BIM vs IT Friction: Security and Efficiency in the Cloud Era
If you have questions or need help please reach out to us. https://getarchit.com
00:08 Introduction to ARC it
03:40 Navigating BIM and IT: Addressing Friction in Technology and Collaboration
23:35 Understanding Access Levels in Autodesk Construction Cloud
47:28 Navigating Leadership Dynamics in Construction Technology
51:29 Navigating Data Risks in Cloud Services
Transcript
Foreign.
Speaker B:Ladies and gentlemen, welcome to another episode of Design and Influence where we argue amongst ourselves and find solutions.
Speaker B:And you are privy to those arguments and discussions and hopefully we hope that some of it will help you out in your own situation, your own business, specifically if you're running architecture firm.
Speaker B:And also, we are just a bit about ourselves.
Speaker B:We are an IT company called ARC it.
Speaker B:We focus on solving IT for architecture, architecture, design and engineering companies.
Speaker B:My co hosts, My co hosts speak a lot more eloquent and they're managing BIM for architecture and design firms as well.
Speaker B:And welcome, Liz.
Speaker B:Welcome, Megan.
Speaker A:Thank you.
Speaker A:Hello.
Speaker B:My co host today is Boris Rapoport, who's the founder and CEO of ARC it.
Speaker B:And today we're doing battle.
Speaker C:Okay.
Speaker B:Today is BIM versus IT Friction.
Speaker B:Who has control all those things.
Speaker B:But, you know, as Megan says, not that bad.
Speaker B:It's all we can all get along and now we're going to figure out how to get along.
Speaker B:Boris is going to represent the IT side because our job is what is our motorboris.
Speaker B:We solve it so our clients can focus on doing their best work.
Speaker B:Now, security breaches, issues with access, that's basically distracting you from doing your best work because you have to worry about this stuff.
Speaker B:And so we want to prevent it.
Speaker B:Now, Megan here and Liz, they're trying to push projects out the most efficient, effective way, get all the stakeholders to be able to contribute to the project, get it out the door and get you paid.
Speaker B:Okay, so there's a friction.
Speaker B:Maybe Megan, you can kind of introduce us into this friction since you were the initiator of this whole conversation and then maybe give us a story.
Speaker A:Sure.
Speaker A:Well, I think it even starts with how we started talking.
Speaker A:Right.
Speaker A:I started working for a structural engineering company.
Speaker A:And during the first week, of course, I am talking with you guys, learning how everything's set up, getting VPN access if I need it, talking about the Autodesk licensing and how we can work with that, and getting emails set up and integrating into the office so that I can help this client.
Speaker A:And that happens with most of our clients.
Speaker A:We end up right out the gate talking with you guys.
Speaker A:So right out the gate we need to work with each other.
Speaker A:And this happens for most of our clients.
Speaker A:And we have now come across with some of the newer technologies.
Speaker A:For our prime example is Autodesk Construction Cloud, where we have potentially some education and some growing to do around.
Speaker C:Nice.
Speaker B:I just like butter, man.
Speaker D:Smooth.
Speaker A:I want everybody to be friends.
Speaker A:Uh, we basically need, we need to understand each other's side when it comes to this new technology so that we can do what we do best and you can do what you do best.
Speaker A:And I think that's the whole point of this, this topic and this podcast today is to try to ease both sides in their concerns and their.
Speaker A:What are they afraid of is going to happen if these things aren't locked down?
Speaker B:So, so the.
Speaker B:Let me summarize this.
Speaker B:The success looks like.
Speaker B:And I'm kidding with Megan, but she, she's on point, you know, because you have to.
Speaker B:It's not only you trying to help a client ship, ship, product, project.
Speaker B:You know, you're also, you're also fighting, fighting access.
Speaker B:You know, those, those are like nasty battles and, and they just take extra time and, and money on both sides.
Speaker B:But what the success looks like is maybe we can come up with a framework today.
Speaker B:And I swear, we haven't really done this yet.
Speaker B:This is going to be on air right now in real time.
Speaker B:If there's a solution to be had, perhaps we can at least map how that may look like between BIM and IT and how other firms can think about getting.
Speaker B:Still being secure, locking down, making sure the business is secure, but also providing the necessary access for BIM managers to do their work.
Speaker A:I love it.
Speaker E:Yeah.
Speaker D:Okay.
Speaker C:Yeah.
Speaker B:All right.
Speaker B:Who wants to.
Speaker B:I thought we.
Speaker B:You were going to start us with a story of some kind.
Speaker A:A stor.
Speaker A:I could start with a story.
Speaker D:Okay.
Speaker A:First off, and I actually, I have questions because I. I understand enough about IT to talk to you all, but, you know, there's a certain level that, you know, is way beyond what I know and what I'm an expert in.
Speaker A:So when we're talking about this new way of working, which is kind of taking over the industry, working on the Autodesk construction cloud, it really has changed how offices work.
Speaker A:They used to work internally on their own servers, on their own folder file systems.
Speaker A:And there really wasn't this, like, access to the outside world unless someone emailed a file out.
Speaker A:But now we have Boobeam Studio.
Speaker A:We have cloud versions of most of our PDF documents.
Speaker A:We have cloud versions of now, these revit models or design models that we're collaborating on with the whole team up in the cloud.
Speaker A:So it is no longer just this, like, internal system that you all can lock down, where the only way out was if one of the employees emailed something to someone that they weren't supposed to or someone got in.
Speaker A:And I guess that would be a question.
Speaker A:Kind of a good place to start, you know, back in the old way of Setting things up, your concerns and how you really approach that.
Speaker A:And how is it different now in the Autodesk Construction Cloud and Bluebeam Studio World?
Speaker C:Boris, besides just taking those two services.
Speaker D:I think we need to, as you.
Speaker C:Said, this is the new way to work.
Speaker D:And I think IT departments are now.
Speaker C:Instead of trying to manage security just.
Speaker D:For hey, anything that's in the office is inside.
Speaker D:Anything that's out of the office is considered outside.
Speaker C:There's this new way to work.
Speaker D:The cloud is still considered inside, for example.
Speaker C:And also you, your home that you.
Speaker D:Are accessing that information from is also.
Speaker C:Considered part of the network as opposed.
Speaker D:To just being outside of the network.
Speaker D:So IT people have to worry about a lot more things and making sure.
Speaker C:That whenever for if the data is.
Speaker D:Accessed from a location or a device, that device has some baseline levels of security so that they don't accidentally.
