Polycom Hosts Cloud-Based Media Services on Microsoft Azure

Polycom Hosts Cloud-Based Media Services on Microsoft Azure

Polycom’s Accordent Media Services are powered by Microsoft Windows Azure.

Organizations can leverage this cloud services offering hosted on the Windows Azure platform to rapidly and cost effectively deploy a single, secure, searchable video content management solution for all their video assets.

Although businesses want to enjoy optimal productivity benefits from their growing libraries of multi-source, multi-format video assets, they do not want to invest a lot on extensive IT resources.

Polycom notes that businesses also do not want to make major capital expenditures on networking or storage hardware.

These issues are effectively addressed by Accordent Media Services – Powered by Windows Azure that brings cloud-based hosting, delivery, and video content management capability within reach for organizations.

Microsoft is delighted with the launch of Accordent Media Services – Powered by Windows Azure, the first enterprise media management system hosted on the Windows Azure platform,” said Scott Guthrie, corporate vice president of the .NET Developer Platform at Microsoft Corp. “This new service brings the power of Accordent applications and Microsoft infrastructure unified into a complete Enterprise Video Management solution available to the customer in the cloud.”

This offering is in response to tremendous demand for us to provide Accordent media management capabilities in an off-premise, cloud-based model,” said Mike Newman, vice president and general manager Video Content Management Solutions, Polycom. “We look forward to working with Microsoft to bring this powerful solution to market and to enable entirely new classes of users to experience the benefits of ‘at-your-fingertips’ video content.”

Polycom’s cloud services offering hosted on the Windows Azure platform comes with an installed, branded, and fully functional Accordent Media Management System.

Hosted within Windows Azure datacenters, this System ensures the delivery of content in various formats to widely distributed audiences via the Windows Azure Content Delivery Network (CDN).

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…