Radar has landed - discover the latest DDoS attack trends. Get ahead, stay protected.Get the report
Under attack?

Products

Solutions

Resources

Partners

Why Gcore

  1. Home
  2. Blog
  3. How to Implement Noise Reduction in WebRTC Apps

How to Implement Noise Reduction in WebRTC Apps

  • By Gcore
  • October 26, 2023
  • 6 min read
How to Implement Noise Reduction in WebRTC Apps

Unwanted background noise, such as a barking dog or a neighbor’s drill, can disrupt work and personal video calls alike, hampering effective communication and causing frustration to participants. In response, platforms like Google Meet, Microsoft Teams, and Discord use AI-based, cloud-based denoising algorithms—but these solutions often require sending audio data to external servers for processing, demanding significant server resources and introducing additional latency. This article will explore alternatives for enhancing audio quality without compromising performance or increasing cost.

WebRTC Noise Reduction Solutions

To combat disruptive background noises in WebRTC applications, like voice calls and video conferences, two categories of noise reduction methods are available: software and hardware. In this article, we won’t tackle hardware-specific solutions, like Nvidia RTX Voice, as they depend heavily on the end-user’s hardware. Instead, let’s look at some software approaches that can be applied more universally. Software solutions vary from simple noise gate to advanced machine learning algorithms that isolate and remove ambient sounds.

OS Native Noise Cancellation

Many modern operating systems include built-in noise cancellation features within system settings, for example, Microsoft Windows offers Voice Capture DSP, and MacOS offers the Voice Isolation feature in Ventura 13. Here’s how to find and manage this feature in various operating systems.

Windows

  1. Open the Sound settings by right-clicking the speaker icon in the taskbar and choosing Open Sound settings.
  2. Click on Device properties for your microphone and select Additional device properties.
  3. Find the Enhancements tab.
  4. Check the Noise cancellation box to enable the feature.

macOS

For a video call:

  1. Click the “Video” button in the menu bar.
  2. Click the down arrow next to the microphone icon.
  3. Click the right arrow next to “Mic Mode.”
  4. Select “Voice Isolation.”

For an audio call in the FaceTime app:

  1. Click the “Audio” button in the menu bar.
  2. Select “Voice Isolation.”

Linux

Noise cancellation is available on Linux, usually through the PulseAudio sound server or Cadmus application, but exact steps may vary with your specific Linux distribution.

Pros and Cons of Native Noise Cancellation

Native noise reduction has both advantages and drawbacks.

Pros:

  • Once enabled, the feature is always on making it seamless and convenient for users who may not be tech-savvy.
  • Processing happens locally, reducing server load and potentially lowering costs for service providers which can be passed on to end users.

Cons:

  • Not as effective filtering ambient noise compared to more specialized methods.
  • CPU-intensive, which could slow down other local applications or tasks running on the system—especially problematic for older devices with limited computing resources.
  • Availability is inconsistent across different operating system versions. For instance, a feature present in the latest version of Windows might not be in older versions, creating a fragmented user experience.

Basic In-Browser Software Solution

In web-based applications, developers can easily activate a basic noise suppression feature by adding the constraint noiseSuppression = true when calling the method that captures an audio stream from the user’s browser. This one-step process works across multiple browsers and requires no manual setup from the end user. You can find further details in the browser’s official documentation.

Pros and Cons of In-Browser Software Solutions

This method also has its advantages and drawbacks.

Pros:

  • Easy to implement.
  • Widespread browser support makes this an accessible option for many users.
  • Processing happens locally, reducing server load and potentially lowering costs for service providers which can be passed on to end users.

Cons:

  • Not as effective filtering ambient noise compared to more specialized methods.
  • Browsers nowadays are resource intensive, and these solutions add more stress to the CPU, potentially resulting in serious performance issues like overheating, stuttering, or machine freezes.
  • Lack of support in Safari limits the reach of this solution among macOS and iOS users.
  • Only works within browsers, not for other non-browser applications.

Server-Side Solutions

Server-side solutions provide a powerful approach to noise reduction by processing audio streams directly on the server rather than on the client side. This method is particularly effective in applications that employ either a Multipoint Control Unit (MCU) or a Selective Forwarding Unit (SFU). An MCU blends multiple streams into a unified output, enhancing audio quality, while an SFU routes individual video streams to participants without merging them. This allows for optimized audio quality across various communication setups.

