DVEO Atlas Media Server now provides grooming and VOD

A revamped DVEO Atlas Media Server now provides grooming and VOD options in three different sizes

The revamped system ingests MPEG-2, H.264, and/or H.265/HEVC live streams over IP, then grooms the streams by adding wrappers such as MPEG-DASH, HLS, or RTMP, plus closed captions or multiple languages. It outputs the live streams and simultaneously stores the streams as VOD files.

The powerful second generation IP video media distribution server supports live grooming. It supports SD and HD H.265/HEVC, H.264/MPEG-4 AVC, or MPEG-2 streams. IP Input Protocols Include Standard Input, Multi-bitrate File, HTTP Progressive, HTTP Dynamic, HTTP Live (HLS), HTTP Smooth, ISMV, RTMP, RTSP, and MPEG-TS. IP Output Protocols Include FLV, MP4, HTTP Dynamic, HTTP Live Streaming (HLS), HTTP Smooth Streaming, RTMP, RTSP, MPEG-DASH, MPEG-TS, SRT Subtitles, WebVTT Subtitles, and JSON Metadata. The DVEO Atlas Media Server is ideal for IPTV Operators, Stadiums, broadcasters and those who rely on both live and resident content, or for need to build a content distribution network.

You might also like...

Production In The Age Of Media Choice

The way consumers engage with content is constantly shifting and at a faster pace than ever before, leaving the television industry playing catch up. Broadcasters, production companies and content producers around the globe are seeing the complexities in production and…

Computer Security: Part 2 - Understanding Why Computers Work The Way They Do

To see how to make computers secure, we have to go way back to see how they work.

Essential Guide: Protecting Premium Content OTT & VOD Distribution

The complexity of modern OTT and VOD distribution has increased massively in recent years. The adoption of internet streaming gives viewers unparalleled freedom to consume their favorite live and pre-recorded media when they want, where they want, and how they…

Computer Security: Part 1 - What Is Computer Security?

Computer security is always a hot topic, but what do we mean by security and why do systems seem to be ever vulnerable. Comparing hardware to software helps understand vulnerabilities in software security.

Data Recording and Transmission: Part 25 - Encryption Strategies

As in all systems where there are opposed ideologies, there is a kind of cold war in which advances on one side need to be balanced by advances on the other. In encryption, the availability of increased computing power at…