PODCAST

The Workflow Show

The Workflow Show

The Workflow Show is CHESA’s bi-weekly podcast. Going into its ninth year, we interview industry experts, visionaries and
innovators; cover all the steps in the Media Supply Chain; share
tips; and offer some Workflow Therapy. This is our passion.

Subscribe and listen to the show also via Castos, Spotify, Stitcher, iTunes, Amazon, YouTube

Follow The Workflow Show on Twitter

#28 Marquis Builds Video Workflow Bridges with Daniel Faulkner, Business Development Manager for Marquis Broadcast

There was a time when it made sense for a video facility to obtain its NLE, storage, archive, MAM and other sundry post-production workflow solutions from a single manufacturer.  That made for easy integration. But today, with more sophisticated,...

Play episode >>

#27 NAS vs. SAN Made Clear

What’s behind that seemingly innocuous small hard drive icon on the desktop of client workstations within a collaborative video post-production environment? The answer to that question is fundamental in determining the foundation of a facility’s ...

Play episode >>

#26 Talking Collaboration and MAM with Kai Pradel of MediaSilo

Kai Pradel, Founder and CEO of MediaSilo has always been excited about the intersection of IT and media, and in 2009, as the notion of software as a service (SaaS) in the cloud was in its infancy, he started Boston-based MediaSilo. And then things...

Play episode >>

#25 Quantum’s Alex Grossman and Skip Levens

Co-hosts Nick Gold and Jason Whetstone begin the third season of our popular audio podcast series with an in-depth, wide-ranging conversation with Quantum’s Alex Grossman and Skip Levens. Alex is the VP of Media and Entertainment at the company an...

Play episode >>

CHESA Resources

Blog

JAVA EXPLOIT - vulnerability with Log4j

Continue Following this Blog Post for Live Updates! On Friday, December 10, 2021, CHESA received notice that there is a vulnerability with Log4j. “Log4j is a Java-based logging audit framework within Apache. Apache Log4j2 2.14.1 and below are susceptible to a remote code execution vulnerability where a remote attacker can lever...

KEEP READING >>
Blog

How and Why CHESA Became an Adobe V...

KEEP READING >>
blog

The Path of One Woman in Media IT, ...

keep reading >>
Blog

How to Stay Motivated and Maintain ...

keep reading >>
blog

The Path to CHESA and My Mentors: A...

keep reading >>
Share this...
Share on LinkedIn
Linkedin
Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Email this to someone
email