The Finish Line Moves From AWS Glacier For Object Matrix Cloud

The Finish Line has migrated from AWS Glacier to the MatrixStore Cloud service from Object Matrix for content archiving.

This was because costs and retrieval performance had proved too unpredictable on the incumbent platform, according to Object Matrix.

Content will now be archived to the MatrixStore Cloud service using a range of backup tools and the S3 interface. Once migrated, the entire archive will be accessed from one place using Vision from Object Matrix, enabling global teams to discover and share content across the entire archive.

The Finish Line designs and manages in-house post-production solutions for productions, providing on-site or remote access editorial, finishing and mastering services. It was looking for a more efficient way of managing its archive.

“Having seen the session from Object Matrix during the DPP Innovation Week, we were confident its software would help us manage our archive effectively while keeping costs low and predictable,” said Zeb Chadfield, Founder, The Finish Line.

You might also like...

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 2

In part 2 of this investigation, we look at why Apple’s new M1 processor benefits broadcasters.

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 1

Apple’s M1-based MacBook Air, MacBook Pro, and Mac Mini have been the focus of computer news for the last half-year because of their surprisingly high-performance.

Computer Security: Part 4 - Making Hardware Secure

The history of computing has been dominated by the von Neumann computer architecture, also known as the Princeton architecture, after the university of that name, in which one common memory stores the operating system, user programs and variables the programs…

Computer Security: Part 3 - Circles Of Protection

There are many different requirements and expectations in the field of computer security and it may be as well to set out what some of them are. Computation is everywhere, from the ubiquitous iPhone to the military computer in an…

Computer Security: Part 2 - Understanding Why Computers Work The Way They Do

To see how to make computers secure, we have to go way back to see how they work.