Cube-Tec to Debut QUADRAGIA•Film at IBC 2017

QUADRIGA•Film is the latest incarnation of Cube-Tec’s solutions for quality-controlled and large-scale migration of content to digital archives. Equipped with pioneering features, the new moving image migration solution was developed in cooperation with MWA Nova and 5micron.

There are three separate highly specialized Cube-Tec QUADRIGA solutions; audio, video and film. QUADRIGA•Audio is recognized as a leading technology in the world for quality controlled large-scale migration from physical audio carriers, QUADRIGA•Video has inherited the same properties. 

At IBC, visitors can view the latest iteration, QUADRIGA•Film. The archive migration solution includes new sensor technology and tension-controlled film movement, which avoids a capstan drive and sprocket wheels to minimize stress for fragile archive film. The software measures and classifies photochemical and mechanical attributes. It can distinguish between superimposed and surface damage by using a newly developed, patent pending, double-sided surface diagnostic sensor as well as a picture analytic technique. 

The surface diagnostic sensor uses dark field measurements, supporting extremely fine resolution measured in sub-microns. QUADRIGA•Film automatically documents any perforation damage and the condition and types of film splices as well as film shrinkage. QUADRIGA•Film represents the highest quality, automated solution for moving film into digital archives. 

You might also like...

Computer Security: Part 5 - Dual Bus Architecture

In the UK we have Oxford v Cambridge. In the USA it’s Princeton v Harvard. The only difference is that one is a boat race and the other is computer architecture race.

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 2

In part 2 of this investigation, we look at why Apple’s new M1 processor benefits broadcasters.

Apple’s M1 ARM For Broadcast Infrastructure Applications: Part 1

Apple’s M1-based MacBook Air, MacBook Pro, and Mac Mini have been the focus of computer news for the last half-year because of their surprisingly high-performance.

Computer Security: Part 4 - Making Hardware Secure

The history of computing has been dominated by the von Neumann computer architecture, also known as the Princeton architecture, after the university of that name, in which one common memory stores the operating system, user programs and variables the programs…

Computer Security: Part 3 - Circles Of Protection

There are many different requirements and expectations in the field of computer security and it may be as well to set out what some of them are. Computation is everywhere, from the ubiquitous iPhone to the military computer in an…