BLOG

Your Dose of Workflow Therapy from CHESA

Our Blog on All Things Media Workflow

Our knowledge base contains tactical, actionable articles that offer invaluable insights to Media & IT decision makers. We share with you our experience, lessons learned, and best practices gleaned from our daily work in the industry.

Working From Home – A Cautionary Tale

By Matt Killmon, Senior Engineer

A little over a year ago, I moved from my long-time home in the DC Metro area to Durham, North Carolina. This move was made possible largely by CHESA’s pre-existing geographically diverse client base, where most day-to-day work is done re...

KEEP READING >>

Business as Usual: More Important Than Ever, Even If It Takes Extra Planning

By Jack Wyrick, Business Development

Coffee – check! Power cable plugged in – check! Favorite home-office chair – check! Remote access to media – check??? While COVID-19 is testing the flexibility and preparedness of media teams around the world, enabling and emp...

KEEP READING >>

E-book: Practical Security Tips

By Sierra O'Connor ,

Don’t become the next security breach headline. “Practical Security Tips” will show you how to stay safe. In this e-book, Chesapeake Systems’ security expert, Terry Melton, takes you through key steps for keeping your systems, ac...

KEEP READING >>

Planning Ahead for 2020: Digital Content Challenges for Post Production

By Luis Sierra, Senior Workflow Consultant and Project Manager

Devising digital media workflow solutions with the future in mind is what we do here at Chesapeake Systems – diving deep into the latest products and technologies and thinking about their implications for the road ahead. Now that we are h...

KEEP READING >>

CHESA Resources

Blog

JAVA EXPLOIT - vulnerability with Log4j

Continue Following this Blog Post for Live Updates! On Friday, December 10, 2021, CHESA received notice that there is a vulnerability with Log4j. “Log4j is a Java-based logging audit framework within Apache. Apache Log4j2 2.14.1 and below are susceptible to a remote code execution vulnerability where a remote attacker can lever...

KEEP READING >>
Blog

How and Why CHESA Became an Adobe V...

KEEP READING >>
blog

The Path of One Woman in Media IT, ...

keep reading >>
Blog

How to Stay Motivated and Maintain ...

keep reading >>
blog

The Path to CHESA and My Mentors: A...

keep reading >>
Share this...
Share on LinkedIn
Linkedin
Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Email this to someone
email