing attention. The ideal solution is to undertake consistent vulnerability assessments to safeguard confidential data, systems, and networks. Furthermore, it helps organizations understand the risk and enables smart decision-making. To ensure security, companies ought to conduct both external and internal scans of their networks. According to Gartner (paywall), “Large organizations with thousands of employees, tens of thousands of servers and many operating systems receive hundreds of requests per year to patch thousands of vulnerabilities that cannot be remediated in less than 15 days.” One of the best reasons security vulnerability assessments are important is because it confirms an enterprise’s management processes and whether it has covered every critical patch through outlined existing remediation. Why Do Companies Need Vulnerability Assessment? A vulnerability assessment provides companies insightful details on all types of security discrepancies in their environment. It paves ways to evaluate the risks associated with the flaws. This helps organizations have a better knowledge of their security scare, overall weaknesses, and assets. Moreover, the first thing that strikes us on hearing about a cyber-attack is the security of data. With the right and adequate implementation of security assessments, the safety and security of important data could be easily protected. A security assessment would be helpful to reduce irrelevant expenses and make space and increase the IT budget to invest in other key aspects. Undoubtedly, data breach causes substantial loss to an organization, which leads to legal hassles and financial hazards. In fact, most of the time companies fail to recover the loss. Thus, it doesn’t harm to place solid policies and methods to strengthen the entire security position of the organization and this can only be possible with a strategic security vulnerability assessment. In a nutshell, this would keep the companies aware and, in all likelihood, keep the cyber-criminals at bay. A CASE STUDY ANALYSIS To cite an example, let’s take how Zensar conducted a three-pronged vulnerability assessment with port scan and penetration scanning. It determined the security of its offerings to meet customer requests for Brainshark, a leading provider of on-demand presentation solutions, helping customers deliver business interaction across 600+ ranking companies in the market. While Brainshark knew their systems were secure and could also establish it through their documentation, they still undertook a third-party security vulnerability assessment. Zensar’s vulnerability assessment procedures were based on the industry’s best practices that included tests for SQL injection, cookie manipulation, access control weakness, session state, and cross-site scripting. The focus of the test was to identify the host and application security concerns. Upon completing the tests and assessments, Brainshark expressed satisfaction and was confident enough in their ability and solution. They knew their security posture was highly protected and secure. Types of Vulnerability Assessments: Vulnerability assessments unearth a variety of system and network vulnerabilities. This indicates the reliability of the assessment process, which is implemented with different tools, scanners, and methods that helps discover the vulnerabilities, risks, and threats. Network-based assessment scanning: It is used to determine the presumptive network security attacks. This kind of scanning can also detect the vulnerable systems on wired as well as wireless networks. Host-based scans: It is easy to locate the vulnerabilities in servers or other network hosts with host-based scanning. This type of scanning provides visibility into the configuration settings and legacy systems. Database scans: Database scans ascertain the weak points in a database to preclude malefic attacks. Application Scans: It examines websites to identify and recognize software vulnerabilities and inaccurate configurations in network or web applications. Summing Up Organizations need to be watchful every minute and ensure the security posture is rigorous, which is only possible with security vulnerability assessments. Based on this criterion, understanding company risks gets simplified in turn preventing intrusions and threats. FREQUENTLY ASKED QUESTIONS What Are the Advantages of Security Vulnerability Assessment? There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk. Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks. What Are the Disadvantages of Security Vulnerability Assessment? While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What Are the Advantages of Security Vulnerability Assessment?", "acceptedAnswer": { "@type": "Answer", "text": "There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk. Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks." } },{ "@type": "Question", "name": "What Are the Disadvantages of Security Vulnerability Assessment?", "acceptedAnswer": { "@type": "Answer", "text": "While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too." } }] }

Read More

Spotlight

embedUR systems

We help Network and Telecom equipment vendors and Broadband Service Providers to de-risk new product development and service deployment, in order to get to market faster by leveraging our embedded software expertise and networking IP.

