Tedial Talks IMF And Tackles Storage Virtualization at NAB 2017

Tedial will talk about IMF as it also debuts new AST, a revolutionary content and workflow management system.

Tedial will demonstrate its support of IMF at NAB along with its role as a true “Media Factory.”

The company is also breaking the classical paradigm of Hierarchical Storage Management (HSM) by showcasing its Tedial Augmented Storage (AST), a new concept in storage virtualization systems that brings a safe, reliable and cost-efficient storage system for cloud workflows and hybrid scenarios. Also on show the company will  highlight their ability to provide full cloud-based operation and their monitoring of statistics and reporting via real- time dashboards.

Key demonstrations in the booth include:

IMF End-to-End Workflow

Showing real-world applications, Tedial officials will discuss how applying the SMPTE IMF standards can create a reliable SaaS and proven cloud solution. Tedial's architecture supports UHD and HDR while providing adopters with enhanced multi-versioning support, while supporting late pending components for previous watermarked versions.

Tedial Augmented Storage, AST

AST is a new concept in storage virtualization. It provides content owners a safe, reliable and cost-efficient storage system for cloud workflows and hybrid scenarios as it virtualizes file locations. For those customers managing a multi-site, distributed operation, AST can transparently manage the same content in multiple locations, automating task assignment and data transfer across multiple sites as needed.

The platform is built around a resilient and scalable Cloud First design, allowing facilities to grow according to their needs, while dynamically adapting to workload peaks.

Different groups can be assigned different access levels, and retention policies can be easily defined to protect the content and limit the access.

Cloud-centric operation

Tedial’s cloud-based solution features multi-resolution MPEG-DASH to enable a full Web GUI without media browsing issues. Creative tools Adobe Premier Pro CC and After Effects CC are full integrated. Content is cached locally, enabling minimal transfers of local high-res operations such as content repurposing and making corrections.

Real-time Dashboards: Statistics and Reporting

At the booth, Tedial will demonstrate media and content management solutions, all targeted to maximize business efficiency and profitability. The dashboard enables s real-time monitoring of key network performance indicators to measure business efficiency and capacity,

You might also like...

Microservices Poised To Take Self-Serve To Another Level

Microservices enable broadcasters to find new ways to adopt, engineer, operate and maintain the value of their solutions. For vendors, microservices provides opportunities to offer what could essentially be a self-serve menu for clients rather than building bespoke workflows internally.…

Essential Guide: Microservices For Broadcasters

Computer systems continue to dominate the landscape for broadcast innovation and the introduction of microservices is having a major impact on the way we think about software. This not only delivers improved productivity through more efficient workflow solutions for broadcasters,…

The Sponsors Perspective: Media Companies - Advance Your Security And Innovation Lifecycles

Hackers are always improving the level of sophistication and constantly finding new surface areas to attack – resulting in the surging volume and frequency of cyberattacks.

Nine Pitfalls Of Relying On FTP To Move Large Media Files

Broadcasters are continuing to adopt and take advantage of IT working practices as they transition to file-based workflows. However, some seemingly effective solutions are outdated, have not kept pace with advances in computing power, and are unable to efficiently transfer…

Essential Guide: Secure IP Infrastructures For Broadcasters

Security is becoming increasingly important for broadcasters looking to transition to IP infrastructures. But creating improved software, firewalls and secure networks is only half the story as cybercriminals look to find new and imaginative methods of compromising data.