Speaker D:Right.
Speaker D:Bring in a virus or something that.
Speaker C:Is, that is bad juju basically for the company.
Speaker D:Right.
Speaker C:And in fact, you know, infect the.
Speaker D:Files, infect the files in the cloud and so on.
Speaker D:And yes, I mean.
Speaker C:Cloud providers could say, hey, we have these security measures.
Speaker D:In place, hey, we scan all the data for any viruses and so on.
Speaker D:It doesn't always happen like that.
Speaker C:So I think that's where the concerns.
Speaker D:Of many IT departments lies, is the fact that they now basically.
Speaker C:Any location.
Speaker D:Or device that has access to the company data needs to be as secure as possible.
Speaker A:I have follow up questions.
Speaker C:Sure.
Speaker A:Exactly.
Speaker A:Could you explain to me how would a virus get into, let's say Autodesk Construction Cloud?
Speaker A:And has that ever happened and do we have a dialogue with Autodesk or have any sort of guidelines out there that explain how that could happen and how to prevent it?
Speaker A:Because I've actually never ever heard of that happening.
Speaker C:So I haven't heard of Autodesk Construction Cloud, but I have heard of other.
Speaker D:Cloud services like either the Microsoft Cloud.
Speaker C:Or the Google Cloud, but the mechanisms are the same.
Speaker C:You're basically right.
Speaker D:So you're using Autodesk Desktop connector to sync files between your computer and the cloud.
Speaker C:But if your computer gets infected with.
Speaker D:The wires, technically any one of those files can get infected as well and then sync up to the cloud.
Speaker D:So like, and then what happens and what happens?
Speaker D:Depending on what the virus is, it can start encrypting the rest of the data or another person can download that file and now get their computer infected.
Speaker D:And that's how it spreads through the organization.
Speaker A:Does it spread through like PDF files or Excel files or is it like A specific file type that you go to upload, that spreads it can be.
Speaker D:Any type of file.
Speaker D:I mean, the bad guys are really, really smart about how they do it.
Speaker D:PDFs definitely, like any PDF can be, can have Java code encrypted in it.
Speaker D:And in fact, many kind of the.
Speaker C:Email PDFs that get.
Speaker D:That have, let's call, weaponized PDFs, right?
Speaker D:So basically somebody sends you a link.
Speaker C:With a PDF and says, hey, review this proposal.
Speaker D:And then somebody clicks on that PDF automatically.
Speaker D:The system gets it.
Speaker D:That happens.
Speaker D:See that happen?
Speaker A:And what's.
Speaker A:So like, in my understanding, the two main ways that, like, hackers are trying to get you is they either want to corrupt all your data to screw you over, or they want to grab your data and lock it down and get you to pay money to get it back, so on.
Speaker A:Like for this PDF version, can either one of those happen?
Speaker C:So yes and no.
Speaker C:So what you're, what you're looking at.
Speaker D:Is the outcomes, right?
Speaker C:So those are the outcomes they're looking for.
Speaker C:But in order to achieve those outcomes.
Speaker D:There'S a lot of.
Speaker C:We're going deeper in a security discussion.
Speaker B:Let's go, let's go.
Speaker A:This is what I, this is what I've needed because no one really has been able to answer these questions when I ask them, or they just think I won't be able to follow a.
Speaker C:Lot of quote unquote prep work, right?
Speaker C:If a bad guy's, you know, let's.
Speaker D:Call it a group, right?
Speaker D:A threat actor, identifies a target.
Speaker C:A lot of these things, you know, the PDFs that we're talking about, for example, it's part of the prep work.
Speaker C:So what they can do is that PDF.
Speaker C:You open it, a piece of spyware.
Speaker D:Gets installed on your machine.
Speaker D:You don't know about it, but what they start doing is kind of monitor your machine, monitor your email, monitor your communications.
Speaker D:And then once they have like a.
Speaker C:Great subset of data, they can then.
Speaker D:Achieve the next level.
Speaker C:The next level is not necessarily going.
Speaker D:After your files, but it could be an email.
Speaker D:So let's say you're working with a client.
Speaker D:So it could be an email to.
Speaker C:Your client saying, hey, you know, you haven't paid this invoice for $30,000, by the way.
Speaker C:Here's the new, you know, bank account.
Speaker D:Information that you should send the money to.
Speaker D:That's how they get paid off, right?
Speaker D:Your client falls for it.
Speaker D:It's an email that you click.
Speaker D:It's found from you.
Speaker D:They send them the mighty, and they.
Speaker B:Know the invoices you may have already had the conversation about.
Speaker C:It'S spyware installed.
Speaker C:It's not necessarily like the ransomware that kills.
Speaker C:Like, those are the big things that.
Speaker D:We hear about is these little things.
Speaker C:And about like monitoring the conversations about discovering, you know, how you work, how you talk, what you do.
Speaker C:Right.
Speaker C:Like, those are, those are just.
Speaker C:There's basically like three levels of those scam emails.
Speaker D:Right.
Speaker C:Ones that are really, are designed for just click, hey, send the money.
Speaker C:You know, they're.
Speaker C:They're basically designed for people that are.
Speaker D:Gonna fall for it.
Speaker C:They have spelling mistakes.
Speaker C:They're just like, totally, like, if you had any experience, you would say this is ridiculous.
Speaker D:Who fall for it all.
Speaker C:There's specific.
Speaker A:All those phone calls I get where I'm like, yeah, no, click, yeah.
Speaker C:Filtering for those people with low enough IQ that will fall for it.
Speaker C:And usually the ask is not that much.
Speaker D:You know, it's a few hundred bucks here and there.
Speaker C:But they're doing it as a wiring thing.
Speaker C:Then there's more sophisticated docs and the very sophisticated ones are the ones that have their targets identified and they're sitting there taking monitor for like six, eight months.
Speaker C:And they're there to basically get one big one.
Speaker C:They will talk exactly how you talk.
Speaker D:They would sound like you do through email that will have your signature that.
Speaker C:It will look exactly like it would.
Speaker D:Be coming from you.
Speaker D:It's.
Speaker D:It's not.
Speaker D:Yes.
Speaker D:In your case, I don't know how much you guys are charging or billing your plans, but like in our case, right.
Speaker D:It's thousands of dollars.
Speaker C:But especially in the construction industry, a contractor gets hacked like that and their.
Speaker D:Client can send them $500,000 check.
Speaker A:Yeah.
