Triple J turns to Hostworks for Hottest 100 streaming
- 25 January, 2013 09:00
When listeners tune into the ABC’s Triple J Hottest 100 countdown online on Australia Day, managed service provider Hostworks will be ensuring that fans won’t encounter streaming delays or dropouts.
The countdown, based on listener’s votes from Triple J, plays the top 100 songs of 2012 from 12pm Australian Eastern Standard Time (AEST) through to around 8pm. According to ABC data from last year, 26,000 people tuned in via the Internet from around Australia and countries such as New Zealand, the UK, China and Canada.
Hostworks provided the streaming service using its Shoutcast server and elastic cloud compute platform for the 2012 countdown. The deal with Triple J came about as a result of the company’s partnership with the ABC iview streaming service.
Speaking to Computerworld Australia, Hostworks general manager of technology, strategy and innovation, Adrian Britton said there will be a dedicated team of employees undertaking a “pre-flight” check of its systems to make sure there are no issues when the Hottest 100 begins.
“As the Triple J countdown streaming is running they will be dedicated to watching the metrics flowing through the system and watching the analytics flowing back to ensure a smooth operation,” he said. This service will be provided through the company’s customer management centre in Adelaide.
“The advantage of using the elastic compute platform [in 2012] was that we could grow the infrastructure behind the scenes in real time,” he said. “As the Hottest 100 was running, the platform added additional infrastructure as the audience grew.”
After last year's countdown, Hostworks provided listener demographics data to the radio station. According to Britton, most listeners streamed the service using their mobile phones with a large quantity of mobile traffic coming from Apple iOS devices.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
Endpoint Protection Overview
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection is now ineffective due to the sheer volume, quality, and complexity of malware. This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionising endpoint protection and solving the issues that hinder existing endpoint security solutions. Download now.
In Control at Layer 2: A Tectonic Shift in Network Security
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.