Concurrent Presents Software-Defined Content Platform

Concurrent offers a wide range of deployment options – cloud, on-premise, or hybrid – to store, protect, transform and deliver content.

“Listening closely to customers, we knew that a single cloud provider or a single on-premise solution wasn’t meeting all their requirements,” says Paul Martin, VP Engagement at Concurrent. “What customers were saying to us is they needed multi-cloud flexibility, but with predictable costs. So, we have given customers what they’ve asked for and added the pay-per-use model to our existing licensed appliance solution.”

Content Platform is the firm’s self-described software defined solution for transcode, storage, origin, and cache.

“With an open object storage engine and flexible support for file, block and object protocols, Aquari is used by Concurrent’s customers for highly scalable, high performance video storage,” explains Martin. “The Aquari management system has been extended to allow easy control and monitoring of the state of the storage, highlighting any setting or status that is out of the ordinary. Operators can customize their Aquari storage system’s behavior to their business demands by scheduling and controlling background operations that maintain the health of the system.”

Concurrent’s pure software transcoder, Zephyr, can be deployed as a software-only, pay-per-use solution in either private or public clouds.

Its tech can define ABR profile groups for VoD and to help content providers more efficiently deliver video to consumers, lowering operational cost. ABR profile groups allow operators to control which profile groups are sent to which ABR clients.

“The feature enables many benefits including optimized bandwidth usage, tiered pricing models, allowing a single ABR asset to be encoded by multiple codecs, and more,” says the firm.

Its Laguna Cache is described as a software-based, high density streaming server with integrated intelligent caching features. It can be deployed at the edge “for maximized quality of experience and minimized latency, in intermediate locations to save network cost, and at the origin as a shield cache to scale your services without adding origin capacity.”

You might also like...

Computer Security: Part 5 - Dual Bus Architecture

In the UK we have Oxford v Cambridge. In the USA it’s Princeton v Harvard. The only difference is that one is a boat race and the other is computer architecture race.

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 2

In part 2 of this investigation, we look at why Apple’s new M1 processor benefits broadcasters.

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 1

Apple’s M1-based MacBook Air, MacBook Pro, and Mac Mini have been the focus of computer news for the last half-year because of their surprisingly high-performance.

Computer Security: Part 4 - Making Hardware Secure

The history of computing has been dominated by the von Neumann computer architecture, also known as the Princeton architecture, after the university of that name, in which one common memory stores the operating system, user programs and variables the programs…

Computer Security: Part 3 - Circles Of Protection

There are many different requirements and expectations in the field of computer security and it may be as well to set out what some of them are. Computation is everywhere, from the ubiquitous iPhone to the military computer in an…