Aveco And Spectra Logic Combine For Ingest To Archive Solution

Fully integrated Aveco ASTRA MAM and Spectra Logic BlackPearl provide management of large volumes of media content.

“With Spectra BlackPearl seamlessly integrating storage management workflows (including archive) into the Aveco ASTRA MAM solution, users can now directly search and recall assets regardless of which storage medium they reside on, whether on-premise or in the cloud within the MAM,” said Hossein ZiaShakeri, Spectra Logic SVP of Business Development and Strategic Alliances. “This is the optimum solution for media organizations looking for affordable and scalable storage based on open standards on tape, object storage disk or cloud, to ensure their content will outlive its storage medium.”

The ASTRA MAM provides a common database and a set of tools for all ASTRA applications. Having all tools tightly integrated around a common MAM system enables lower costs, better interoperability, and simpler workflows. BlackPearl provides a modern, simple portal to a multi-tier storage architecture and integrates into the Aveco ASTRA MAM solution allowing for direct search and recall of assets.

“Our primary goal with ASTRA MAM is to provide a centralized platform for all content used in production and master control and to give operators a simple yet powerful way to accomplish everyday tasks,” said Pavel Potuzak, CEO of Aveco. "Spectra BlackPearl integration builds on this goal by adding in powerful and scalable archiving for a complete ingest-to-archive solution."

You might also like...

Computer Security: Part 3 - Circles Of Protection

There are many different requirements and expectations in the field of computer security and it may be as well to set out what some of them are. Computation is everywhere, from the ubiquitous iPhone to the military computer in an…

Computer Security: Part 2 - Understanding Why Computers Work The Way They Do

To see how to make computers secure, we have to go way back to see how they work.

Computer Security: Part 1 - What Is Computer Security?

Computer security is always a hot topic, but what do we mean by security and why do systems seem to be ever vulnerable. Comparing hardware to software helps understand vulnerabilities in software security.

Data Recording and Transmission: Part 25 - Encryption Strategies

As in all systems where there are opposed ideologies, there is a kind of cold war in which advances on one side need to be balanced by advances on the other. In encryption, the availability of increased computing power at…

Data Recording and Transmission: Part 24 - Message Integrity

Once upon a time, the cause of data corruption would be accidental. A dropout on a tape or interference picked up on a cable would damage a few bits. Error correction was designed to deal with that.