fbpx

Episode 42: Chris Neto On Personal Branding & Being Mistaken For A Twitter Bot

Highlights From This Episode…

  • A great way to learn AV is to start on the end user/technology owner side.
  • High Speed Internet at home was the spark for growth in AV.
  • Keep a portfolio of your work and recommendations to present at job interviews.
  • Study personal branding to improve your social media effectiveness.
  • Social media is about building relationships by sharing information.

Mentioned In This Episode…

Altcomm, New York Giants, William Paterson University, Picturetel, Polycom, RCM Technologies Staffing, Schering Plough Pharmaceuticals, Merck, Novartis, Barco, Starin, Twitter, Joel Colm (Twitter book), AV Help Desk, Paul Konikowski

Books

One of the books Chris used to understand Twitter. (This is an affiliate link. Thanks for your support!)

Contact Chris

Twitter

Instagram

Rebels & Flux

LinkedIn

Episode 41: Bill Mullin On Ecosystem Development & What Makes AV Special

Highlights From This Episode…

AV focuses on the creative side of technology. That’s what separates us from IT; We help people tell their story and communicate ideas.

We can improve our offerings by looking at every step of the delivery and use lifecycles. A short training after the install isn’t enough.


System thinking includes considering every “user” in the supply and use chain. A company’s intentions are communicated at all of these touch-points.

To be scalable, standards are required.

Best practices and oversight increase reliability and improve the overall experience. Consider a Quality Of Service Manager position as a go to reference who helps everyone implement your guidelines. 

Look into Advance Supply Chains to increase sustainability and avoid “bone piles” of unused equipment.

AV is everywhere. It is still a specialty, but is becoming more of an expected and critical piece of building infrastructure.

Mobility and remote working catalysed the boom in huddle rooms to give mobile workers a touchpoint in the office (instead of a fixed desk).

Spend time considering where you fit in a Smart building and smart world. Survival is not about being the smartest or the biggest, it is about being adaptable.

Consider the application, vertical market, and venue. Does the application get it done? What vertical markets will have strong activity?Venue specialists can be successful but need to be able to interconnect. 

Be disciplined in what you do. Use software and agile project management to avoid waste and move adeptly.

Customer success = how much they love you in the end.

Map your workflow. Ask question like, “What are we going to do when we meet the curmudgeon?”.

Consider on-demand training because people don’t want information until they need it. The days of the lunch and learn are ending. 

Mentioned In This Episode…

  • Paul Konikowski
  • AVIXA
  • David Fitzgerald
  • Barco
  • Zoom
  • MCSI
  • Dante
  • QSys
  • Book: Draw To Win
  • Bobby Schwartz
  • Malissa Dillman

Episode 40: Michelle Loret On The #1 Priority In AV Sales

Highlights From This Episode…

  • Create new business by introducing yourself to customers already working with someone in case they need an alternative someday.
  • Handle change orders by presenting the facts and explaining why there is a cost associated with the request.
  • How to do a good site survey is an important part of AV sales training.
  • Sales teams need to respect engineering teams.
  • The information Sales gives to engineering determines the success of a project.
  • Don’t engineer without a budget.
  • Say Cat X or structured cabling when speaking with IT (don’t say CAT5).
  • For AV to become truly software-defined, devices need to commission themselves.

Mentioned In This Episode…

  • Ford AV
  • Graybar
  • Molex
  • Vidyo
  • LifeSize
  • Tanberg
  • Polycom
  • Appia
  • Revolabs
  • ClearOne
  • Extron
  • CDW
  • B&H
  • Barco
  • NASA   
  • Netstreams
  • Utelogy
  • Zoom
  • Cisco

Episode 39: Paul Konikowski on Investing in Cybersecurity & Culture

Highlights From This Episode…

  • Bring up security early in the process. IT is often treated as an afterthought in AV.
  • Assess the impact of each device being comprised. 
  • Consider access for each device. Who? How? Why?  Least resource or least route?
  • Consider if network connectivity is really needed for each device.
  • Perform role-playing to get better perspective of what a malicious actor could do.
  • Assess if users can accidentally cause a security breach, such as plugging in unknown USB sticks.
  • VLAN headers can be spoofed and should not be considered a security mechanism.
  • Close unused ports on all devices.
  • Enable device logging and monitor the logs for suspicious activity.
  • Consider messaging direction per device and disable a device’s ability to send or receive messages if not needed.
  • Being able to demonstrate internal security practices may reduce liability should an incident arise. *This is not legal advice 🙂
  • Create a culture of security awareness in your organisation through policies, training and compliance testing.
  • Perform internal and possibly public code reviews.  
  • Track data check-in and check-outs.
  • Incentivize reporting vulnerabilities through rewards programs.
  • AV as a cyber target is increasing in popularity.

