Quantum Blog

Support Growing Video Content with Effective Content Management

Demand for compelling video content is on the rise—and that’s probably great news for your production or post-production studio. But rapidly rising demand can present some storage challenges you’ve never faced before. As you work on more and more projects, your production files and video assets can consume a lot of capacity in your primary storage environment. Your used capacity will only increase as you move into higher-resolution formats that generate larger files.

It’s All About Better Serving and Engaging with Audiences – Interview with Dalet

While digesting the events at IBC2017 and preparing for NAB Show New York, I had the pleasure of sitting down with Arnaud Elnecave, vice president of marketing at Dalet. Arnaud has been at Dalet for 10 years and as vice president of marketing, he sets Dalet’s long-term objectives and develops the marketing strategy to increase the company’s global brand awareness. We’re excited to share the big trend he saw at IBC2017, his take on how media companies can improve their workflow efficiencies, if artificial intelligence (AI) can enable media professionals, and what he’s most excited about showcasing at NAB New York.

Tape Is Your Last Line of Defense Against Ransomware, But There Are Other Best Practices for Protecting Your Data

Encryption is a great way to keep data secure, but sometimes it can be used against us. Yes, we’re talking about ransomware. According to Statista, “preventing malware, including ransomware” is ranked as the second most pressing cyber security issue in 2017, according to IT security professionals worldwide, just after “identifying vulnerabilities.”

The Past 24 Hours of New Ransomware…

It’s a casual weekday at work and, armed with a steaming cup of coffee, you tuck, dip, and juke your way past coworkers to avoid spilling the contents of that 12 oz. mug. As you make your way back to your desk, a quick glance at your inbox reveals emails from a slightly familiar sounding domain. At this critical moment, you let down your guard and click on its simplistic message, giving hackers access to your system. An eruption of swearwords follows as you realize what has happened and accidentally knock over that coffee.