NRG Media Has Embraced AI-Based Tools
AI is used to create videos, develop prospects, write emails and run an air...
Update your browser to view this website correctly. Update my browser now
AI is used to create videos, develop prospects, write emails and run an air...
Report that helps stations assess their metadata includes fresh market audits
Company addresses issue of FEMA signing certificates
Greg Ogonowski says it’s time to reinvent, using better tools
The FCC is seeking nominations for the next advisory group
Commission examined cybersecurity for public warning systems
LeGeyt: “Broadcasters’ expressive content is particularly valuable for AI ingestion precisely because it is...
Dan Grimes describes the setup at SOS Radio Network
Users avoid hardware upgrades and always have access to the latest version
A new publication from the National Radio Systems Committee provides metadata guidelines for streaming...
The tech company says the product has expanded and the new name is more...
Rule No. 1: Make it easy for listeners to hear your station online
A core product can evolve as needed with extra “service” features
Halin of NeoGroupe says users are getting more comfortable with security
California LPFM station adds a security solution from Atsign
A special report on how radio technology continues to move to the service model
Don’t be lulled into thinking out-of-date systems can protect you
Amazon recently announced the availability of the Alexa Radio Skills Kit, or RSK, console...
IT is great but it's still the RF signal that matters most
Anstandig expects the tool to be on-air “at hundreds of stations” this year
NAB says it will help with security and eliminate need for specific hardware
At Northwestern Media, Murphey preaches redundancy in network infrastructure
They are taking on a whole new role in our broadcast infrastructure
Spinning up instances from your TOC server can be your gateway to the cloud
We conclude our series with a look at Simple Network Management Protocol
“Well-intentioned, albeit unjustified, solutions in search of a problem”
Don’t shoot from the hip, approach this challenge in an organized way
Get to know CIA, DiD, PoLP, MFA and other key concepts
Daunted? Let the application requirements guide you
What to know about this protocol for transport of real-time data
It allows many more unique addresses, but there are other benefits too
A clever ploy got past me and my client, but not for long
It is the fundamental building block of your network
Wayne Pecena begins a series on useful concepts
Free or inexpensive options abound for accessing your systems remotely
Pecena reminds us that threats may change but danger never goes away
Taking care of the small things can greatly reduce your exposure to hacks
A new form of virtualization is here; it’s called software containerization
Practical ways to step into a more cloud-like operation without going all in