Speaker A:So my question though is, is in terms of security for the old systems, the way it used to be.
Speaker A:Emails, which this is emails and computers and networks that people are working on that allow these things to get in.
Speaker A:They're not necessarily coming or because of people having access to these new cloud services and your security and your agents on all of the employees computers should catch these things and kill them, right?
Speaker D:Correct.
Speaker C:So I guess more or less, yes.
Speaker A:Okay.
Speaker A:So if, if a threat were to come through a PDF and infect a computer that had an agent on it from you guys, your defense systems should be able to handle that.
Speaker A:Really.
Speaker A:It's.
Speaker A:The cloud is just like email, where it is the mode of transportation.
Speaker D:Yeah.
Speaker A:And that's the concern.
Speaker C:Transmission mechanism.
Speaker C:That's a concern.
Speaker C:And especially so if I have all.
Speaker D:These things installed on the machines that.
Speaker D:Right.
Speaker C:As an IT department If I have.
Speaker D:All these things installed in the machines that we manage, I quote, unquote, feel safer.
Speaker D:Obviously nothing is 100% and right.
Speaker C:New threats come out all the time.
Speaker D:And technology is not always catching those.
Speaker D:Right.
Speaker D:So that's how we see these things happen.
Speaker D:Still, it would be nice to say we've put a stop to this now.
Speaker D:That's it.
Speaker C:But because I, you know, we're also.
Speaker D:Talking about you in a consultant role and there's not fully, and you know, you can correct me if I'm wrong, but as an IT department, I don't have control of your machines.
Speaker C:Right, right.
Speaker D:If there is a threat actor that has infiltrated your machine and then is sitting there monitoring, well, now they may.
Speaker C:Have a key logger installed.
Speaker C:If you have all this access into their systems as you're logging in, they.
Speaker D:Can gain access to their systems as well and then start other things, other bad processes that can possibly.
Speaker B:Interesting.
Speaker C:This is the, like, this is the point of view that I'm making from.
Speaker D:Inside of the IT department.
Speaker A:Yeah.
Speaker C:They want to have as much control.
Speaker D:As possible over anybody or any device or any location that is accessing their files.
Speaker D:Because that's the, in their mind or in our mind, I guess, collectively, that's.
Speaker C:The only way we can help prevent.
Speaker D:Some of the bad things that can happen to a company.
Speaker A:So that makes a lot of sense.
Speaker A:Thank you for breaking that down.
Speaker A:And what I want to do is further dive into like how Autodesk Construction Card is working and how firms are using it right now.
Speaker A:Because a lot of times in the way that Autodesk set it up originally, you're actually being invited to a whole other company's hub to work.
Speaker A:Your data sits there.
Speaker A:You don't even have access to it unless they give it to you.
Speaker A:Which this is a plug for our bridging conversation a few months ago that now you can work on your own hub with your own dat, like permissions to your own data and you can control all of that locally.
Speaker A:But so then the fear about sharing files and using these cloud based systems to host project data, the fear there is that it's going to be shared access, is going to be shared with people that shouldn't have access.
Speaker A:That's the, that's the main concern that I've gotten from it.
Speaker A:The IT side.
Speaker A:Now I like to compare back to email.
Speaker A:So like if you trust your employees to email and you don't lock down what they can and cannot email, like you can send an email with a PDF attachment to anyone.
Speaker A:You guys don't lock that down right when you're just an employee sitting at a company.
Speaker A:So these cloud based systems and projects where if an employee invites someone from outside the firm into the project, they now have access to that data.
Speaker A:And in the Autodesk construction cloud, which is really great and I think even better than email or just regular PDFs is there's this activity log.
Speaker A:You can see who was added, who opened a file, who even looked at a file, who downloaded a file.
Speaker A:Everything about that file is now documented.
Speaker A:So in, in from your perspective, is that not better and more secure than just like traditional email sharing the way we used to with Dropbox links or you know, whatever because you're able to monitor that.
Speaker A:I, I'm guessing like a little.
Speaker A:But it's not as like just right there for anybody to look at.
Speaker A:Like you could quickly say hey, who's downloaded this file on this construction cloud?
Speaker A:And you can see everything that has happened up in every project.
Speaker A:And Liz could, Liz can show you.
Speaker A:So yeah, no, we haven't pulled up.
Speaker C:Let's do it.
Speaker C:Let's pull.
Speaker C:Let's hope pulled up.
Speaker C:I know I have, I have reviewed that activity log and I know that.
Speaker D:It exists but maybe we should share it with the audience.
Speaker A:Yeah.
Speaker A:And I think it's similar to like Blue Beam Bluebeam cloud studio sessions and all of that.
Speaker A:It you also every single like person, it, everything they do is logged.
Speaker A:So I think like these cloud systems are actually more secure than the old server based systems.
Speaker A:Right.
Speaker A:Where you could just take a file and send it to anyone via email.
Speaker A:Now if you do everything up here, it's tracked and documented.
Speaker C:Absolutely.
Speaker C:So I want to be.
Speaker C:And Liz, do you want to walk us through the log or are we just.
Speaker E:Yeah, I mean we can just really quickly the ACC project.
Speaker E:But over here on the three little dots you have your view file activities like Megan was talking about.
Speaker E:And you can export the log which is great and filter on as soon as it reloads.
Speaker E:Here it was loaded a second ago.
Speaker E:You can see that it sorts it by the most recent activity.
Speaker E:And of course now it's not going to.
Speaker E:Let's try it one more time.
Speaker E:But what it was also showing was bridging files because this project is bridged to an external company.
Speaker E:So two companies have bridged with each other and are sharing files back and forth.
Speaker E:So you can see that and you have a link to that bridge here.
Speaker E:And you can see that also was bridged in do this project.
Speaker E:So that's quite good.
Speaker E:And also the Other powerful thing we didn't talk about here in this discussion, what we had before is I would say the version history of the file too, which is great to have for us as designers.
Speaker E:So that's super to have.
Speaker E:And then the last thing as we mentioned bridging and we want to plug our other podcast again is the.
Speaker E:This is bridged and to another company.
Speaker E:And you can see here as well what's being sent back and forth.
Speaker E:And you can also see this activity log here.
Speaker E:Yeah.
Speaker E:Is there something else you wanted to mention about this, Megan?
Speaker A:No, I think all that's great.
Speaker A:And I just want to point out that in the activity log it mentions like minute things like if someone even looks at a file, you know about it, which I think is really great.
Speaker A:And I think, I guess my question still is.
