BLOG

Your Dose of Workflow Therapy from CHESA

Our Blog on All Things Media Workflow

Our knowledge base contains tactical, actionable articles that offer invaluable insights to Media & IT decision makers. We share with you our experience, lessons learned, and best practices gleaned from our daily work in the industry.

Cloud Storage for M&E: Don’t Let the Buzz Sting You

By Chris May, Director of Business Development – Northeast

Considering the changes to the business in media and entertainment, and the technologies associated with managing their digital media supply chain, it’s not surprising to see many of our clients wanting to take a fresh look at their video...

KEEP READING >>

An Exploration of Object Storage for Media-Centric Workflows

By Jessica Mantheiy,

Object storage offers a new paradigm. As a data storage system, it is something that can be installed on site, but it is also the basis for most of the storage available on the public cloud. However, its use as a valuable technology in M&am...

KEEP READING >>

The Cloud: Inherently, Unpredictably Transformative

By Jessica Mantheiy,

At Chesapeake Systems, we’ve been moving “the edges” of our clients’ infrastructure to the cloud for some time now. Some use cloud storage to collect assets from the field, which are then fed into the central management platform (of...

KEEP READING >>

Artificial Intelligence: Should You Take the Leap?

By Jessica Mantheiy ,

In Hollywood, the promise of artificial intelligence is all the rage: who wouldn’t want a technology that adds the magic of AI to smarter computers for an instant solution to tedious, time-intensive problems? With artificial intelligence,...

KEEP READING >>

CHESA Resources

Blog

JAVA EXPLOIT - vulnerability with Log4j

Continue Following this Blog Post for Live Updates! On Friday, December 10, 2021, CHESA received notice that there is a vulnerability with Log4j. “Log4j is a Java-based logging audit framework within Apache. Apache Log4j2 2.14.1 and below are susceptible to a remote code execution vulnerability where a remote attacker can lever...

KEEP READING >>
Blog

How and Why CHESA Became an Adobe V...

KEEP READING >>
blog

The Path of One Woman in Media IT, ...

keep reading >>
Blog

How to Stay Motivated and Maintain ...

keep reading >>
blog

The Path to CHESA and My Mentors: A...

keep reading >>
Share this...
Share on LinkedIn
Linkedin
Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Email this to someone
email