Wowza live transcoding using NVIDIA NVENC hardware accleration

Live transcoding is a CPU consuming process and if you are transcoding/transrating multiple live streams, you need GPU support to manage the load of the server. Recently I got a live transcoding task to do using AWS Ec2 instances. AWS provides two types of GPU based instances (at the time of writing)

Keep reading →

Wowza live transcoding using Intel QuickSync enabled processor

In general on fly live transcoding requires more compute cycles for converting multiple bitrate live streaming. After some research, I found a suitable motherboard and Intel quicksync processor for Wowza Streaming Engine live transcoding for one of my project.

I have compiled Wowza with Intel quicksync successfully on linux and now I can see drastic changes in cpu consumption. It almost reduced to 50% from actual usage.
Keep reading →

Install Openshift Client tools on Ubuntu 14.04

I was trying to install openshift client tools on my new ubuntu 14.04, but I couldn’t install it using this guide. So I was searching the package “rubygems”. After few googling, I landed this page , “This package provides Rubygems for Ruby 1.8. In Ruby 1.9.X, Rubygems is provided with the interpreter”. i.e  The package name is “rubygems-integration”
Keep reading →

Out of Service & In Service – AWS EC2 Instances on AWS Elastic Loadbalancer

I’m having a personal website hosted at AWS EC2 with ELB. Today I have started my AWS EC2 instances (I had turned off due to non usage and Of course, I can save some cost) and tried to load my website via AWS Elastic loadbalancer public dns url but it was not coming up in my browser, instead of webpage I got a blank white page. So I checked my AWS EC2 instances and ELB services.

Keep reading →

AWS EC2 Security Best Practices

Amazon EC2 best security practice methods to follow

AWS EC2 – Security Group

The Security Group in AWS Ec2 is acting as a firewall. By default security group block all ports. You need to specify the port numbers in the security group to open. It is a good security practice to open ports for a specific network instead of open network (
By this method you can block unwanted access from unwanted networks.
Keep reading →