Speaker A:I understand now, okay.
Speaker A:Like let's say I get a PDF from a hacker and I.
Speaker A:It's a really smart one, so I don't realize that I.
Speaker A:That it is.
Speaker A:And I download it and I upload it to Autodesk docs.
Speaker A:I'm curious what features and I'm sure they have some that Autodesk has that will basically say, no, you can't upload this file.
Speaker A:It's got a virus, it's got a.
Speaker A:It's got this JavaScript attached to it.
Speaker A:Do you know, like from that side of things what their security measures are?
Speaker C:We haven't tested any of this.
Speaker D:And sometimes, you know, the pessimists in me will say, don't ever trust the service provider until you've proven that that's the case.
Speaker D:Just because like, you know, there's.
Speaker C:There's been a lot of real world.
Speaker D:Examples where some of the things that any service provider have said has not been.
Speaker C:But from what I heard is they're.
Speaker D:Supposed to be scanning for viruses and making sure that none of the bad files get uploaded to that cloud.
Speaker D:Haven't heard of any instances where that's not the case.
Speaker D:So I have not heard.
Speaker A:Yeah, and neither have I where their.
Speaker D:Cloud have been infected.
Speaker D:But I want, you know, I want some.
Speaker C:Yes, I'd love to see some proof.
Speaker D:Maybe they can come out with a, with a video that shows, hey, this is.
Speaker A:I'm sure they have it somewhere.
Speaker A:I mean, I'm sure we're not the person.
Speaker C:All my conversations about Autodesk construction cloud.
Speaker D:Has been with salespeople and you know, salespeople always say, oh yeah, we have that.
Speaker D:We also have like backups on backups of backups.
Speaker D:We also have an necessarily test.
Speaker D:So I will only say that as.
Speaker C:Far as I know, they have these.
Speaker D:Features, But I can't 100% say that they do.
Speaker A:Gotcha.
Speaker A:Yeah.
Speaker B:So can we try to understand.
Speaker B:I really, I think we need to deliver on this because the one specific thing we talked about was the admin level of access.
Speaker B:Now we sort of, I think we've assessed what the potential threats might be.
Speaker B:Now let's talk about mitigation and actually kind of coming together to solve this or to come up with some kind of a good solution that people can think through.
Speaker B:You need admin access, correct?
Speaker A:Yeah.
Speaker A:So with Autos Construction cloud, there's two types of access for each project.
Speaker A:You can have a member only access or project admin access.
Speaker A:Project admin access allows you to use features like bridging.
Speaker A:And then on an account level, there's access required to set up things that we've talked about in other podcasts, the plug for the add ins with the Autodesk, the libraries that are available up there now, and the more advanced features that are meant to like, expedite project delivery.
Speaker A:So there's the project admin that allows you to now use bridging and invite members.
Speaker A:That's the big one, is that they want people to stay only project members where they do not have the ability to invite other people to the project.
Speaker A:That's their biggest fear.
Speaker C:I guess the specific challenge we're talking.
Speaker D:About is, right, your ability to be an admin in the Autodesk construction.
Speaker A:There's two admins, so project versus account admin.
Speaker D:Okay.
Speaker A:And I'm saying that BIM people, bim, BIM managers, anyone working in the BIM world should have access to both.
Speaker D:I don't see why not.
Speaker C:So, I mean.
Speaker A:Good answer.
Speaker C:No, I'll be, I'll be honest.
Speaker C:Right.
Speaker C:Really?
Speaker C:I mean, we've talked about, right, Security.
Speaker D:Concerns and all the other stuff, but the reality is there is a scale of, on the one hand you have the security, on the other hand you have efficiency and the ability to produce work that is always a fine balance that needs to be constantly adjusted to ensure that the environment stays as secure as possible in that moment.
Speaker D:But also.
Speaker C:We'Re able to do the.
Speaker D:Work that we need to do and as quickly as possible.
Speaker D:There's project deadlines to be had, you need to meet the deadlines.
Speaker D:There has to be things that can be put in place to make sure that that's done as secure as it.
Speaker C:Could be, and you can meet the.
Speaker D:Deadlines as efficiently as possible.
Speaker C:So from that standpoint, like if we.
Speaker D:Just look at this particular issue with administrator access.
Speaker D:I mean, I'll be honest.
Speaker C:Yes, anybody who's in charge of bim.
Speaker D:Anybody who's a BIM manager along with it, right.
Speaker D:Dorothy Sung, People in IT should have full access to both the account and well subsequently you can make yourself then a project manager and the project in there.
Speaker C:I can see, again, we can see that there may be security concerns with.
Speaker D:That, but if we don't have that and it's not allowing the team to do their work as best as possible, then what's the point?
Speaker C:What are we trying to secure?
Speaker D:Right.
Speaker D:At some point the business suffers, the business loses and maybe even we're not.
Speaker C:Going to go too extreme.
Speaker D:But because the business suffers so much and not delivering on time, you know, there's not much things to secure it.
Speaker A:And how would you.
Speaker A:Do you agree with my analogy that like if you allow your employees to have email where they can technically send anything to anyone, that allowing them to have this project admin access where their biggest features is them adding someone into the project who might have access to the data for a second before someone realizes that they shouldn't because everything's tracked.
Speaker A:Do you see that being less of a threat almost than an employee having email access and access to a server that has all your files versus this like more controlled cloud based system?
Speaker C:So if the challenge is data loss.
Speaker D:Prevention, then yes, you're absolutely right.
Speaker D:The Autodesk construction cloud and any cloud for that matter.
Speaker D:Right.
Speaker D:Cloud service has a lot more controls in place against that happen as opposed to email where it's wide open, you can send anything to anybody.
Speaker C:So yes, I would agree with that.
Speaker D:That that's the only thing that is of concern.
Speaker B:But who does this.
Speaker B:Sorry, interrupt, but who does this argument or not argument, this, this kind of versus this analysis, who does it help?
Speaker B:I mean, are you trying to convince principals to allow BIM that level of access?
Speaker B:Are you trying to convince other IT providers by giving this, this sort of comparison?
Speaker C:Who's the question for?
Speaker B:Oh, it's for Megan Meghan.
Speaker C:Correct.
Speaker A:So yes, I'm trying to convince it.
Speaker A:Yeah, IT providers that are nervous about these new systems that they potentially don't understand and have locked them down away from the employees and it's inhibiting their ability to deliver projects because it's, it's these administrators, they see the word administrator and they automatically assume that it should not be access given to anyone.
