PODCAST

The Workflow Show

The Workflow Show

The Workflow Show is CHESA’s bi-weekly podcast. Going into its ninth year, we interview industry experts, visionaries and
innovators; cover all the steps in the Media Supply Chain; share
tips; and offer some Workflow Therapy. This is our passion.

Subscribe and listen to the show also via Castos, Spotify, Stitcher, iTunes, Amazon, YouTube

Follow The Workflow Show on Twitter

#24 A Conversation with Gary Watson of Imation/Nexsan

In this episode Nick Gold and new co-host Jason Whetstone talk with Gary Watson, the co-founder and CTO of Nexsan — now with the added title of Imation Fellow as  Nexsan was acquired by Imation in 2013. Gary is one of those brilliant technica...

Play episode >>

#23 MAM Project Planning & Integration

This episode of The Workflow Show is a recording of the opening panel discussion at our MAM Project Planning and Integration Symposium held in New York City on June 24, 2014. The panel was moderated by Nick Gold, Director of Business Development,...

Play episode >>

#22 “Examining the success and future of CatDV” with CEO Dave Clack

CatDV was one of the pioneer platforms in the Media Asset Management space, and today it is one of the most deployed MAM solutions in the world. Nick and Merrel had a chance to sit down with CEO Dave Clack to talk about the plaftorm’s success and w...

Play episode >>

#21 “Exploring digital video management and workflow automation” with Danny Gold of Reach Engine

In this episode of The Workflow Show, Nick and Merrel talk at length with Danny Gold, one of the co-founders of Levels Beyond, the company behind the all-encompassing digital media management and workflow automation platform, Reach Engine. T...

Play episode >>

CHESA Resources

Blog

JAVA EXPLOIT - vulnerability with Log4j

Continue Following this Blog Post for Live Updates! On Friday, December 10, 2021, CHESA received notice that there is a vulnerability with Log4j. “Log4j is a Java-based logging audit framework within Apache. Apache Log4j2 2.14.1 and below are susceptible to a remote code execution vulnerability where a remote attacker can lever...

KEEP READING >>
Blog

How and Why CHESA Became an Adobe V...

KEEP READING >>
blog

The Path of One Woman in Media IT, ...

keep reading >>
Blog

How to Stay Motivated and Maintain ...

keep reading >>
blog

The Path to CHESA and My Mentors: A...

keep reading >>
Share this...
Share on LinkedIn
Linkedin
Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Email this to someone
email