Written by IABM CTO Stan Moote This article originally appeared in the IBC 2016 Daily Storage for video production used to be simple - you picked the video camera you could afford, and the camera choice often dictated the videotape format you would use. Perhaps this seemed simple however tape operations are definitely time-consuming, expensive and inflexible. [bctt tweet="Storage for video production used to be simple - you picked the video camera you could afford, and the camera choice often dictated the videotape format you would use - Has Storage got too Complex? - Stan moote, IABM"] Adding scale There are many reasons for file-based workflows to have completely taken over media creation and distribution, but the nature of linear videotapes as a storage medium isn’t usually thought of as the primary one. The issue was scale: you could only produce as much as you had edit bays and dedicated VTRs available to you, and adding or upgrading a bay was a time- and capital-intensive proposition. The first file-based workflows emulated the existing VTR model, with dedicated islands of storage purchased in “number of hours of SD or HD”. Subsequent generations of pure file-based systems realized that network-attached storage could...
IPV Curator MAM System Helps Revolutionize Media Asset Management at NASA Kennedy Space Center
Curator integrates alongside Quantum StorNext Pro and Telestream Vantage to create elegant image capture and distribution workflow Cambridge, UK, 1 August 2016: UK-based media asset management and technology specialist, IPV, has announced the successful integration of its Curator Content Factory Media Asset Management (MAM) system within NASA's Kennedy Space Center. The MAM system is being used within a fully digital solution for launch video capture and delivery systems at the Kennedy Space Center and integrates seamlessly alongside a Quantum StorNext 5 storage system and Telestream Vantage content transcoding. [bctt tweet="There are not very many imaging environments more challenging, or more critical, than the one that supports launches at NASA's Kennedy Space Center - MAM System Revolutionize NASA Kennedy Space Center"] On this project, IPV collaborated with North American channel partner, StorExcel, which worked as a key advisor to the project on content and workflow integration issues. "We wanted to give NASA a state-of-the-art video workflow system based on best-of-breed solutions that we knew would work well together and provide optimal value based on our own experience." said Kurt Clawson, CTO, M&E Technology at StorExcel. There are not very many imaging environments more challenging, or more critical, than the one that...
Why you should remove unused Facebook apps…
As you probably know, Facebook is a vast social media platform that offers numerous ways for people to interact with one another and just generally enjoy have a good time. One of Facebook’s most popular features is the ability to run third-party apps. If you can think of something you’d like to do on Facebook, there’s probably an app that makes it possible. And many apps are indeed quite useful. But there’s something you need to know about Facebook apps: Some of them can be downright dangerous! An app that’s poorly written or written with mal intent can cause all kinds of strange unexplained issues with your Facebook experience: Photos, status updates and comments that you’ve posted will simply disappear without a trace. Photos, status updates and comments that you didn’t post will show up on your Timeline or in your friends’ newsfeeds, making it appear that you’re responsible for posting them. And when that happens they’re usually posts that put you in a bad light. Your friends start receiving Instant Messages that appear to have been sent by you, even though you never sent them. Miscellaneous glitches of all types will have you ready to pull your hair out....
The Top 5 Cybersecurity Mistakes Companies Make and How to Avoid Them
Cybersecurity requires a holistic organizational approach. From the leadership to each rank-and-file employee, a concerted effort must be maintained to establish, execute and follow-through with a plan to address cyber-risk management from all corners of the organization. Although there is no one-size-fits-all plan for organizations’ cyber-risk management needs, there are basic, core principles every organization should adhere to in order to maintain a solid security posture in the face of persistent attacks. “Cybersecurity doesn’t happen in a vacuum. Just as the threats are interconnected, so are the solutions.” Below are the five most common mistakes organizations make when it comes to defending their assets from cyber adversaries and how to prevent them. Mistake 1: Assuming you’re not a target. From Wall Street to Main Street, whether large or small, companies in virtually every industry are vulnerable to attacks. Often, however, the stories that make the news headlines are about theft of credit card data or personally identifiable information. As a result, companies that don’t handle this type of data often believe they are not a desirable target for cyber adversaries. In reality, adversaries are conducting massive campaigns in every sector of the economy to penetrate networks and exfiltrate information and...