Pros and Cons of Server-Side Solutions

The server-side approach has its own advantages and challenges.

Pros:

  • Advanced noise suppression algorithms are available for superior audio quality, and can be sourced from projects like the DNS Challenge.
  • Option to aggregate multiple audio streams into a single processed stream for efficient delivery to end users, improving user experience.
  • Relieves the user’s device from additional audio processing load.

Cons:

  • Requires substantial server computational power, complicating system architecture and increasing the costs associated with server maintenance.
  • Expenses scale with the number of users, making it less economical for larger deployments and therefore not suitable for all use cases.

RNNoise: Gcore’s Choice

Following a rigorous evaluation process that involved real-world scenarios, we’ve opted to use RNNoise for our Real-Time Video and WebRTC product. Written in C and built on a recurrent neural network, it can easily be compiled into WebAssembly (Wasm) using the Emscripten compiler and integrated into your WebRTC application.

Our team found RNNoise to be the optimal choice for the following reasons:

  • Broad-spectrum noise elimination. RRNoise’s effectiveness is rooted in its extensive training on a diverse array of real-world noise conditions, enabling it to reduce all kinds of background noise.
  • Resource efficiency. The algorithm’s low CPU usage ensures it’s suitable for real-time applications and a broad spectrum of devices, including smartphones, tablets, and laptops.
  • Open-source flexibility. Being open-source, RNNoise allows for customization and control—valuable for organizations looking to fine tune their noise-cancellation solutions.

These attributes made RNNoise a compelling choice in our quest to improve audio quality across our services. Here are some examples:

This is an audio sample with street ambient noises:

And that’s what you will hear with RNNoise enabled:

Another test sample with vacuum cleaner running on the background:

And the same audio sample after RNNoise:

As you can hear, both samples sound much clearer with RNNoise enabled.

Pros and Cons of RNNoise

Let’s summarize RNNoise’s pros and cons.

Pros:

  • Offers real-time, high-quality noise suppression.
  • Relatively low CPU usage, especially beneficial for older or less powerful devices.
  • Audio data is processed directly on the end user’s device, potentially resulting in cost savings for the service provider.
  • Allows for WebAssembly compilation, making it feasible for client-side implementation.

Cons:

  • RNNoise technology dates from 2018, so it may not include the most recent advancements in noise suppression.
  • While effective for general use, RNNoise might lack some advanced features available in proprietary solutions.

How to Integrate RNNoise Into the WebRTC Web Apps

Here’s how to integrate RNNoise into a WebRTC web application:

1. Compile C Source Code to WASM Using Emscripten

To compile C sources to WASM, use Emscripten compiler. The following script compiles librnnoise into a WASM module encapsulated in a JavaScript file:

if [[ `uname` == "Darwin" ]]; thenSO_SUFFIX="dylib"elseSO_SUFFIX="so"fiemcc \-Os \-g2 \-s ALLOW_MEMORY_GROWTH=1 \-s MALLOC=emmalloc \-s MODULARIZE=1 \-s ENVIRONMENT="web,worker" \-s EXPORT_ES6=1 \-s USE_ES6_IMPORT_META=1 \-s WASM_ASYNC_COMPILATION=0 \-s SINGLE_FILE=1 \-s EXPORT_NAME=createRNNWasmModuleSync \-s EXPORTED_FUNCTIONS="[’_rnnoise_process_frame’, ’_rnnoise_init’, ’_rnnoise_destroy’, ’_rnnoise_create’, ’_malloc’, ’_free’]" \.libs/librnnoise.${SO_SUFFIX} \-o ./rnnoise-sync.js

This will generate a JavaScript file called rnnoise-sync.js that contains the compiled WASM module.

You can integrate WASM-compiled C code into your WebRTC application for audio processing, efficiently handle frame size mismatches, and manage data transfer between WASM and JavaScript environments.

Now, let’s turn to setting up an audio processing pipeline using Web Audio API. This process comprises steps 2–4.