Related News

Network Infrastructure

Algeria Telecom Deploys NEC & Juniper Networks' 5G-Ready IP MTA

Algeria Telecom | May 31, 2022

NEC Corporation, a world's leading IT and network transformation service company, and Juniper Networks, a leader in secure, AI-driven networks, have worked with Algeria Telecom, the leader in the Algerian telecommunications market, to roll out its modernized, nationwide IP metro commercial network to support current demand for increased capacity and future 5G and FTTx requires. Algeria Telecom has a mid-term strategy objective to develop a homogenized, optimized transport network with automated capabilities to ensure bandwidth and future-proof its infrastructure in a rising market. NEC and Juniper implemented Algeria Telecom's next-generation IP metro network while maintaining quality of service and the greatest user experience. Algeria Telecom chose Juniper Networks' high-performing, security solutions for SDN-ready, cloud-grade networking and feature-rich, simple and secure connectivity at scale as the innovative foundation of its new platform. The access nodes create separate pre-aggregation, aggregation, and access domains for optimal reliability. Algeria Telecom implemented the Juniper Paragon Automation cloud-native solution package, Paragon Pathfinder and Paragon Planner, to get deep network insight and simplify operations. This ensures 5G and multicloud user experiences. All Juniper systems operate on Junos OS to deliver an easily managed, open solution. Mr. Adel Bentoumi, CEO of Algeria Telecom said that "The successful completion of the IP metro network modernization project by our partners, NEC Corporation and Juniper Networks, will allow us to make the migration to IPV6 and the initiation of digital transformation, as well as the implementation of high speed internet, as we best satisfy the needs of Algeria Telecom customers." The rapid growth of network traffic is a clear indication of the need for modernization and expansion of network capacity. NEC and Juniper have been extremely attentive to our needs, both technical and commercial, working as an extension of our team with their outstanding local engineering abilities, as well as their relentless efforts to assure quality of experience and on-time delivery. Overall, the innovative solutions from Juniper to enable this automated metro cloud architecture have helped us achieve our strategic goals and thrive as we pave the way for 5G.” AllahoumHocine, Head of IP Core, Algeria Telecom Brendan Gibbs, Senior Vice President, Automated WAN Solutions, Juniper Networks said that “Networks have always been a key asset for service providers, but going forward they will be the foundation for every aspect of business transformation in the 5G and cloud era. Algeria Telecom is jumping ahead of the curve by investing in an open, agile and automated network architecture that can drive simplified operations, improved economics and superior end-user experiences.”

Read More

Wireless

TDK Ventures Invests in XCOM Labs

TDK | May 30, 2022

TDK Corporation today announced that its subsidiary TDK Ventures, Inc. has decided to invest in wireless communications disruptor XCOM Labs to accelerate the development of their 5G and wireless communications solutions, which prioritize bandwidth capacity, latency reduction/elimination, and compute load balancing. XCOM is developing wireless technologies to allow smart manufacturing, automation, off-site training, and more immersive telework experiences in the future of work and Industry 4.0. This extends beyond medical, entertainment, and even defense applications to aid in the training and preparation of military troops. Many of the breakthrough technologies seen in the 2G/3G/4G revolutions were developed by XCOM's leadership team, which included Dr. Paul Jacobs, Derek Aberle, and Matt Grob. As present infrastructure cannot keep up with the need for 5G and wireless infrastructure, there is a large demand for further growth and adoption of supporting technologies. Each "G" generation signifies an effort to increase wireless transmission speed, capacity, and overall value. This necessitates not only hardware and software improvements, but also the use of either frequency spectra in new and novel waves or very new frequency bands. The balance of energy, frequency, and transmission is one of several compromises. Higher frequency – and consequently energy signals – can transport more information in less time but degrade faster over distance. In terms of infrastructure, this implies that more transmitting "nodes" in the network are required to convey higher frequency signals over a given region. XCOM is developing technologies that will level the playing field. Their solutions aim to increase spectrum capacity and utility by more than tenfold, allowing the potential promised by 5G and next-generation developers to become a reality. XCOM, for example, is developing further to take digital transformation to the next level via extended reality (XR). They are building a high throughput, low latency wireless technology to enable seamless virtual reality (VR) and augmented reality (AR) experiences utilizing a globally accessible 60GHz millimeter wave spectrum. What was previously constrained by the necessity for heavy processing equipment nearby or the poor throughput of smartphone processing is now becoming a full system capable of immersing the user in a metaverse or digital world environment. This will be a significant advancement in the integration of edge computing processing to deliver a more natural user experience. The XCOM team is set on continuing our tradition of excellence and innovating in the wireless space. We understand how important high throughput/low latency is for the future of compute-heavy applications and are working to deliver those capabilities to create real and positive change in our world and industry applications. Our XR technologies are evidence of this progress and show that seamless processing through edge computing can deliver a truly immersive and agile VR/AR system fit for business, entertainment, and more." XCOM's Dr. Jacobs TDK Ventures shares XCOM's dedication to digital transformation for a better, more sustainable future. TDK Ventures will assist XCOM with scaling the effect of their technology by using their network connections, industry partners, and linking XCOM to other TDK business divisions. The platform team at TDK Ventures also offers early product validation, pilots, customer/channel/ecosystem access, market knowledge, operational experience (e.g., materials, manufacturing, fabless, supply chain), and go-to-market/branding coaching.

