Triple J turns to Hostworks for Hottest 100 streaming
- 25 January, 2013 09:00
When listeners tune into the ABC’s Triple J Hottest 100 countdown online on Australia Day, managed service provider Hostworks will be ensuring that fans won’t encounter streaming delays or dropouts.
The countdown, based on listener’s votes from Triple J, plays the top 100 songs of 2012 from 12pm Australian Eastern Standard Time (AEST) through to around 8pm. According to ABC data from last year, 26,000 people tuned in via the Internet from around Australia and countries such as New Zealand, the UK, China and Canada.
Hostworks provided the streaming service using its Shoutcast server and elastic cloud compute platform for the 2012 countdown. The deal with Triple J came about as a result of the company’s partnership with the ABC iview streaming service.
Speaking to Computerworld Australia, Hostworks general manager of technology, strategy and innovation, Adrian Britton said there will be a dedicated team of employees undertaking a “pre-flight” check of its systems to make sure there are no issues when the Hottest 100 begins.
“As the Triple J countdown streaming is running they will be dedicated to watching the metrics flowing through the system and watching the analytics flowing back to ensure a smooth operation,” he said. This service will be provided through the company’s customer management centre in Adelaide.
“The advantage of using the elastic compute platform [in 2012] was that we could grow the infrastructure behind the scenes in real time,” he said. “As the Hottest 100 was running, the platform added additional infrastructure as the audience grew.”
After last year's countdown, Hostworks provided listener demographics data to the radio station. According to Britton, most listeners streamed the service using their mobile phones with a large quantity of mobile traffic coming from Apple iOS devices.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Securing the Promise of Virtualisation
For today’s enterprise, this whitepaper identifies three general areas of risk associated with risk; those that are traditionally areas of risk, the hazards that are exclusive to virtualisation and the more recent set of risks that are associated with newly formed hybrid environments. Read more to find out how to keep pace with evolving threats, quicker provisioning and dynamically mobile workloads.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
HP Helps NEC Reduce Network Management Costs and Gain Efficiencies
NEC wanted to reduce network management costs, while increasing network visibility, decreasing mean-time-to-repair, improving stability and mitigating the risk of downtime. Download today to hear from Cameron Craig, Senior department manager of NEC on what approach they took and why.