2. Create Audio Processing Node

Create an audio processing node using the Web Audio API. Each node corresponds to an audio processor class where the actual processing occurs. Given that the only effect you want to apply is noise suppression, one processing node will suffice. In this node we import rnnoise-sync.js to make RNNoise methods available in our JS environment.

The data process will then work as follows:

  • Audio samples are received from an audio device, with 128 samples per frame.
  • These samples are buffered until they reach the required 480 samples for RNNoise processing.
  • The accumulated samples are transferred to the heap and processed by RNNoise.
  • Once processed, the samples are returned to the buffer.
  • The buffer sends 128 samples per frame to the audio output.

3. Buffering

The processing node gets a frame of 128 samples per one process method call. In other words, the process method gets an array of 128 32-bit floating-point values—this is the input that needs to be processed.

Since Web Audio API’s process method operates on 128-sample frames and RNNoise expects 480-sample frames as an input, you’ll face a frame size mismatch—a common issue for audio processing engineers. To solve this problem, incorporate a circular buffer design pattern. Use the GoogleChromeLabs’ implementation algorithm as a basis.

4. Data Exchange

As the audio processing pipelineis written in JavaScript, while RNNoise is written in C, communication must be established between these environments. To manage data exchange between the JavaScript and Wasm environments, use a heap allocated by the malloc method generated by Emscripten. Float32Array is used for storing audio samples, requiring 4 bytes per sample. Therefore, to accommodate 480 samples (the RNNoise frame size), a heap size of 1920 bytes, or (480 * Float32Array.BYTES_PER_ELEMENT) must be allocated.

Conclusion

Effective noise suppression can make or break the quality of video conferences. RNNoise offers an effective balance of noise elimination and computational efficiency, making it an ideal choice for real-time applications. At Gcore, we use this technology to enhance our WebRTC solution, elevating the audio quality of your virtual interactions.

Curious to experience superior audio quality in your video? Explore Gcore Real-Time Video & WebRTC to find out how we can customize your experience.

Discover Gcore’s WebRTC

Related articles

How gaming studios can use technology to safeguard players

Online gaming can be an enjoyable and rewarding pastime, providing a sense of community and even improving cognitive skills. During the pandemic, for example, online gaming was proven to boost many players’ mental health and provided a vital social outlet at a time of great isolation. However, despite the overall benefits of gaming, there are two factors that can seriously spoil the gaming experience for players: toxic behavior and cyber attacks.Both toxic behavior and cyberattacks can lead to players abandoning games in order to protect themselves. While it’s impossible to eradicate harmful behaviors completely, robust technology can swiftly detect and ban bullies as well as defend against targeted cyberattacks that can ruin the gaming experience.This article explores how gaming studios can leverage technology to detect toxic behavior, defend against cyber threats, and deliver a safer, more engaging experience for players.Moderating toxic behavior with AI-driven technologyToxic behavior—including harassment, abusive messages, and cheating—has long been a problem in the world of gaming. Toxic behavior not only affects players emotionally but can also damage a studio’s reputation, drive churn, and generate negative reviews.The online disinhibition effect leads some players to behave in ways they may not in real life. But even when it takes place in a virtual world, this negative behavior has real long-term detrimental effects on its targets.While you can’t control how players behave, you can control how quickly you respond.Gaming studios can implement technology that makes dealing with toxic incidents easier and makes gaming a safer environment for everyone. While in the past it may have taken days to verify a complaint about a player’s behavior, today, with AI-driven security and content moderation, toxic behavior can be detected in real time, and automated bans can be enforced. The tool can detect inappropriate images and content and includes speech recognition to detect derogatory or hateful language.In gaming, AI content moderation analyzes player interactions in real time to detect toxic behavior, harmful content, and policy violations. Machine learning models assess chat, voice, and in-game media against predefined rules, flagging or blocking inappropriate content. For example, let’s say a player is struggling with in-game harassment and cheating. With AI-powered moderation tools, chat logs and gameplay behavior are analyzed in real time, identifying toxic players for automated bans. This results in healthier in-game communities, improved player retention, and a more pleasant user experience.Stopping cybercriminals from ruining the gaming experienceAnother factor negatively impacting the gaming experience on a larger scale is cyberattacks. Our recent Radar Report showed that the gaming industry experienced the highest number of DDoS attacks in the last quarter of 2024. The sector is also vulnerable to bot abuse, API attacks, data theft, and account hijacking.Prolonged downtime damages a studio’s reputation—something hackers know all too well. As a result, gaming platforms are prime targets for ransomware, extortion, and data breaches. Cybercriminals target both servers and individual players’ personal information. This naturally leads to a drop in player engagement and widespread frustration.Luckily, security solutions can be put in place to protect gamers from this kind of intrusion:DDoS protection shields game servers from volumetric and targeted attacks, guaranteeing uptime even during high-profile launches. In the event of an attack, malicious traffic is mitigated in real-time, preventing zero downtime and guaranteeing seamless player experiences.WAAP secures game APIs and web services from bot abuse, credential stuffing, and data breaches. It protects against in-game fraud, exploits, and API vulnerabilities.Edge security solutions reduce latency, protecting players without affecting game performance. The Gcore security stack helps ensure fair play, protecting revenue and player retention.Take the first steps to protecting your customersGaming should be a positive and fun experience, not fraught with harassment, bullying, and the threat of cybercrime. Harmful and disruptive behaviors can make it feel unsafe for everyone to play as they wish. That’s why gaming studios should consider how to implement the right technology to help players feel protected.Gcore was founded in 2014 with a focus on the gaming industry. Over the years, we have thwarted many large DDoS attacks and continue to offer robust protection for companies such as Nitrado, Saber, and Wargaming. Our gaming specialization has also led us to develop game-specific countermeasures. If you’d like to learn more about how our cybersecurity solutions for gaming can help you, get in touch.Speak to our gaming solutions experts today