Speaker A:But like high app project managers who actually don't even know how to use the system, it's the BIM people that do.
Speaker B:If I may give you my opinion on this.
Speaker B:If I'm an it, which I am, and you're giving me this sort of.
Speaker B:This sort of analysis or comparison, I'm almost like I'm going to feel a little bit underappreciated to say the least because this is a position where your stance is like, I really don't understand what's going on.
Speaker B:And I'm doing this out of my.
Speaker B:Potentially out of my own fear of what's new and stuff like that.
Speaker B:Is there like.
Speaker B:I know.
Speaker B:I know that I'm going sideways a little bit, but I. Boris, is there a better argument Megan and other beam people can make to the IT personnel that will sound.
Speaker B:That will actually open up the gate in conversation.
Speaker B:What would convince you?
Speaker B:Start thinking deeper about it.
Speaker A:So.
Speaker C:Here'S my concern.
Speaker C:I don't know if this should be.
Speaker D:Left in the hands of the IT department.
Speaker C:I think the firm's leadership needs to.
Speaker D:Be involved and this guidance needs to come from the leadership, from the partners.
Speaker C:Because this effects, as we just talked.
Speaker D:About this could affect deadlines, could affect project deliverables.
Speaker D:Obviously it affects project workflows.
Speaker C:In the end.
Speaker D:This type of head body is affecting the financials of the firm.
Speaker C:If we look really closely.
Speaker C:Right.
Speaker D:This would affect the bottom line just because things are not getting done the way as officialization.
Speaker C:So I think the leadership needs to be well because look, I can see both sides of this.
Speaker C:I can see the IT department not wanting.
Speaker C:The main thing about it is.
Speaker D:And I may have said it before, but the more control we have, the safer we feel.
Speaker C:It doesn't mean that that's true.
Speaker D:Right.
Speaker D:But.
Speaker C:Many IT people will want to.
Speaker D:Maintain as much control as possible or all talk.
Speaker C:And.
Speaker D:And that's where I think you're hitting that nerve.
Speaker C:So in the end I think they.
Speaker D:Will do everything in their power to present back to the firm's leadership.
Speaker C:Look, we need to keep process safer, secure.
Speaker C:We need to have as much control.
Speaker D:So any argument around the technological side of it is not necessarily going to be.
Speaker D:I don't know if it's going to be used for.
Speaker D:Right.
Speaker C:Because as you position your argument one.
Speaker D:Way, they will position their argument opposite way.
Speaker D:And still going to sound just as.
Speaker B:Good the argument though with email access versus ACC.
Speaker B:Doc.
Speaker B:Doc access.
Speaker B:I think that could be helpful for a principal to visualize like.
Speaker B:That's for sure.
Speaker B:Megan.
Speaker B:What I would pull that card out.
Speaker B:But talking to IT almost like ensures you will get into pulling match.
Speaker C:Yeah.
Speaker C:Unless.
Speaker C:So unless somebody's already predisposed like you guys, both sides.
Speaker C:So I'm trying, you know, I know that.
Speaker C:And with our clients, this is what we have is, yes, we part of.
Speaker D:The Autodesk construction cloud administration team, but.
Speaker C:You know, the employees and people, BIM.
Speaker D:Managers that require access or full access have that access as well, because it's important.
Speaker C:But it also has been agreed with.
Speaker D:Leadership and it has been communicated from the leadership down.
Speaker C:So I think that's what needs to.
Speaker D:Happen in these instances, is leadership has to be involved.
Speaker B:Interesting.
Speaker B:And so, Megan, when you run up against these sort of, no, you can't or you shouldn't.
Speaker B:Have you gone up.
Speaker B:Have you sort of gone up to the company leadership and sort of validated that it prevents you from access?
Speaker A:Yeah.
Speaker A:And I think the conversation is tricky from us being an outside consultant coming at them from the other side of an IT system that they're supposed to put their entire trust in.
Speaker A:Right.
Speaker A:And someone saying, this is an issue, and me outside consultants saying, I don't think it is.
Speaker A:There's.
Speaker A:There isn't a good argument there for me to make any headway with leadership as an outside consultant.
Speaker B:That is a very astute observation.
Speaker B:You probably come up against it.
Speaker C:That's.
Speaker B:Yeah, that's.
Speaker B:Boris, do you have anything to say?
Speaker B:Because, yeah, you're right.
Speaker B:I mean, you're sitting on the board of the company, Whatever your leadership, your.
Speaker B:It's telling you one thing, you've been with them for seven years, eight to 10 years, they've done you right.
Speaker B:And then here Liz comes in, the hot shot, you know, trying to give.
Speaker A:Me access to everything, and they're like, heck, no.
Speaker B:Yeah, I can see.
Speaker B:Can we craft some kind of approach here that we can end up with sort of recommendation for our viewers if they've stayed with us thus far?
Speaker C:I mean, it's difficult position to be in.
Speaker D:And we have been in a similar position too, when we're not kind of fully managing our customers, but working with internal IT as outside, quote, unquote, consultants.
Speaker D:And sometimes we, you know, we're not able to win those battles as we would say, as we want to do.
Speaker C:I always look at it from a perspective of like, you know, if this company has hired you as a consultant, right, they're looking for you to do certain things for them and they're expecting.
Speaker D:Right, their C volume and you doing that work then.
Speaker C:And it's easier said than done.
Speaker D:Right.
Speaker C:Like in the ideal world.
Speaker C:In the ideal world, they will work with you to try and figure out what will make your Work most efficient.
Speaker D:Right.
Speaker C:And what will give you the most ability to.
Speaker C:So you can do the work quicker and maybe cheaper for them.
Speaker D:Right.
Speaker D:That's kind of the idea.
Speaker C:But I understand.
Speaker C:Look, egos are at play.
Speaker D:Things happen.
Speaker C:It's a difficult situation.
Speaker D:I don't know if I have like a real answer here.
Speaker A:I have one last approach that I've tried and I guess that this is what I'm trying to do is come up with these like the email versus like cloud sharing scenarios.
Speaker A:And I have another analogy where it's, you know, your internal file server.
Speaker A:We specifically at Aurora BIM do not access, we do not vpn, we do not touch file servers, internal file servers, even though most of the companies are set up for remote employees and they would allow us access through their IT department in some capacity.
Speaker A:But we don't touch that.
Speaker A:So we do everything on Autodesk Construction Cloud because we hold it up as this like safer environment to work in.
