SlideShare a Scribd company logo
1 of 7
Download to read offline
Physically present
– future preserved
| introduction
Migration-based preservation strategies are costly,
involve a risk of data loss and do not address the
core of the problem; the need for data security and
future-proof access.
A HOLISTIC APPROACH TO
DIGITAL PRESERVATION
Our ambition is to reshape digital preservation with
a holistic approach. We make your valuable data
secure and accessible regardless of future technological
developments. Our solution is designed for maintaining
the integrity of your data whilst ensuring they can be
reproduced at some point in the future.
We make digital data physically
present and future preserved.
Reshaping
digital
preservation
Ensuring future access to today’s
digital data is a constant challenge.
As data volume grows, complexity
and risk increase.
EXPECTED DATA GROWTH
2009 - 2020
EXTABYTES
EXPECTED MIGRATION COST
ARCHIVE OF 1 000 000 DIGITAL FILES
EURO
Source: IDC, “Digital University Study”, 2014 (til expected data growth graph) Source: Erik Oltmans and Nanda Kol, “A comparison between emulation
and migration in terms of cost” (til Exp. Migration costs graph)
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
2012 2013 2014 2015 2016 2017 2018 2019 2020
1 000 000
2 000 000
3 000 000
4 000 000
5 000 000
6 000 000
7 000 000
8 000 000
9 000 000
2010 2015 2020 2025 2030 2035 2040 2045 2050 2055 2060
LIFTING FILM INTO THE DIGITAL ERA
By combining innovative research with well-proven
technology, we have developed an OAIS compliant
solution for digital preservation. We transform photo-
sensitive film into a digital preservation medium,
similar to what was done with magnetic tape some
years back. Our solution is as easy to use as any
other digital technology, but with a unique security,
integrity and longevity.
| open archival information system
By turning film into a digital storage
medium, we combine the well-
documented preservation qualities
of photosensitive materials with the
accessibility enabled by operating
within a standard IT infrastructure.
MIGRATION-FREE
By storing your digital data in archival
file formats on our unique piqlFilm,
repetitive migrations are no longer
needed. You avoid the risk of migra-
tion-related corruption and data loss,
you’ll save time and get a more
predictable long-term cost.
FUTURE-PROOF
We make data retrieval independent of
access to specific technologies or ven-
dors. For disaster recovery, all you need
is a light source and any type of digital
camera and computer. Readable text
explains how to reproduce your files.
PERMANENT
Photosensitive storage medium are
robust with proven long-term quali-
ties, and piqlFilm is tested to together
with its packaging to last for 500 years.
Although your time perspective may
be shorter, you can trust that your data
will remain intact.
UNALTERABLE
Your data is preserved securely on a
true WORM (Write Once, Read Many)
medium, making it impossible to manip-
ulate or delete recorded data.
FLEXIBLE
Depending on your needs you can store
your data in computer readable digital
format or as human readable text or
images. You can also combine the two
for additional security.
SEARCHABLE
Operated within a standard IT envi-
ronment, your data is fully searchable.
You’ll find what you need, whenever
you need it.
The best of
two worlds
| the service and process
Transfer your digital data. We accept
all file formats of any size, ranging from
pure text documents to images and
audio-visual contents.
We write your digital data and metadata
onto a secure, migration-free preserva-
tion medium with proven long-term
qualities; our high-resolution piqlFilm.
The film is protected in our unique piql-
Box. Select between storing the data in
computer readable digital format or as
human readable text or images.
Your data is searchable and can
be retrieved in minutes, whether
you store the piqlBox yourself or
let us do it for you. Readable text
with source codes and file format
specifications ensure future access
regardless of availability to specific
technologies or vendors.
1
2
3
How it
works
HOW WE PRESERVE YOUR DATA
Preserving data is just as easy as storing to any other
device or e.g. in the Cloud; the difference lays in the
security, integrity and longevity of the solution. We use
our high-precision piqlWriter to write your digital files
and related metadata onto piqlFilm. Both digital and
human readable storage of data is possible. The film is
protected in a labelled piqlBox, which is tested together
with film to ensure your data lasts for at least 500 years
under ISO storage conditions.
Our solution may be integrated into your existing digital
preservation system or digital asset management system
for easy search and access.
| technology as enabler
Piql Preservation Services are based on our
certified turnkey solution which includes all
equipment and processes needed for writing,
storing and reading back your files. The tech-
nology is developed in cooperation with
some of the most renowned companies
and institutions within their fields, such
as Fraunhofer, Norner and IPI (Image
Permanence Institute).
HOW WE ENSURE LONG-TERM ACCESS
We use the same methods for error correction as most
other storage technologies. The formats and algorithms
are printed on the film in both human readable and
digital formats. It is of uttermost importance to us that
all information needed to decode the data is available to
those that may need it sometime in the future, so even
the source code for the decoding software is stored on
the reel. For additional security we can write file format
specifications on the film.
OUR STORY
Since the start of the company in Norway in 2002, our
passion has been to creatively challenge the industry
standard within imaging and display technology. After
having revolutionised the way the film industry prints
their movies, our vision is to reshape data preserva-
tion. Piql Preservation Services, enabled by our unique
technology, is offered through a worldwide network of
service providers.
HOW TO READ BACK YOUR DATA
When you request your file back, the correct piqlBox is
collected from storage and placed on piqlReader. It will
read the needed part of the film and decode the informa-
tion before making the file available to you.
You may also recover your files by using
any compatible digital scanner and our
open source decoding software.
| technology as enabler
| contact
Piql AS
Grønland 56
3045 Drammen
NORWAY
T +47 90 53 34 32
F +47 32 82 82 47
M office@piql.com
W www.piql.com