Mentioned In This Episode…

Episode 38: David Anderson On Closing The Gap Between Consumer & Closed Platform Touchscreens

Highlights From This Episode…

  • When looking for a new business or partnership, look for something that is lacking in skills that you have.
  • Mimo monitors fills the gap between consumer and proprietary touch displays by offering an affordable standards-based solution that can be integrated into other platforms.
  • Products like Mimo Monitors continue to put pressure on AV integrators to be more than just hardware resellers.

Mentioned In This Episode…

AMX, Crestron, Extron, Google Meet, Utelogy,   

Episode 37: David Hirschfeld On Exposing Hidden Requirements & Software Product Lifecycles


Highlights From This Episode…

  • Knowledge of industry is a good indicator of potential success. Knowing the end customer and distribution channels is important.Knowing the market is not so important – that will be learned through the development process.
  • The Business Canvas is a 9 step process that can help determine the initial features of an app should be.
  • Creating functional prototypes that really represent the finished product (as opposed to wireframes) before writing any code, always exposes new requirements that are less expensive to implement in a prototype than finished code.
  • Other benefits of the prototype includes having a clear description for the developers and a working demo to show potential customers.
  • When planning a software product, make sure there is a budget for development of future versions based on user feedback from the initial version.
  • Software products are never done because if you stop developing and marketing, customers and revenue will fall off.
  • When choosing technologies, consider how data is stored and related, if scalability is important  (it’s probably not).

Mentioned In This Episode…

Texas Instruments, Allied Signal, Intel, Motorola, Tekyz, Zapier, Google Sheets, https://leanstack.com/leancanvas/https://www.axure.com, SQL, node.js. Redis, ElasticSearch, Mimo Monitors, Android, iOS, React Native, npm,  

Episode 36: Josh Srago On The Legal Side Of Bandwidth & Default Passwords

Highlights From This Episode…

  • 2015 Open Internet Bill Protects Browser Based Internet Traffic, but excludes VPN’s, Hardware Codecs and IoT Devices
  • Relying on the internet to provide a service introduces a 3rd party (the ISP). Contracts should consider reflecting this.
  • The California requirement for no default passwords goes into effect January 1st, 2020.

Mentioned In This Episode…

TEECOM, Zoom, Barco Overture, Utelolgy, Extron, University Of California Merced, Santa Clara University, 

Contact

Follow Josh on twitter @jsrago

Visit his website http://soundreason.org.

Episode 35: AJ Thompson On The Pains & Joys Of Learning Modern Programming

I met AJ Thompson from the LearnAVProgramming.com website. He enrolled in a bunch of courses over the past few years and we recently exchanged some emails where he told me about some interesting solutions he is working on.

He tells us about what it takes to move from traditional AV programming to modern software tools and more importantly – why you would want to.

Mentioned In This Episode…

Crestron, AMX, Extron, NodeRED, Udemy, Academind, Mosh, Digital Resources 

Episode 34: Robin Ford on Open Systems, Preparing for Change & Trusting Your Instincts

Today’s guest is Co-founder and VP of business development at Global Cache. Global Cache makes connectivity products that let programmers like me control and automate pretty much anything using whatever software we like.

In an industry full of propriertary solutions, this is quite the unique approach. That’s why I am really looking forward to learning a lot today from Robin Ford.

Episode 33: Dr. Jonathan Butts & Billy Rios On Cyber Security, Public Safety & The Layers Of Defense

I have the honour of having two cyber security experts on the show today.

Dr Jonathan Butts is a retired Air Force officer who among many other roles served as Research Director at the Air Force Center for Cyberspace Research.

Billy Rios has held security positions with companies like Ernst & Young, Verisign and Microsoft. He probably had one of the coolest sounding job titles as Google’s Security Ninja.
Both Jonathan and Billy are currently Managing Partners at QED Secure Solutions, whose mission it is to advance Cyber Security and Critical Infrastructure Protection.

Highlights From This Episode

  • Anyone can purchase hardware or software and spend as much time as they can afford learning how it works
  • There are three layers of security, The Vendor, The Systems Integrator and The Technology Owner
  • All three parties need to work together to create a secure solution – it is a team game
  • One defensive strategy is identifying critical systems and segmenting them from other systems
  • The biggest security weaknesses are usually in the system configuration
  • Security exploits can include Terrorist Threats, Public Safety, Critical Data Breaches and Unauthorized Usage of Computing Cycles
  • The public safety aspect of the IoT may spur some regulations for security requirements
  • Using a third party IoT platform does not shift risk away from stakeholders
  • Raising awareness among Management and Leadership Stakeholders is the best way to make security a priority

Mentioned In This Episode

QED Secure Solutions, IBM, War Games, Microsoft, Google, Sochi Winter Games, Crestron, Defcon, BlackHat Conference, Department Of Homeland Security, Microsoft IoT, Amazon IoT, Ubuntu Core