Speaker A:As you said, we're working with many clients.
Speaker A:Who knows if we download a file and upload it to their system and in fact unknowingly their files.
Speaker A:I think these cloud systems are much more secure, at least from my understanding of them, in battling that kind of like virus or infection that can come in and hurt a company.
Speaker A:The other analogy that we make too with our clients when we set them up on ICC docs is that this is essentially your new file server.
Speaker A:It is more secure, it has a way easier way of sharing data.
Speaker A:It's cheaper.
Speaker A:It comes with your Autodesk subscription that you're already paying for and it's unlimited storage.
Speaker A:Files can never be deleted.
Speaker A:They have these activity logs.
Speaker A:You have the ability to coordinate with other companies up all up in this cloud based platform that was created specifically to do this so that teams could collaborate with each other and that the old way of sharing files where you're uploading and downloading via email or Dropbox links or anything like that is way less secure than this new system.
Speaker A:And we actually, when, because they're using our clients are starting to use these systems in the industry as their file servers because it's cheaper storage.
Speaker A:That's where you need to keep your models anyways.
Speaker A:The viewer is you can, it's basically I call it Dropbox with like a really great viewer.
Speaker A:You can look at any type of file that we use in the construction industry, almost any type, you can view it up there versus just seeing it as a file.
Speaker A:And in using this system as your new server we actually say that everyone in the Company should have administrative access just like they did to the server.
Speaker A:Because if you want to add yourself to a project to look at project files as like a reference, you should be able to do that.
Speaker A:You shouldn't be locking this data away from people in your company.
Speaker A:If you don't trust the people in your company, you've got bigger problems.
Speaker A:Is that.
Speaker A:I'm not going to say it like that, but does that, does that make sense and is that a valid argument to also bring to the table?
Speaker D:That is not a valid argument.
Speaker C:Okay, it is not a good argument.
Speaker C:It may be valid argument, but it's not.
Speaker C:I'll tell you why.
Speaker C:Well, so none of the people are.
Speaker D:Admins on their local files, but they can add.
Speaker A:So the way Construction Cloud works is you cannot access a project unless someone adds you.
Speaker A:That is a project admin.
Speaker A:Or if you're an account administrator, you can add yourself to projects.
Speaker A:And that's the reason we have them be account admins.
Speaker C:Yeah, but I think.
Speaker C:So what you said is that you.
Speaker D:Wanted all the users to be admins.
Speaker D:So I want to make sure that you either made a mistake when you.
Speaker C:Said that or is that.
Speaker A:That's true.
Speaker A:Because on your own Autodesk Construction Cloud, the worst that can happen is that they're in there doing something on a file which is tracked and documented, and they blow it up.
Speaker A:They delete it.
Speaker A:They do something.
Speaker A:You can always get that file back.
Speaker A:Always.
Speaker A:You can always track who did that and when it happened.
Speaker C:Yeah.
Speaker A:So that like the things that you can actually get in and mess up are way less.
Speaker A:Way less, I don't know, like catastrophic than what could happen if someone was on a file server and like accidentally pull the file folder into another folder.
Speaker A:Then you guys have to go find it where they delete a file and then you guys have to go find it and they don't realize they deleted it until a month later.
Speaker A:And then.
Speaker A:Oh, no.
Speaker A:Can you go get it?
Speaker C:No.
Speaker C:So now that you explain it, it's.
Speaker D:All different than it originally sound.
Speaker C:But still, if somebody goes and just randomly deletes a bunch of data, it still takes time to restore it and.
Speaker D:Be try to identify who that person.
Speaker C:Was on a server and in a construction environment too.
Speaker C:Somebody needs to go and do that work.
Speaker C:Isn't it easier just to restrict people.
Speaker D:And allow them to do that?
Speaker A:No, because on Autodesk Construction Cloud, it literally is always in this little button that has a trash can on it.
Speaker A:Because you just say restore and seconds later it comes back.
Speaker C:Sure.
Speaker D:It stays.
Speaker A:That's and you can see who did it immediately.
Speaker C:If you.
Speaker C:So if somebody notices it and somebody.
Speaker D:Else needs to go in and do that.
Speaker C:What I'm saying is, and I'm not arguing the point that it's just as easy, what I'm saying is if I don't give anybody the ability to delete.
Speaker D:Any of my files, then none of the files will ever get deleted.
Speaker D:So that's how that other side argument works.
Speaker A:But the problem is you can delete file even if you're just a project member with minimal access.
Speaker C:True.
Speaker A:So they aren't even locking that down.
Speaker C:That's also fair.
Speaker C:So I guess maybe we should discuss what does being a pro, being an account administrator and project administrator give you in terms of.
Speaker A:I think this is great.
Speaker A:This is the root of it that you guys don't.
Speaker A:The it doesn't understand.
Speaker D:So let's talk about it.
Speaker A:Yeah.
Speaker A:So Liz, maybe you can help me here too.
Speaker A:So like, when you are an account admin on ACC Docs, maybe Liz, you could share your screen to show what it is.
Speaker A:The primary thing that you have control over is how your, your ACC Docs system functions.
Speaker A:So you've got, you've got these libraries that you use.
Speaker A:And this is all integrated with revit and the software that we are specialized in using.
Speaker A:Right.
Speaker A:So all, Everything is set up so that we can coordinate with clients.
Speaker A:We have libraries up there.
Speaker A:So this is.
Speaker A:Yeah, so we have account admin access.
Speaker A:So we, we have access to settings, but just for Autodesk Construction Cloud.
Speaker A:So like really what you could.
Speaker A:There isn't really anything in my mind other than like someone coming in here and changing the name of a project or archiving or adding the wrong person.
Speaker A:We're adding the wrong person.
Speaker A:But you see it and it's there and you can track it, but there really isn't anything that they can destroy.
Speaker A:It's all.
Speaker A:You actually cannot delete anything off of Otis Construction Cloud ever.
Speaker A:So, and then project.
Speaker A:And then the other big thing with account admin access is that you can help set up templates, which means that you can start a project project, which most people need to do.
Speaker A:Start project, type in the, like, information about that project, and set up the file structure, the folder structure that's within that.
Speaker A:So you have access to make a template that you like.
Speaker A:And this is just like a file server.
Speaker A:Anyone can create a folder.
Speaker A:Anyone can, you know, kind of.
Speaker A:It's, it's training your employees and you need to have training around this.
