Aveco And Spectra Logic Combine For Ingest To Archive Solution

Fully integrated Aveco ASTRA MAM and Spectra Logic BlackPearl provide management of large volumes of media content.

“With Spectra BlackPearl seamlessly integrating storage management workflows (including archive) into the Aveco ASTRA MAM solution, users can now directly search and recall assets regardless of which storage medium they reside on, whether on-premise or in the cloud within the MAM,” said Hossein ZiaShakeri, Spectra Logic SVP of Business Development and Strategic Alliances. “This is the optimum solution for media organizations looking for affordable and scalable storage based on open standards on tape, object storage disk or cloud, to ensure their content will outlive its storage medium.”

The ASTRA MAM provides a common database and a set of tools for all ASTRA applications. Having all tools tightly integrated around a common MAM system enables lower costs, better interoperability, and simpler workflows. BlackPearl provides a modern, simple portal to a multi-tier storage architecture and integrates into the Aveco ASTRA MAM solution allowing for direct search and recall of assets.

“Our primary goal with ASTRA MAM is to provide a centralized platform for all content used in production and master control and to give operators a simple yet powerful way to accomplish everyday tasks,” said Pavel Potuzak, CEO of Aveco. "Spectra BlackPearl integration builds on this goal by adding in powerful and scalable archiving for a complete ingest-to-archive solution."

You might also like...

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 2

In part 2 of this investigation, we look at why Apple’s new M1 processor benefits broadcasters.

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 1

Apple’s M1-based MacBook Air, MacBook Pro, and Mac Mini have been the focus of computer news for the last half-year because of their surprisingly high-performance.

Computer Security: Part 4 - Making Hardware Secure

The history of computing has been dominated by the von Neumann computer architecture, also known as the Princeton architecture, after the university of that name, in which one common memory stores the operating system, user programs and variables the programs…

Computer Security: Part 3 - Circles Of Protection

There are many different requirements and expectations in the field of computer security and it may be as well to set out what some of them are. Computation is everywhere, from the ubiquitous iPhone to the military computer in an…

Computer Security: Part 2 - Understanding Why Computers Work The Way They Do

To see how to make computers secure, we have to go way back to see how they work.