PODCAST

The Workflow Show

The Workflow Show

The Workflow Show is CHESA’s bi-weekly podcast. Going into its ninth year, we interview industry experts, visionaries and
innovators; cover all the steps in the Media Supply Chain; share
tips; and offer some Workflow Therapy. This is our passion.

Subscribe and listen to the show also via Castos, Spotify, Stitcher, iTunes, Amazon, YouTube

Follow The Workflow Show on Twitter

#40 “How to Buy a DAM…and How Not To”

Are there right and wrong ways to purchase and deploy an asset management system? Ghost ships happen. Is there a failed MAM or DAM deployment adrift somewhere in your data center? Were you sold a side order of MAM with your last shared storage sys...

Play episode >>

#39 “Better, Faster, Stronger: Making Workflows Easier with MAM Solutions”

Primestream Co-founder and EVP Namdev Lisman has been candid about how media technology is supposed to make workflows easier, and that MAMs play an important role in that evolution. However, in a recent TV Technology article, he notes, “You’...

Play episode >>

#38 “The Codec Wars”

Join hosts Jason Whetstone and Ben Kilburg in this episode of The Workflow Show as they discuss “the codec wars” with Nick Smith from JB&A Distribution. Can you survive the ever-growing onslaught of new codecs? Is Nick Smith really from Earth...

Play episode >>

#37 “Workflow Therapy on the State of the Industry”

Does all the new technology for media management introduced tradeshow after tradeshow leave you adrift in a sea of information? Overwhelmed by all the tools creatives are asking for these days? Sounds like you need a little workflow therapy! The s...

Play episode >>

CHESA Resources

Blog

JAVA EXPLOIT - vulnerability with Log4j

Continue Following this Blog Post for Live Updates! On Friday, December 10, 2021, CHESA received notice that there is a vulnerability with Log4j. “Log4j is a Java-based logging audit framework within Apache. Apache Log4j2 2.14.1 and below are susceptible to a remote code execution vulnerability where a remote attacker can lever...

KEEP READING >>
Blog

How and Why CHESA Became an Adobe V...

KEEP READING >>
blog

The Path of One Woman in Media IT, ...

keep reading >>
Blog

How to Stay Motivated and Maintain ...

keep reading >>
blog

The Path to CHESA and My Mentors: A...

keep reading >>
Share this...
Share on LinkedIn
Linkedin
Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Email this to someone
email