Read More

Wireless

Vislink Showcases Innovative 5G & Cloud-Based Wireless Solutions

Vislink | May 27, 2022

Vislink, a worldwide leader in the capture, distribution, and management of high quality, live video and data in the media & entertainment, law enforcement, and military industries, presented private network 5G technology during a sports event in the UK to illustrate its potential in broadcast. Vislink and Mobile Viewpoint's adoption heralds a revolution in remote production processes by extending bi-directional IP connections to the edge and allowing virtualized production in the cloud. Vislink's breakthroughs were on display at the Gallagher Premiership Rugby match between Saracens and the Northampton Saints at StoneX Stadium in London, where it backed a BT-led project to highlight the potential for 5G in broadcast contributions by connecting matchday cameras to a standalone private 5G network. In a UK first, this cameras' feed was included in BT Sport's live broadcasts of the match, a first for a customer broadcast. BT Media & Broadcast, BT Sport, Broadcast RF, and Neutral Wireless headed the project. Vislink installed private network 5G transmitters with COFDM technology to illustrate how 5G technology is growing to offer assured quality, low latency video from wireless cameras to give spectators realistic up-close camera views of the athletic event. Mobile Viewpoint's 5G-enabled encoders send camera feeds to the cloud across a secure, low-latency 5G private network and IP LAN. The director can pick camera feeds for the program stream fully in the cloud, utilizing BT Sport's virtualized production process. This cloud-based installation illustrates Mobile Viewpoint's capacity to bring new cost and operating advantages for distant manufacturing operations. Vislink's long-standing expertise in COFDM-based wireless technologies was bolstered last year with the inclusion of Mobile Viewpoint 5G technology capabilities. Vislink now has a best-of-breed portfolio of resilient and efficient solutions for a broad range of deployment situations thanks to the integration of these technologies. Following on from the world's first stand-alone private 5G network for sports broadcasting during the British MotoGP 2021 Grand Prix, this current public demonstration signals another step forward in the company's 5G wireless technology leadership. Vislink and Mobile Viewpoint showed the world's first glass-to-glass All-IP wireless and virtualized manufacturing during this experiment, which was arranged by BT Sport and BT Media & Broadcast. This momentous trial has now established the future course for live event streaming.

Read More

Network Infrastructure

Algeria Telecom Deploys NEC & Juniper Networks' 5G-Ready IP MTA

Algeria Telecom | May 31, 2022

NEC Corporation, a world's leading IT and network transformation service company, and Juniper Networks, a leader in secure, AI-driven networks, have worked with Algeria Telecom, the leader in the Algerian telecommunications market, to roll out its modernized, nationwide IP metro commercial network to support current demand for increased capacity and future 5G and FTTx requires. Algeria Telecom has a mid-term strategy objective to develop a homogenized, optimized transport network with automated capabilities to ensure bandwidth and future-proof its infrastructure in a rising market. NEC and Juniper implemented Algeria Telecom's next-generation IP metro network while maintaining quality of service and the greatest user experience. Algeria Telecom chose Juniper Networks' high-performing, security solutions for SDN-ready, cloud-grade networking and feature-rich, simple and secure connectivity at scale as the innovative foundation of its new platform. The access nodes create separate pre-aggregation, aggregation, and access domains for optimal reliability. Algeria Telecom implemented the Juniper Paragon Automation cloud-native solution package, Paragon Pathfinder and Paragon Planner, to get deep network insight and simplify operations. This ensures 5G and multicloud user experiences. All Juniper systems operate on Junos OS to deliver an easily managed, open solution. Mr. Adel Bentoumi, CEO of Algeria Telecom said that "The successful completion of the IP metro network modernization project by our partners, NEC Corporation and Juniper Networks, will allow us to make the migration to IPV6 and the initiation of digital transformation, as well as the implementation of high speed internet, as we best satisfy the needs of Algeria Telecom customers." The rapid growth of network traffic is a clear indication of the need for modernization and expansion of network capacity. NEC and Juniper have been extremely attentive to our needs, both technical and commercial, working as an extension of our team with their outstanding local engineering abilities, as well as their relentless efforts to assure quality of experience and on-time delivery. Overall, the innovative solutions from Juniper to enable this automated metro cloud architecture have helped us achieve our strategic goals and thrive as we pave the way for 5G.” AllahoumHocine, Head of IP Core, Algeria Telecom Brendan Gibbs, Senior Vice President, Automated WAN Solutions, Juniper Networks said that “Networks have always been a key asset for service providers, but going forward they will be the foundation for every aspect of business transformation in the 5G and cloud era. Algeria Telecom is jumping ahead of the curve by investing in an open, agile and automated network architecture that can drive simplified operations, improved economics and superior end-user experiences.”