More Related Content

What's hot

Brief Introduction to Digital Preservation
Brief Introduction to Digital PreservationBrief Introduction to Digital Preservation
Brief Introduction to Digital PreservationMichael Day
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introductionPublicLibraryServices
 
Preparation, Proceed and Review of preservation of Digital Library
Preparation, Proceed and Review of preservation of Digital Library Preparation, Proceed and Review of preservation of Digital Library
Preparation, Proceed and Review of preservation of Digital Library Asheesh Kamal
 
Digital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondDigital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondBenoit Pauwels
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introductionMichael Day
 
Intro to Digital Preservation
Intro to Digital PreservationIntro to Digital Preservation
Intro to Digital PreservationBen Fino-radin
 
An Introduction to digital preservation at the Library of Congress
An Introduction to digital preservation at the Library of CongressAn Introduction to digital preservation at the Library of Congress
An Introduction to digital preservation at the Library of Congresslljohnston
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information Phil Griffin
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletionsnehal1010
 
Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)maheshh1947
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiIAEME Publication
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletionvitam,berhampur
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
Digital Preservation
Digital PreservationDigital Preservation
Digital PreservationMichael Day
 
Digitalpreservation 120203055519-phpapp02
Digitalpreservation 120203055519-phpapp02Digitalpreservation 120203055519-phpapp02
Digitalpreservation 120203055519-phpapp02umeshlis
 
Digital preservation from a records management perspective
Digital preservation from a records management perspectiveDigital preservation from a records management perspective
Digital preservation from a records management perspectiveMichael Day
 

What's hot (20)

Brief Introduction to Digital Preservation
Brief Introduction to Digital PreservationBrief Introduction to Digital Preservation
Brief Introduction to Digital Preservation
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introduction
 
Preparation, Proceed and Review of preservation of Digital Library
Preparation, Proceed and Review of preservation of Digital Library Preparation, Proceed and Review of preservation of Digital Library
Preparation, Proceed and Review of preservation of Digital Library
 
Digital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondDigital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the Pond
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introduction
 
Intro to Digital Preservation
Intro to Digital PreservationIntro to Digital Preservation
Intro to Digital Preservation
 
An Introduction to digital preservation at the Library of Congress
An Introduction to digital preservation at the Library of CongressAn Introduction to digital preservation at the Library of Congress
An Introduction to digital preservation at the Library of Congress
 
Trm Introduction
Trm IntroductionTrm Introduction
Trm Introduction
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information
 
3
33
3
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
G044053337
G044053337G044053337
G044053337
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Digitalpreservation 120203055519-phpapp02
Digitalpreservation 120203055519-phpapp02Digitalpreservation 120203055519-phpapp02
Digitalpreservation 120203055519-phpapp02
 
