Posts by Nancy Balois
Autodesk License Conversion
Today our topic is Autodesk licensing and the conversion from a network user to a named user. Several of our clients have had issues with the conversion, and we want to help others who are facing similar issues. Potential Difficulty with Conversion Autodesk is converting everyone from a network licensing model to a named user model, which requires using your email…
Read MoreWhat is the AEC Collection?
In this edition of Design Under Influence, we are unpacking Autodesk AEC Software Collection. It has 15 unique and interesting tools. We will discuss an overview of the collection, what is included, and give you the top three that may be the most useful to you. In addition, we discuss a few bonus applications. Overview of AEC Collection The AEC…
Read MoreRevit vs. SketchUp
Welcome to Design Under Influence. Today’s discussion is concerning Revit and SketchUp and why you may need one or the other to complete your project. What are some of the intricacies of the Revit and SketchUp platforms? A lot of people are familiar with these tools to some extent, and some are using them heavily. Autodesk owns Revit and Trimble owns SketchUp. Because Revit is…
Read MoreWhy Switch to Revit from AutoCAD or 2D Drafting
Revit – How to Choose the Right Version for Your Firm
Welcome to Design Under Influence. Today’s discussion centers on Revit. Revit is a software tool for architects and engineers. It is also used in construction. It is a good tool that lives throughout the lifecycle of the building. Revit’s database-driven approach (often called Building Information Modeling or BIM) has had a dramatic impact on the design and…
Read MoreEmployee Cybersecurity Training-Best Practices for Passwords.
School is now in session and today’s discussion is regarding best practices to manage your passwords and multi-factor authentication (MFA). Protecting your passwords is particularly important. You must go beyond the old-school approach of keeping a written list of passwords or storing them in your phone. The old-school approach is dangerous and can leave you…
Read MoreEmployee Cybersecurity Training –Mobile Phone Scams
Today’s discussion is regarding mobile phone scams. Since literally everyone is using computers and internet phones to conduct business, as well as manage our day-to-day lives, guarding against mobile phone scams is of great importance. You may be asking yourself, “What can go possibly go wrong with my mobile phone?” Since you have encountered no…
Read MoreEmployee Cybersecurity Training – Internet browsing and WiFi Scams.
Our subject today is how to avoid internet browsing and Wi-Fi scams. This subject is important because of the drive remote work or WFH, which we believe will continue in the future. Working remotely comes with a variety of scams. Our last episode covered scams that go through the email. Today we are discussing internet…
Read MoreEmployee Cybersecurity Training – Avoiding Email Scams
Most of us have been working from home for a year now, and as we move into some hybrid types of business environments, it’s important to remember that hackers are still out in force looking to take your business and your money and your attention. Today, we’re talking about how to keep them away from your…
Read MoreIT Defense vs. Offense for Architects
Today, we’re unpacking a subject that will help architects think and act on their competitive advantage, which is technology. The topic is this: IT offense versus IT defense and what each represents. Understanding IT Defense and Offense IT defense includes the most important pieces of technology infrastructure that your company requires for security, productivity, and…
Read More