How to choose the right technology tools to combat digital piracy

One of the biggest challenges facing the media and entertainment industry is digital piracy, where stolen content is redistributed without authorization. This issue causes significant revenue and reputational losses for media companies. Consumers who use these unregulated services also face potential threats from malware and other security risks.Governments, regulatory bodies, and private organizations are increasingly taking the ramifications of digital piracy seriously. In the US, new legislation has been proposed that would significantly crack down on this type of activity, while in Europe, cloud providers are being held liable by the courts for enabling piracy. Interpol and authorities in South Korea have also teamed up to stop piracy in its tracks.In the meantime, you can use technology to help stop digital piracy and safeguard your company’s assets. This article explains anti-piracy technology tools that can help content providers, streaming services, and website owners safeguard their proprietary media: geo-blocking, digital rights management (DRM), secure tokens, and referrer validation.Geo-blockingGeo-blocking (or country access policy) restricts access to content based on a user’s geographic location, preventing unauthorized access and limiting content distribution to specific regions. It involves setting rules to allow or deny access based on the user’s IP address and location in order to comply with regional laws or licensing agreements.Pros:Controls access by region so that content is only available in authorized marketsHelps comply with licensing agreementsCons:Can be bypassed with VPNs or proxiesRequires additional security measures to be fully effectiveTypical use cases: Geo-blocking is used by streaming platforms to restrict access to content, such as sports events or film premieres, based on location and licensing agreements. It’s also helpful for blocking services in high-risk areas but should be used alongside other anti-piracy tools for better and more comprehensive protection.Referrer validationReferrer validation is a technique that checks where a content request is coming from and prevents unauthorized websites from directly linking to and using content. It works by checking the “referrer” header sent by the browser to determine the source of the request. If the referrer is from an unauthorized domain, the request is blocked or redirected. This allows only trusted sources to access your content.Pros:Protects bandwidth by preventing unauthorized access and misuse of resourcesGuarantees content is only accessed by trusted sources, preventing piracy or abuseCons:Can accidentally block legitimate requests if referrer headers are not correctly sentMay not work as intended if users access content via privacy-focused methods that strip referrer data, leading to false positivesTypical use cases: Content providers commonly use referrer validation to prevent unauthorized streaming or hotlinking, which involves linking to media from another website or server without the owner’s permission. It’s especially useful for streamers who want to make sure their content is only accessed through their official platforms. However, it should be combined with other security measures for more substantial protection.Secure tokensSecure tokens and protected temporary links provide enhanced security by granting temporary access to specific resources so only authorized users can access sensitive content. Secure tokens are unique identifiers that, when linked to a user’s account, allow them to access protected resources for a limited time. Protected temporary links further restrict access by setting expiration dates, meaning the link becomes invalid after a set time.Pros:Provides a high level of security by allowing only authorized users to access contentTokens are time-sensitive, which prevents unauthorized access after they expireHarder to circumvent compared to traditional password protection methodsCons:Risk of token theft if they’re not managed or stored securelyRequires ongoing management and rotation of tokens, adding complexityCan be challenging to implement properly, especially in high-traffic environmentsTypical use cases: Streaming platforms use secure tokens and protected temporary links so only authenticated users can access premium content, like movies or live streams. They are also useful for secure file downloads or limiting access to exclusive resources, making them effective for protecting digital content and preventing unauthorized sharing or piracy.Digital rights managementDigital rights management (DRM) refers to a set of technologies designed to protect digital content from unauthorized use so that only authorized users can access, copy, or share it, according to licensing agreements. DRM uses encryption, licensing, and authentication mechanisms to control access to digital resources so that only authorized users can view