Speaker A:I'm not saying you just let anyone in here, but it's just the level of training.
Speaker A:It's training them on another software that they need to be able to navigate and use.
Speaker A:And there's not really anything that they can do up here that I can.
Speaker A:That I have ever experienced that puts the company at a security risk other than inviting people that shouldn't be part of that project or that system, because then they can see the data, but you can see that they saw the data and you can boot them out.
Speaker A:So account Admin really isn't this, like, crazy thing.
Speaker A:I think that, like, it is concerned about, like, when you hear about administrative concerns or when you're talking about that, like, what is.
Speaker A:What's the fear?
Speaker E:I think I should rename Admin.
Speaker E:I should just take away admin from the title.
Speaker A:They should.
Speaker E:That's the scary part, I think needs a rebranding.
Speaker C:Well, that's part of it.
Speaker C:I think the other part still comes down to control.
Speaker C:Right?
Speaker C:Control from standpoint of there's certain.
Speaker C:Yeah, we want to live in that ideal world where we trust all of our employees to just go in and follow an SOP and create something.
Speaker D:If you have an sop, start with.
Speaker C:And go ahead and let's just talk about, hey, create a project.
Speaker C:What does that entail?
Speaker C:How do we name it?
Speaker C:What, you know, what template folders need to be in there, what things go into creating a project.
Speaker C:So technically, you cannot just have anybody who hasn't created a project before go in and create a project unless we have specific documentation around what it takes.
Speaker D:And the person has been pinned on it.
Speaker A:And do you think it should be controlling that or do you think the project manager, slash BIM manager, should be controlling that?
Speaker C:I don't think it should be controlling that.
Speaker A:Okay, great.
Speaker C:I think this is part of the quote, unquote, technical design team, right?
Speaker D:Or design technology team, if there is one.
Speaker D:Or, you know, you guys would be a part of that, right?
Speaker D:Like, usually the firms that are larger in size that usually we work with or you guys work with have at least a person that is kind of that one responsible person, hopefully.
Speaker D:So they should be in control of understanding who else should be having access.
Speaker C:Or if there's a technology committee, like.
Speaker D:That committee should be having the guidelines on who has access and who creates projects and how that.
Speaker A:I mean, it's like a file server, right?
Speaker A:Like you could create a folder on there.
Speaker A:Anybody could, but they just know they're not supposed to, right?
Speaker A:Like they're not supposed to create their own project folder.
Speaker A:The company has a system in place for that.
Speaker C:I argue that on various file servers.
Speaker D:That we manage, there's various levels of access.
Speaker A:Like some or you can like not allow people to create projects.
Speaker D:Projects.
Speaker D:Right.
Speaker C:So people can view, they can delete, but they cannot create folder.
Speaker C:So there's.
Speaker C:There's things that.
Speaker C:But usually, usually you're right.
Speaker C:If you have access to that folder.
Speaker D:You can move things around, delete things, the right things.
Speaker C:However, I think this goes back to our leadership discussion.
Speaker D:Right.
Speaker C:That judgment call.
Speaker C:If it's not coming from it, that.
Speaker D:Needs to come from somebody who is part of that design technology committee or role or you know, a partner in charge of design technology.
Speaker D:Right.
Speaker C:I.
Speaker C:Otherwise it will always be deferred to.
Speaker D:It and always most like erratic decision where maintaining control is more important than having the company.
Speaker B:Okay, let me.
Speaker B:So this is.
Speaker B:This is a lot more interesting than I thought it was going to be.
Speaker B:We are way out of time.
Speaker B:Hopefully we didn't run into other people's meetings here.
Speaker B:But.
Speaker B:But I think it's tb.
Speaker B:Tb.
Speaker B:Tbc.
Speaker B:To be continued.
Speaker B:In some ways I think we've gotten somewhere.
Speaker B:Let me try to summarize.
Speaker B:Megan, help me with this.
Speaker B:It's up to the leadership if they're involved.
Speaker B:If they're not, it needs to get a little bit more progressive and understand their architecture and engineering based clients and their needs.
Speaker B:So there needs to be an education element.
Speaker B:Hopefully this podcast will serve as one so you can kind of pop it towards the next person that gives you.
Speaker B:Gives you a problem.
Speaker B:And then maybe they'll sort of at least connect with Boris and I some thinking here but I.
Speaker B:What about this?
Speaker B:What about.
Speaker B:What about a document?
Speaker B:What about creating like a one pager, right, that has the why, what and how.
Speaker B:So why what the value is to create, to make.
Speaker B:What's the value for giving your BIM managers and tech team admin level access what it actually means?
Speaker B:Because again, I think the word admin scares the heck out of people.
Speaker B:So the why is why this is important and it should be a simple list of bullet points.
Speaker B:What are the risks?
Speaker B:Data loss.
Speaker B:Be.
Speaker B:Be open about that.
Speaker B:Data loss or unauthorized access.
Speaker B:Really those are the two.
Speaker B:Maybe you can put not even data loss.
Speaker B:Not even data loss.
Speaker A:Take it's unauthorized access.
Speaker C:You can argue that point only because.
Speaker B:Let me finish, let me finish guys.
Speaker B:I know you all so excited.
Speaker B:Next one is the how.
Speaker B:The next where you address it.
Speaker B:You got to be honest.
Speaker B:When you want somebody to look at your document and actually value it, you have to put the risks.
Speaker B:And the risks are data Loss.
Speaker B:Okay.
Speaker B:Unauthorized access.
Speaker A:Okay.
Speaker B:And malware.
Speaker B:Okay.
Speaker B:And potential hacking.
Speaker C:Right.
Speaker B:So if you put those out, the how of it is the mitigation mitigating them, then you can address one by one.
Speaker B:Again, very simply, what we just discussed actually puts a lot of fears to rest.
Speaker D:Right.
Speaker C:Because I.
Speaker C:So he's absolutely right.
Speaker C:So you need to put data loss out there because there will be argument.
Speaker D:Made for data loss.
Speaker C:Now you can turn that around and say, well, here's all the controls that are in place.
Speaker C:99.9% of the cases like there will.
Speaker D:Be no data loss.
Speaker D:Right.
Speaker C:Because we have this control.
Speaker D:We have this control to have this control.
Speaker C:But I can argue we see this with other cloud services because what is advertised is not always what is there.
Speaker C:So some will say we got unlimited versions.
Speaker D:Awesome.
Speaker C:But the file is deleted.
Speaker C:It's only available to be recovered for 30 days.
