We can't wait. The new HP Z Workstations are coming.


Staying ahead by offering creative artists the best computers for their workflow is why VFX Technologies' list of clients is growing so fast.  We are excited to see that after three years, HP is introducing their new Z workstation lineup. 

We already have HP's high-end Z840 in our rental inventory. For Flame, Nuke, Premier, Avid, Resolve, and other applications vital to post artists, we load this powerhouse up with Dual CPUs, RAM, storage, GPUs that enable you to work at peak performance. 

The new HP Z lineup, wow are we impressed! The top-of-the-line Z8 has eye-popping specifications and capabilities, promising to be the world's most powerful workstation, ready to tackle the demands of top tier Media and Entertainment organizations.

You can read about the new HP Z8 here.

We have already notified HP Inc. we want these workstations as soon as they're available in October. We will stock our rental inventory so you can use one without a huge cash outlay. If you want to purchase one of the new HP Z series, please allow us to recommend the best configuration for you and provide a quote.

To be notified as soon as we have these inbound, send me an email.

-Jim Reisman

Hostiles Approaching, Secure the Perimeters

Hackers are trying to extort 7.5 million dollars from HBO, and no one is sure how they gained access to the files and media they stole. Sony was the victim a few years back. That attack was purely malicious.

They are the big targets, and you would think these companies have the resources to protect themselves from these intrusions. If they can get hit, you can. As hard as you and your team work on your projects, that's how hard these criminals are trying to disrupt and profit from the entertainment industry.

For security, the key word is vigilance! Protecting yourself from cyber attacks is setting up a well thought out line of defense, implementing it, and scheduling a maintenance protocol that is fluid so that as the challenges shift, you are adjusting your strategy.

Depending on where you are in the M&E space, your security risks will vary. I am going to provide recommendations for protecting content. These are fundamental steps. To determine the safety measures you need, an assessment of your company's risks is the next step.

When we assess securing content, we think about where the content is stored and how it moves through the production cycle. Who touches it and why? Where does it reside and how many iterations of it are there? When is your content most vulnerable? How likely is it that you will become a target? What value does your work have to someone outside your staff and your clients? Determining this is a starting point for how much effort you need to put into protecting your assets.

In IT security parlance there is the term Air Gap. It's a barrier between the content and the team that works on it and everyone else. It may mean an environment isolated from the Internet or at least protected behind passwords and encryption. No one should be able to cross that Air Gap without permission, and if anyone does, you get notified. Establishing this is the first step in any security plan be it for just your computer or your company's network.

How this gets done has as many approaches as there are ways to work. If you have multiple offices, you'll need a VPN (virtual private network) as a layer between the Internet and your network. If you move assets using portable drives, you will want to enable encryption. Encryption will require a password to access the drive. On shared storage servers, an administrator can isolate segments of the storage with permissions.

There are physical measures you can put in place to prevent data theft. Frequent password changes. Use USB port and RJ45 locks on your computers. Combination locks on edit bay doors. Security cameras with explicit warnings.

I mentioned vigilance, and I come back to this because what inevitably happens is keeping these security systems in place is a pain in the rear. Your team members will try to circumvent the security you've set-up because it slows them down. You need to establish best practices and maintain them. There are ways to automate security measures. There are many layers to securing your projects, and you should discuss your needs with experts, get an idea of the costs and decide what solution best meets your needs and your budget.

- Jim Reisman

Don’t Go From Bad to Worse


Our company rents computers and servers and often our clients are smaller facilities that have to scale up for a big job. These customers usually don't have an IT person on hand to deal with the inevitable hiccups that occur when you have a lot of equipment around.

Even though we provide support, we've learned that we have to emphasize to our renters that if there's a problem, call us first! All too often in the heat of the moment, someone on their team decides he or she will try a few things. Not good!

I thought it would be helpful to share some thoughts with you as to how to avoid turning a simple problem into a disaster. 

The first rule, don't do anything while the machine is running a process. Wait as long as you can and add 15 minutes to that. Rebooting can solve a lot of problems but not if you kill the power while the machine is computing. Never kill the power, period! Restart the device using a command, doing a force quit, or pressing the power button. Don't pull the plug.

Along the same lines let's talk about removable hard drives. Do nothing while they're reading or writing data. Typically, this is indicated by a rapidly flashing light on the front of the drives. One of the worst expressions associated with RAID arrays is 'hot-swappable.' If you think one of the drives in your RAID is faulty, follow a safe procedure or call us at VFX Technologies for support. Ejecting a drive or a flash card without following proper procedures can lead to a catastrophic disaster, possibly the loss of all data on the device.

Keep your original media assets safe and close by while you're working. Save and back up, use a RAID if you can and if you can have a near-line server or backup to drives, even better. There are very simple methods of backing up the critical folders of a job quickly and easily. Depending on the specifics, I can share this information with you, just drop me a line.

A good practice, if you can, is to keep your project on a network not connected to the Internet. If your team can be on workstations and storage servers independent of the primary network, you avoid a lot of potential problems such as intrusion, malware infection, misuse of assets, and loss of productivity. There are several approaches to this solution that depend on your circumstances. Again, if you want to know more, get in touch with me.

There is a basic list of reasons why computers and storage fails. At the top of the list is human error. Be patient with your gear and if you don't know why it's not working, don't try to guess. Support is out there for you. Here's a quick list of what else you can do to keep things running smoothly:

  • Have a Battery Backup Device (UPS) or a surge protector at least.
  • Keep your software up to date.
  • Have virus protection.
  • Keep your equipment in a cool and clean environment.
  • Don't ignore warning signs, error messages, or system crashes.

It's easier to solve a small problem than a big one. It's better to make sure your systems are in good condition before you start a project. It's smarter to ask for help when a problem arises.

-Jim Reisman