or interact with the content. While DRM offers strong protection against piracy, it comes with higher complexity and setup costs than other security methods.Pros:Robust protection against unauthorized copying, sharing, and piracyHelps safeguard intellectual property and revenue streamsEnforces compliance with licensing agreementsCons:Can be complex and expensive to implementMay cause inconvenience for users, such as limiting playback on unauthorized devices or restricting sharingPotential system vulnerabilities or compatibility issuesTypical use cases: DRM is commonly used by streaming services to protect movies, TV shows, and music from piracy. It can also be used for e-books, software, and video games, ensuring that content is only used by licensed users according to the terms of the agreement. DRM solutions can vary, from software-based solutions for media files to hardware-based or cloud-based DRM for more secure distribution.Protect your content from digital piracy with GcoreDigital piracy remains a significant challenge for the media and entertainment industry as it poses risks in terms of both revenue and security. To combat this, partnering with a cloud provider that can actively monitor and protect your digital assets through advanced multi-layer security measures is essential.At Gcore, our CDN and streaming solutions give rights holders peace of mind that their assets are protected, offering the features mentioned in this article and many more besides. We also offer advanced cybersecurity tools, including WAAP (web application and API protection) and DDoS protection, which further integrate with and enhance these security measures. We provide trial limitations for streamers to curb piracy attempts and respond swiftly to takedown requests from rights holders and authorities, so you can rest assured that your assets are in safe hands.Get in touch to learn more about combatting digital piracy

The latest updates for Gcore Video Streaming: lower latency, smarter AI, and seamless scaling

At Gcore, we’re committed to continuous innovation in video streaming. This month, we’re introducing significant advancements in low-latency streaming, AI-driven enhancements, and infrastructure upgrades, helping you deliver seamless, high-quality content at scale.Game-changing low-latency streamingOur latest low-latency live streaming solutions are now fully available in production, delivering real-time engagement with unmatched precision:WebRTC to HLS/DASH: Now in production, enabling real-time transcoding and delivery for WebRTC streams using HTTP-based LL-HLS and LL-DASH.LL-DASH with two-second latency: Optimized for ultra-fast content delivery via our global CDN, enabling minimal delay for seamless streaming.LL-HLS with three-second latency: Designed to deliver an uninterrupted and near-real-time live streaming experience.Gcore’s live streaming dashboard with OBS Studio integration, enabling real-time transcoding and delivery with low-latency HLS/DASHWhat this means for youWith glass-to-glass latency as low as 2–3 seconds, these advancements unlock new possibilities for real-time engagement. Whether you’re hosting live auctions, powering interactive gaming experiences, or enabling seamless live shopping, Gcore Video Streaming’s low-latency options keep your viewers connected without delay.Our solution integrates effortlessly with hls.js, dash.js, native Safari support, and our HTML web player, guaranteeing smooth playback across devices. Backed by our global CDN infrastructure, you can count on reliable, high-performance streaming at scale, no matter where your audience is.Exciting enhancements: AI and live streaming featuresWe’re making live streaming smarter with cutting-edge AI capabilities:Live stream recording with overlays: Record live streams while adding dynamic overlays such as webcam pop-ups, chat, alerts, advertisement banners, and time or weather widgets. This feature allows you to create professional, branded content without post-production delays. Whether you’re broadcasting events, tutorials, or live commerce streams, overlays help maintain a polished and engaging viewer experience.AI-powered VOD subtitles: Advanced AI automatically generates and translates subtitles into more than 100 languages, helping you expand your content’s reach to global audiences. This ensures accessibility while improving engagement across different regions.Deliver seamless live experiences with GcoreOur commitment to innovation continues, bringing advancements to enhance performance, efficiency, and streaming quality. Stay tuned for even lower latency and more AI-driven enhancements coming soon!Gcore Video Streaming empowers you to deliver seamless live experiences for auctions, gaming, live shopping, and other real-time applications. Get reliable, high-performance content delivery—whether you’re scaling to reach global audiences or delivering unique experiences to niche communities.Try Gcore Video Streaming today

