Premium Content

Access "Iceland media firm opts for ATA-over-Ethernet archive"

Published: 30 Apr 2013
Go for green

This article is part of the May 2013 issue of Go for green

Iceland-based media company 365 Media has opted for ATA-over-Ethernet storage from Coraid for its broadcast programming archive. It rejected products from storage suppliers EMC (Isilon), HP, IBM and Dell. It also ruled out building its own systems using open source parallel file systems such as Gluster and BTRFS, choosing ATA-over-Ethernet as the least costly option. 365 Media runs 10 television channels, five radio stations and Iceland’s largest newspaper. It adds more than 35 hours of video content to its archive every day. The storage system is responsible for playing media for broadcast on a near-continuous basis via a Grass Valley K2 Summit transmission server. 365 Media started to look for a new storage system when its existing Omneon archive, based on 2TB cartridges, began to run out of space, the process accelerated with the growth of HD programming. It was offered more capacity from Omneon (now owned by Harmonic) but the cost would have been prohibitively high, said Arni Finnsson, technology manager at 365 Media. Finnsson said: “Our capacity with ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Spies in the VPN
    CWE_150414_ezine_252.png
    E-Zine

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...

  • IT Priorities 2014 Special Report
    prem_IT_priorities_2014_FINAL-1.jpg
    E-Handbook

    Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.

  • Detecting the use of TrueCrypt
    RH 3 Davies-1.jpg
    E-Handbook

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...