Digital preservation from a records management perspective
Digital preservation from a records management perspectiveDigital preservation from a records management perspective
Digital preservation from a records management perspective
 

Viewers also liked (13)

Lumbreras geografia
Lumbreras   geografiaLumbreras   geografia
Lumbreras geografia
 
GRC Listening Party
GRC Listening PartyGRC Listening Party
GRC Listening Party
 
INTS 3301 FOCUS ASSESSMENT ASSIGNMENT
INTS 3301 FOCUS ASSESSMENT ASSIGNMENTINTS 3301 FOCUS ASSESSMENT ASSIGNMENT
INTS 3301 FOCUS ASSESSMENT ASSIGNMENT
 
HRDV 3305 Contingency Staffing
HRDV 3305 Contingency StaffingHRDV 3305 Contingency Staffing
HRDV 3305 Contingency Staffing
 
1 Writing For Radio
1 Writing For Radio1 Writing For Radio
1 Writing For Radio
 
Doc2
Doc2Doc2
Doc2
 
Brochure-Piql-Preservation-Services-Italian
Brochure-Piql-Preservation-Services-ItalianBrochure-Piql-Preservation-Services-Italian
Brochure-Piql-Preservation-Services-Italian
 
Course mtl. mr. vittala rao
Course mtl.   mr. vittala raoCourse mtl.   mr. vittala rao
Course mtl. mr. vittala rao
 
Ggc q orgánica_i__20101
Ggc q orgánica_i__20101Ggc q orgánica_i__20101
Ggc q orgánica_i__20101
 
Lumbreras lenguaje
Lumbreras   lenguajeLumbreras   lenguaje
Lumbreras lenguaje
 
Asthma
AsthmaAsthma
Asthma
 
Compe física trilce
Compe física trilceCompe física trilce
Compe física trilce
 
Social marketing
Social marketing Social marketing
Social marketing
 

Similar to Physically present - future preserved

DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsAndris Soroka
 
Priority One Data
Priority One DataPriority One Data
Priority One Datacinelicious
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionIan Ray
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz BrochureIan Ray
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesDinis Cruz
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsCarl De Groote
 
Research Data Service geosciences 18oct2018
Research Data Service geosciences 18oct2018Research Data Service geosciences 18oct2018
Research Data Service geosciences 18oct2018University of Edinburgh
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...Canon Business CEE
 

Similar to Physically present - future preserved (20)

CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Priority One Data
Priority One DataPriority One Data
Priority One Data
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Media & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative ITMedia & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative IT
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
1.pdf
1.pdf1.pdf
1.pdf
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz Brochure
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
Cleversafe.PPTX
Cleversafe.PPTXCleversafe.PPTX
Cleversafe.PPTX
 
Research Data Service geosciences 18oct2018
Research Data Service geosciences 18oct2018Research Data Service geosciences 18oct2018
Research Data Service geosciences 18oct2018
 
Video Security Goes to the cloud
Video Security Goes to the cloudVideo Security Goes to the cloud
Video Security Goes to the cloud
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
 