How we optimized our CDN infrastructure for paid and free plans

At Gcore, we’re dedicated to delivering top-tier performance and reliability. To further enhance performance for all our customers, we recently made a significant change: we moved our CDN free-tier customers to a separate, physically isolated infrastructure. By isolating free-tier traffic, customers on paid plans receive uninterrupted, premium-grade service, while free users benefit from an environment tailored to their needs.Why we’ve separated free and paid plan infrastructureThis optimization has been driven by three key factors: performance, stability and scalability, and improved reporting.Providing optimal performanceFree-tier users are essential to our ecosystem, helping to stress-test our systems and extend our reach. However, their traffic can be unpredictable. By isolating free traffic, we provide premium customers with consistently high performance, minimizing disruption risks.Enhancing stability and scalabilityWith separate infrastructures, we can better manage traffic spikes and load balancing without impacting premium services. This improves overall platform stability and scalability, guaranteeing that both customer groups will enjoy a reliable experience.Improving reporting and performance insightsAlongside infrastructure enhancements, we’ve upgraded our reports page to offer clearer visibility into traffic and performance:New 95th percentile bandwidth graph: Helps users analyze traffic patterns more effectively.Improved aggregated bandwidth view: Makes it easier to assess usage trends at a glance.These tools empower you to make more informed decisions with accurate and accessible data.95th percentile bandwidth usage over the last three months, highlighting a significant increase in January 2025Strengthening content delivery with query string forwardingWe’ve also introduced a standardized query string forwarding feature to boost content delivery stability. By replacing our previous custom approach, we achieved the following:Increased stability: Reducing the risk of disruptionsLower maintenance requirements: Freeing up engineering resourcesSmoother content delivery: Enhancing experiences for streaming and content-heavy applicationsQuery string forwarding settings allow seamless parameter transfer for media deliveryWhat this means for our customersFor customers on paid plans: You can expect a more stable, high-performance service without the disruptions caused by fluctuating free-tier activity. Enhanced reporting and streamlined content delivery also empower you to make better, data-driven decisions.For free-tier customers: You will continue to have access to our services on a dedicated infrastructure that has been specifically optimized for your needs. This setup allows us to innovate and improve performance without compromising service quality.Strengthening Gcore CDN for long-term growthAt Gcore, we continuously refine our CDN to enable top-tier performance, reliability, and scalability. The recent separation of free-tier traffic, improved reporting capabilities, and optimized content delivery are key to strengthening our infrastructure. These updates enhance service quality for all users, minimizing disruptions and improving traffic management.We remain committed to pushing the boundaries of CDN efficiency, delivering faster load times, robust security, and seamless scalability. Stay tuned for more enhancements as we continue evolving our platform to meet the growing demands of businesses worldwide.Explore Gcore CDN

