PODCAST

The Workflow Show

The Workflow Show

The Workflow Show is CHESA’s bi-weekly podcast. Going into its ninth year, we interview industry experts, visionaries and
innovators; cover all the steps in the Media Supply Chain; share
tips; and offer some Workflow Therapy. This is our passion.

Subscribe and listen to the show also via Castos, Spotify, Stitcher, iTunes, Amazon, YouTube

Follow The Workflow Show on Twitter

#20 “Breaking Down the Options for the New Mac”

The powerful new Mac Pro is now available for sale, and it’s been quite awhile since we’ve been so excited about the release of a new Apple product. Yet, as has been the trend with Apple computers over the recent past, there are fewer areas th...

Play episode >>

#19 “Beyond Metadata: The Role of Audio and Video Search”

We recently conducted another of our small group “think tank” digital video workflow symposia in New York City at Quantum’s offices in Lower Manhattan. We spend a lot of time at Chesapeake Systems talking with our clients about metadata. It...

Play episode >>

#18 “An In-depth Conversation with Dave Helmly of Adobe”

Dave Helmly of Adobe joins us for this episode of The Workflow Show. Dave is universally recognized as “THE Go-To guy” at Adobe for all things Pro Video and Imaging. And in this episode, he talks at length with co-hosts Nick Gold and Merrel Dav...

Play episode >>

#17 “Where are we headed?” – A conversation with Jeremy Strootman of JB

We start our second season of our podcast series with a fun conversation with our good friend Jeremy Strootman, Senior Outside Sales Manager for the East Coast with media technology distributor, JB&A. We like working with people who are smart...

Play episode >>

CHESA Resources

Blog

JAVA EXPLOIT - vulnerability with Log4j

Continue Following this Blog Post for Live Updates! On Friday, December 10, 2021, CHESA received notice that there is a vulnerability with Log4j. “Log4j is a Java-based logging audit framework within Apache. Apache Log4j2 2.14.1 and below are susceptible to a remote code execution vulnerability where a remote attacker can lever...

KEEP READING >>
Blog

How and Why CHESA Became an Adobe V...

KEEP READING >>
blog

The Path of One Woman in Media IT, ...

keep reading >>
Blog

How to Stay Motivated and Maintain ...

keep reading >>
blog

The Path to CHESA and My Mentors: A...

keep reading >>
Share this...
Share on LinkedIn
Linkedin
Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Email this to someone
email