Physically present - future preserved

  • 2. | introduction Migration-based preservation strategies are costly, involve a risk of data loss and do not address the core of the problem; the need for data security and future-proof access. A HOLISTIC APPROACH TO DIGITAL PRESERVATION Our ambition is to reshape digital preservation with a holistic approach. We make your valuable data secure and accessible regardless of future technological developments. Our solution is designed for maintaining the integrity of your data whilst ensuring they can be reproduced at some point in the future. We make digital data physically present and future preserved. Reshaping digital preservation Ensuring future access to today’s digital data is a constant challenge. As data volume grows, complexity and risk increase. EXPECTED DATA GROWTH 2009 - 2020 EXTABYTES EXPECTED MIGRATION COST ARCHIVE OF 1 000 000 DIGITAL FILES EURO Source: IDC, “Digital University Study”, 2014 (til expected data growth graph) Source: Erik Oltmans and Nanda Kol, “A comparison between emulation and migration in terms of cost” (til Exp. Migration costs graph) 0 5000 10000 15000 20000 25000 30000 35000 40000 45000 2012 2013 2014 2015 2016 2017 2018 2019 2020 1 000 000 2 000 000 3 000 000 4 000 000 5 000 000 6 000 000 7 000 000 8 000 000 9 000 000 2010 2015 2020 2025 2030 2035 2040 2045 2050 2055 2060 LIFTING FILM INTO THE DIGITAL ERA By combining innovative research with well-proven technology, we have developed an OAIS compliant solution for digital preservation. We transform photo- sensitive film into a digital preservation medium, similar to what was done with magnetic tape some years back. Our solution is as easy to use as any other digital technology, but with a unique security, integrity and longevity.
  • 3. | open archival information system By turning film into a digital storage medium, we combine the well- documented preservation qualities of photosensitive materials with the accessibility enabled by operating within a standard IT infrastructure. MIGRATION-FREE By storing your digital data in archival file formats on our unique piqlFilm, repetitive migrations are no longer needed. You avoid the risk of migra- tion-related corruption and data loss, you’ll save time and get a more predictable long-term cost. FUTURE-PROOF We make data retrieval independent of access to specific technologies or ven- dors. For disaster recovery, all you need is a light source and any type of digital camera and computer. Readable text explains how to reproduce your files. PERMANENT Photosensitive storage medium are robust with proven long-term quali- ties, and piqlFilm is tested to together with its packaging to last for 500 years. Although your time perspective may be shorter, you can trust that your data will remain intact. UNALTERABLE Your data is preserved securely on a true WORM (Write Once, Read Many) medium, making it impossible to manip- ulate or delete recorded data. FLEXIBLE Depending on your needs you can store your data in computer readable digital format or as human readable text or images. You can also combine the two for additional security. SEARCHABLE Operated within a standard IT envi- ronment, your data is fully searchable. You’ll find what you need, whenever you need it. The best of two worlds
  • 4. | the service and process Transfer your digital data. We accept all file formats of any size, ranging from pure text documents to images and audio-visual contents. We write your digital data and metadata onto a secure, migration-free preserva- tion medium with proven long-term qualities; our high-resolution piqlFilm. The film is protected in our unique piql- Box. Select between storing the data in computer readable digital format or as human readable text or images. Your data is searchable and can be retrieved in minutes, whether you store the piqlBox yourself or let us do it for you. Readable text with source codes and file format specifications ensure future access regardless of availability to specific technologies or vendors. 1 2 3 How it works
  • 5. HOW WE PRESERVE YOUR DATA Preserving data is just as easy as storing to any other device or e.g. in the Cloud; the difference lays in the security, integrity and longevity of the solution. We use our high-precision piqlWriter to write your digital files and related metadata onto piqlFilm. Both digital and human readable storage of data is possible. The film is protected in a labelled piqlBox, which is tested together with film to ensure your data lasts for at least 500 years under ISO storage conditions. Our solution may be integrated into your existing digital preservation system or digital asset management system for easy search and access. | technology as enabler Piql Preservation Services are based on our certified turnkey solution which includes all equipment and processes needed for writing, storing and reading back your files. The tech- nology is developed in cooperation with some of the most renowned companies and institutions within their fields, such as Fraunhofer, Norner and IPI (Image Permanence Institute).
  • 6. HOW WE ENSURE LONG-TERM ACCESS We use the same methods for error correction as most other storage technologies. The formats and algorithms are printed on the film in both human readable and digital formats. It is of uttermost importance to us that all information needed to decode the data is available to those that may need it sometime in the future, so even the source code for the decoding software is stored on the reel. For additional security we can write file format specifications on the film. OUR STORY Since the start of the company in Norway in 2002, our passion has been to creatively challenge the industry standard within imaging and display technology. After having revolutionised the way the film industry prints their movies, our vision is to reshape data preserva- tion. Piql Preservation Services, enabled by our unique technology, is offered through a worldwide network of service providers. HOW TO READ BACK YOUR DATA When you request your file back, the correct piqlBox is collected from storage and placed on piqlReader. It will read the needed part of the film and decode the informa- tion before making the file available to you. You may also recover your files by using any compatible digital scanner and our open source decoding software. | technology as enabler
  • 7. | contact Piql AS Grønland 56 3045 Drammen NORWAY T +47 90 53 34 32 F +47 32 82 82 47 M office@piql.com W www.piql.com