Introducing low-latency live streams with LL-HLS and LL-DASH

We are thrilled to introduce low-latency live streams for Gcore Video Streaming using LL-HLS and LL-DASH protocols. With a groundbreaking glass-to-glass delay of just 2.2–3.0 seconds, this improvement brings unparalleled speed to your viewers’ live-streaming experience.Alt: Video illustrating the workflow of low-latency live streaming using LL-HLS and LL-DASH protocolsThis demonstration shows the minimal latency of our live streaming solution—just three seconds between the original broadcast (left) and what viewers see online (right).Key use cases and benefits of low-latency streamingOur low-latency streaming solutions address the specific needs of content providers, broadcasters, and developers, enabling seamless experiences for diverse use cases.Ultra-fast live streamingGet real-time delivery with glass-to-glass latency of ±2.2 seconds for LL-DASH and ±3.0 seconds for LL-HLS.Deliver immediate viewer engagement, ideal for industries such as live sports, e-sports tournaments, and news broadcasting.Meet the expectations of audiences who demand instant access to live events without noticeable delays.Enhanced viewer interactionReduce the delay between live actions and audience reactions, fostering a more immersive viewing experience.Support real-time interaction for use cases like virtual conferences, live auctions, Q&A sessions, and live shopping platforms.Flexible player supportSeamlessly integrate with your existing player setups, including popular options like hls.js, dash.js, and native Safari support.Use our new HTML web player for effortless integration or maintain your current custom player workflows.Global scalability and reliabilityLeverage our robust CDN network with 200+ Tbps capacity and 180+ PoPs to enable low-latency streams worldwide.Deliver a consistent, high-quality experience for global audiences, even during peak traffic events.Cost-efficiencyMinimize operational overhead with a streamlined solution that combines advanced encoding, efficient packaging, and reliable delivery.How it worksOur real-time transcoder and JIT packager generate streaming manifests and chunks optimized for low latency:For LL-HLS: The HLS manifest (.m3u8) and chunks comply with the latest standards. Tags like #EXT-X-PART, #EXT-X-PRELOAD-HINT, and others are dynamically generated with best-in-class parameters. Chunks are loaded instantaneously as they appear at the origin.For LL-DASH: The DASH manifest (.mpd) leverages advanced MPEG-DASH features. Chunks are transmitted to viewers as soon as encoding begins, with caching finalized once the chunk is fully fetched.Combined with our fast and reliable CDN delivery, live streams are accessible globally with minimal delay. Our CDN network has an extensive capacity and 180+ PoPs to deliver exceptional performance, even for high-traffic events.See a live demo in action!Try WebRTC to HLS/DASH todayWe’re also excited to remind you about our WebRTC to HLS/DASH delivery functionality. This innovative feature allows streams created in a standard browser via WebRTC to be:Transcoded on our servers.Delivered with low latency to viewers using HTTP-based LL-HLS and LL-DASH protocols through our CDN.Try it now in the Gcore Customer Portal.Shaping the future of streamingBy nearly halving the glass-to-glass delivery time compared to our previous solution, Gcore Video Streaming enables you to deliver a seamless experience for live events, real-time interactions, and other latency-sensitive applications. Whether you’re broadcasting to a global audience or engaging niche communities, our platform provides the tools you need to thrive in today’s dynamic streaming landscape.Watch our demo to see the difference and explore how this solution fits into your workflows.Visit our demo player

