All Blogs About Precision Timing

By Murat Demirbas
 

A key component of distributed coordination is the enforcement of consistent views at all nodes for the ordering of significant events. To this end, events are "timestamped" with logical counters or — increasingly lately — with tightly-synchronized physical time.

By Edouard Alligand, CEO, quasarDB
 
Becoming fully compliant with regulations like MiFID and FINRA involves more than simply installing the equipment to time-synch your data. There are three other key areas to pay attention to, all of which require confidence in the underlying database that your software relies upon.
By Terry Roche
 

New regulations from MiFID II in Europe to the Consolidated Audit Trail in the US mandate that reportable events must be timestamped to much more accurate levels than ever before.

By Jeremy Onyan, Director of Time Sensitive Networks
 

Precision time can play a vital role in improving the operation and efficiency of Big Data systems. However, to understand why or how time can be utilized, the most important thing to understand is that – Big Data is big.

By Lisa Perdue, Product Manager
 
GPS week zero started January 6, 1980. The 1024 weeks counter ran out and rolled over on August 21, 1999. The week counter then reset to zero, and it has been recounting ever since. The next time the counter will reach week 1023 and rollover to zero is on April 6, 2019.
By Jeremy Onyan, Director of Time Sensitive Networks
 
Because financial trades today are executed faster than a human can blink and the volume is overwhelming, monitoring everything in real time is virtually impossible.  MiFID is a widely encompassing set of regulations aimed at thwarting financial market abuse, and it includes important requirements for maintaining highly accurate timestamps.
By Jeremy Onyan, Director of Time Sensitive Networks
 
As e-commerce continues to grow, so does the threat from hackers and cyber criminals, who are constantly looking for ways to exploit systems to gain access to customer data. To help combat this threat, and ensure systems are protected against attacks, the major credit card vendors have established the Payment Card Industry Data Security Standard (PCI DSS).
By John Fischer, VP, Advanced R&D
 

The increasing reliance on GNSS signals for positioning, navigation and timing applications across different industries has raised questions about GNSS vulnerabilities and how to address them. We sat down with John Fischer, Spectracom’s chief technology officer, to talk to him about Resilient PNT (also known as Assured PNT and Alternative PNT) and its implications for today’s GPS/GNSS systems.  This continues from Part 1 of John Fischer's Resilient PNT FAQ.

By John Fischer, VP, Advanced R&D
 

The increasing reliance on GNSS signals for positioning, navigation and timing applications across different industries has raised questions about GNSS vulnerabilities and how to address them. We sat down with John Fischer, Spectracom’s chief technology officer, to talk to him about Resilient PNT (also known as Assured PNT and Alternative PNT) and its implications for today’s GPS/GNSS systems.

By Lisa Perdue, Product Manager
 

If you have a mission-critical application that demands the highest level of protection, you’re a candidate for an STL-based system. Satellite Time and Location, or STL, is a system that augments GNSS or serves as a backup to GNSS in critical systems.

Pages