MAM: maximize the value of your media, minimize your costs

Funnily enough, we’re all Media Asset Managers. There’s the pile of LPs under the record player, the CDs on the shelf, the MP4s you (legally no doubt) downloaded during the glorious years of widespread downloads, and then your iTunes collection. Then there are your photos. The ones nicely organized on your drive, the ones archived using 6 different directory schemes across 7 backup drives, and the 3 sets you promised to merge in from your spouse and kids. Let’s face it, it’s wonderful, but it’s a mess. Oddly enough, this is not too different from how media is managed in major media companies. Assets are distributed across multiple locations, organized following different schemes, and it can often be hard to find and use an asset in one place if it was created in another. This is because like at home, the organization has grown organically over time to accommodate different needs.
You might also like...
Building Software Defined Infrastructure: Observability In Microservice Architecture
Building dynamic microservices based infrastructure introduces the potential for variable latency which brings new monitoring challenges that require an understanding of observability.
Broadcast Standards: Kubernetes & The Architecture Of Cloud Compute Based Systems
Here we describe Kubernetes and the taxonomy of containerized architecture based cloud compute system designs it manages.
Live Sports Production: Backhaul In Live Sports Production
Getting content reliably and securely from venue to studio remains key to live sports production so here we discuss the technology and services required.
Monitoring & Compliance In Broadcast: Monitoring Delivery In The Converged OTA – OTT Ecosystem
Convergence or coexistence between linear broadcast, IP based delivery and 5G mobile networks creates new challenges for monitoring of delivery paths, both technically and logistically.
IP Monitoring & Diagnostics With Command Line Tools: Part 4 - SSH Public Keys
Installing public SSH keys created on your workstation in a server will authenticate you without needing a password. This streamlines the SSH interaction and avoids the need to use stored and visible passwords in your scripts.