Gcore 2024 round-up: 10 highlights from our 10th year

It’s been a busy and exciting year here at Gcore, not least because we celebrated our 10th anniversary back in February. Starting in 2014 with a focus on gaming, Gcore is now a global edge AI, cloud, network, and security solutions provider, supporting businesses from a wide range of industries worldwide.As we start to look forward to the new year, we took some time to reflect on ten of our highlights from 2024.1. WAAP launchIn September, we launched our WAAP security solution (web application and API protection) following the acquisition of Stackpath’s edge WAAP. Gcore WAAP is a genuinely innovative product that offers customers DDoS protection, bot management, and a web application firewall, helping protect businesses from the ever-increasing threat of cyber attacks. It brings next-gen AI features to customers while remaining intuitive to use, meaning businesses of all sizes can futureproof their web app and API protection against even the most sophisticated threats.My highlight of the year was the Stackpath WAAP acquisition, which enabled us to successfully deliver an enterprise-grade web security solution at the edge to our customers in a very short time.Itamar Eshet, Senior Product Manager, Security2. Fundraising round: investing in the futureIn July, we raised $60m in Series A funding, reflecting investors’ confidence in the continued growth and future of Gcore. Next year will be huge for us in terms of AI development, and this funding will accelerate our growth in this area and allow us to bring even more innovative solutions to our customers.3. Innovations in AIIn 2024, we upped our AI offerings, including improved AI services for Gcore Video Streaming: AI ASR for transcription and translation, and AI content moderation. As AI is at the forefront of our products and services, we also provided insights into how regulations are changing worldwide and how AI will likely affect all aspects of digital experiences. We already have many new AI developments in the pipeline for 2025, so watch this space…4. Global expansionsWe had some exciting expansions in terms of new cloud capabilities. We expanded our Edge Cloud offerings in new locations, including Vietnam and South Korea, and in Finland, we boosted our Edge AI capabilities with a new AI cluster and two cutting-edge GPUs. Our AI expansion was further bolstered when we introduced the H200 and GB200 in Luxembourg. We also added new PoPs worldwide in locations such as Munich, Riyadh, and Casablanca, demonstrating our dedication to providing reliable and fast content delivery globally.5. FastEdge launchWe kicked off the year with the launch of FastEdge. This lightweight edge computing solution runs on our global Edge Network and delivers exceptional performance for serverless apps and scripts. This new solution makes handling dynamic content even faster and smoother. We ran an AI image recognition model on FastEdge in an innovative experiment. The Gcore team volunteered their pets to test FastEdge’s performance. Check out the white paper and discover our pets and our technological edge.6. PartnershipsWe formed some exciting global partnerships in 2024. In November, we launched a joint venture with Ezditek, an innovator in data center and digital infrastructure services in Saudi Arabia. The joint venture will build, train, and deploy generative AI solutions locally and globally. We also established some important strategic partnerships. Together with Sesterce, a leading European provider of AI infrastructure, we can help more businesses meet the rising challenges of scaling from AI pilot projects to full-scale implementation. We also partnered with LetzAI, a Luxembourg-based AI startup, to accelerate its mission of developing one of the world’s most comprehensive generative AI platforms.7. EventsIt wasn’t all online. We also ventured out into the real world, making new connections at global technology events, including the WAICF AI conference and Viva Tech in Cannes and Paris, respectively; Mobile World Congress in Barcelona; Gamescom in Cologne in August; IBC (the International Broadcasting Convention) in Amsterdam; and Connected World KSA in Saudi Arabia just last month. We look forward to meeting even more of you next year. Here are a few snapshots from 2024.GamescomIBC8. New container registry solutionSeptember kicked off with the beta launch of Gcore Container Registry, one of the backbones of our cloud offering. It streamlines your image storage and management, keeping your applications running smoothly and consistently across various environments.9. GigaOm recognitionBeing recognized by outside influences is always a moment to remember. In August, we were thrilled to receive recognition from tech analyst GigaOm, which noted Gcore as an outperformer in its field. The prestigious accolade highlights Gcore as a leader in platform capability, innovation, and market impact, as assessed by GigaOm’s rigorous criteria.10. New customer success storiesWe were delighted to share some of the work we’ve done for our customers this year: gaming company Fawkes Games and Austrian sports broadcaster and streaming platform fan.at, helping them with mitigating DDoS attacks and providing the infrastructure for their sports technology offering respectively.And as a bonus number 11, if you’re looking for something to read in the new year lull, download our informative long reads on topics including selecting a modern content delivery network, cyber attack trends, and using Kubernetes to enhance AI. Download the ebook of your choice below.The essential guide to selecting a modern CDN eBookGcore Radar: DDoS attack trends in Q1-Q2 2024 reportAccelerating AI with KubernetesHere’s to 2025!And that’s it for our 2024 highlights. It’s been a truly remarkable year, and we thank you for being a part of it. We’ll leave you with some words from our CEO and see you in 2025.2024 has been a year of highs, from our tenth anniversary celebrations to the launch of various new products, and from expansion into new markets to connecting with customers (new and old) at events worldwide. Happy New Year to all our readers who are celebrating, and see you for an even bigger and better 2025!Andre Reitenbach, CEOChat with us about your 2025 needs

Subscribe to our newsletter

Get the latest industry trends, exclusive insights, and Gcore updates delivered straight to your inbox.