Read More

Wireless

TDK Ventures Invests in XCOM Labs

TDK | May 30, 2022

TDK Corporation today announced that its subsidiary TDK Ventures, Inc. has decided to invest in wireless communications disruptor XCOM Labs to accelerate the development of their 5G and wireless communications solutions, which prioritize bandwidth capacity, latency reduction/elimination, and compute load balancing. XCOM is developing wireless technologies to allow smart manufacturing, automation, off-site training, and more immersive telework experiences in the future of work and Industry 4.0. This extends beyond medical, entertainment, and even defense applications to aid in the training and preparation of military troops. Many of the breakthrough technologies seen in the 2G/3G/4G revolutions were developed by XCOM's leadership team, which included Dr. Paul Jacobs, Derek Aberle, and Matt Grob. As present infrastructure cannot keep up with the need for 5G and wireless infrastructure, there is a large demand for further growth and adoption of supporting technologies. Each "G" generation signifies an effort to increase wireless transmission speed, capacity, and overall value. This necessitates not only hardware and software improvements, but also the use of either frequency spectra in new and novel waves or very new frequency bands. The balance of energy, frequency, and transmission is one of several compromises. Higher frequency – and consequently energy signals – can transport more information in less time but degrade faster over distance. In terms of infrastructure, this implies that more transmitting "nodes" in the network are required to convey higher frequency signals over a given region. XCOM is developing technologies that will level the playing field. Their solutions aim to increase spectrum capacity and utility by more than tenfold, allowing the potential promised by 5G and next-generation developers to become a reality. XCOM, for example, is developing further to take digital transformation to the next level via extended reality (XR). They are building a high throughput, low latency wireless technology to enable seamless virtual reality (VR) and augmented reality (AR) experiences utilizing a globally accessible 60GHz millimeter wave spectrum. What was previously constrained by the necessity for heavy processing equipment nearby or the poor throughput of smartphone processing is now becoming a full system capable of immersing the user in a metaverse or digital world environment. This will be a significant advancement in the integration of edge computing processing to deliver a more natural user experience. The XCOM team is set on continuing our tradition of excellence and innovating in the wireless space. We understand how important high throughput/low latency is for the future of compute-heavy applications and are working to deliver those capabilities to create real and positive change in our world and industry applications. Our XR technologies are evidence of this progress and show that seamless processing through edge computing can deliver a truly immersive and agile VR/AR system fit for business, entertainment, and more." XCOM's Dr. Jacobs TDK Ventures shares XCOM's dedication to digital transformation for a better, more sustainable future. TDK Ventures will assist XCOM with scaling the effect of their technology by using their network connections, industry partners, and linking XCOM to other TDK business divisions. The platform team at TDK Ventures also offers early product validation, pilots, customer/channel/ecosystem access, market knowledge, operational experience (e.g., materials, manufacturing, fabless, supply chain), and go-to-market/branding coaching.

Read More

Wireless

Vislink Showcases Innovative 5G & Cloud-Based Wireless Solutions

Vislink | May 27, 2022

Vislink, a worldwide leader in the capture, distribution, and management of high quality, live video and data in the media & entertainment, law enforcement, and military industries, presented private network 5G technology during a sports event in the UK to illustrate its potential in broadcast. Vislink and Mobile Viewpoint's adoption heralds a revolution in remote production processes by extending bi-directional IP connections to the edge and allowing virtualized production in the cloud. Vislink's breakthroughs were on display at the Gallagher Premiership Rugby match between Saracens and the Northampton Saints at StoneX Stadium in London, where it backed a BT-led project to highlight the potential for 5G in broadcast contributions by connecting matchday cameras to a standalone private 5G network. In a UK first, this cameras' feed was included in BT Sport's live broadcasts of the match, a first for a customer broadcast. BT Media & Broadcast, BT Sport, Broadcast RF, and Neutral Wireless headed the project. Vislink installed private network 5G transmitters with COFDM technology to illustrate how 5G technology is growing to offer assured quality, low latency video from wireless cameras to give spectators realistic up-close camera views of the athletic event. Mobile Viewpoint's 5G-enabled encoders send camera feeds to the cloud across a secure, low-latency 5G private network and IP LAN. The director can pick camera feeds for the program stream fully in the cloud, utilizing BT Sport's virtualized production process. This cloud-based installation illustrates Mobile Viewpoint's capacity to bring new cost and operating advantages for distant manufacturing operations. Vislink's long-standing expertise in COFDM-based wireless technologies was bolstered last year with the inclusion of Mobile Viewpoint 5G technology capabilities. Vislink now has a best-of-breed portfolio of resilient and efficient solutions for a broad range of deployment situations thanks to the integration of these technologies. Following on from the world's first stand-alone private 5G network for sports broadcasting during the British MotoGP 2021 Grand Prix, this current public demonstration signals another step forward in the company's 5G wireless technology leadership. Vislink and Mobile Viewpoint showed the world's first glass-to-glass All-IP wireless and virtualized manufacturing during this experiment, which was arranged by BT Sport and BT Media & Broadcast. This momentous trial has now established the future course for live event streaming.

Read More

Events