Speaker D:Nobody knew that.
Speaker C:Right?
Speaker C:So then somebody looks 31 days later, the file's missing and it's no longer.
Speaker D:In the recycled B.
Speaker D:It's gone.
Speaker C:So like those things do happen and.
Speaker D:We'Ve seen those happen.
Speaker C:That can contribute to that a lot.
Speaker C:So what we have to say is, look, there's versioning, there's ability to recover from recycled.
Speaker D:We need exactly how long.
Speaker D:You know, the Autodesk construction cloud says it is.
Speaker A:They say forever, which was like a big, a big pinch point with lawyers who were like, delete your data after seven years because you can't.
Speaker C:So what?
Speaker C:So there's a difference between whether it stays on the recycled bin and you can recover it or it's taken out of this cloud forever, but you need to open a support case, which takes forever.
Speaker D:I work with Autodesk support, don't love.
Speaker C:Autodesk support, but somebody needs that file right now.
Speaker C:So that still is a problem.
Speaker C:Even though it can be recovered in.
Speaker D:Three days versus something you need in the following.
Speaker A:But none of that is true for Autodesk construction cloud.
Speaker A:I just want to make sure people know that.
Speaker C:All right, so I don't.
Speaker C:I think that document should have those specific.
Speaker A:Explain.
Speaker A:Yeah.
Speaker C:Documentation and directly.
Speaker C:Like directly quotes from Autodesk from their website and says it will stay in.
Speaker D:The recycle bin forever until.
Speaker B:So I'm going to try to wrap up again.
Speaker B:This should be a follow up episode on this because this seems to be a longer discussion to be had here and maybe a better solution as an outcome.
Speaker B:But as your Boris pointed out, we are all skeptical of what our cloud providers are going to do if my icloud says it's Going to keep my pictures forever.
Speaker B:You know, I believe it because I have to, but I don't really.
Speaker B:I don't think that something happens, somebody hacks somebody, you know, they have a data loss, they're going to send you a.
Speaker B:A very nice letter saying oh, you get a free security monitoring for a year because all your.
Speaker B:She got freaking hacked and you lost your Social Security number, your bank account numbers.
Speaker B:You look.
Speaker B:But here's a:Speaker B:So there's as much as they can say what they have.
Speaker B:I am like okay, it's.
Speaker C:Maybe so.
Speaker A:But that same argument can be made for Gmail.
Speaker B:Absolutely, absolutely.
Speaker C:Right.
Speaker C:Like I don't trust Gmail either.
Speaker D:Right.
Speaker C:Like I don't trust Microsoft either.
Speaker C:Even though we run all our business.
Speaker A:With Microsoft, we don't trust anyone.
Speaker B:Oris and I communicate via letters and we have pigeons very fast.
Speaker C:No, we always like there is I guess we are in where we deal with risk all the time.
Speaker C:You have to always assume that there's some risk involved.
Speaker C:And it's not always no, there's no risk.
Speaker C:We'll keep your data unlimited for forever.
Speaker C:Right?
Speaker C:If they did that, they will be paying a lot of money and they're hosting on AWS because anytime AWS cloud.
Speaker D:Goes down, your autodesk goes down too.
Speaker C:They will be paying a lot of money for those petabytes of data that.
Speaker D:They'Re storing there if they never deleted it.
Speaker C:So they're hung it something has and.
Speaker A:Then there's like the side of the servers where like there could be a building fire and then what.
Speaker D:I'm not.
Speaker C:Arguing that their product is not superior to service servers.
Speaker C:I wish all of our clients like.
Speaker C:I mean there's some caveats there, right?
Speaker D:Like with work sharing and other things for especially like Adobe products.
Speaker C:But I'm not arguing that the product.
Speaker D:Is not superior than the file server.
Speaker D:The workloads work.
Speaker C:What I'm saying is we can, we cannot always take it at their word.
Speaker C:Now if it's our own file server, we control that.
Speaker C:So we know what our backup plan is.
Speaker C:We know how far we can restore throughout grade backups and we keep the data forever.
Speaker C:We know we'll be able to get.
Speaker A:Unless there's a fire.
Speaker B:Yeah, well, so you can replicate backups are not.
Speaker A:We have backup in a warehouse which also maybe has a fire or an.
Speaker C:Earthquake at the same time we replicate.
Speaker C:You know, there's a flood.
Speaker A:I see Guy Say this to me once.
Speaker A:He's like, my analogy is, it's like driving down the road in your car with a seat belt on and a helmet on.
Speaker A:Like, it's.
Speaker A:You don't need the helmet, you just assume the risk.
Speaker A:You got your seatbelt on and you just carry on.
Speaker A:That's all you can do.
Speaker A:Because your helmet.
Speaker C:Yes.
Speaker C:And probably that's how most it.
Speaker C:People look at the world is because we've.
Speaker C:We've dealt with.
Speaker C:So we have to assume all this risk.
Speaker C:Right.
Speaker C:Because we never know when something can happen.
Speaker C:And usually the only reason people would call us is not to say, hey, have a great day.
Speaker C:They would call us because they have a problem.
Speaker C:Right?
Speaker C:So we are always dealing with the problem at all times.
Speaker C:And I think that's how it.
Speaker D:People position to look at life, really.
Speaker C:They will call us and say, my file got deleted.
Speaker C:They'll restore it.
Speaker C:And you're like, well, we only had 30 days worth of backups.
Speaker C:Because you guys agreed that we only.
Speaker D:Keep in 30 days worth of backup.
Speaker C:No, but I need a file restored from a year ago.
Speaker D:Right.
Speaker C:So, like, those type of things we.
Speaker D:Always have to deal with and think about.
Speaker D:And I think that's what drives a lot of this aversion to risk, let's say.
Speaker C:And it's a good thing to have in our world.
Speaker C:Right.
Speaker C:Because if everything's like, we're doing our job, if everything is quiet and nobody.
Speaker D:Ever talks to us.
Speaker A:Yeah.
Speaker A:And we appreciate you.
Speaker A:We need you.
Speaker A:Thank you.
Speaker B:All right, third attempt.
Speaker B:I don't think there's a single listener left.
Speaker B:I mean, if.
Speaker B:If you are, please announce yourself.
Speaker B:Send us an email, alex.olsonetarchit.com and I'll send you a 25 gift card, I promise.
Speaker B:The first email that says, hey, I'm here.
Speaker B:Minute 50 plus listening.
Speaker A:I sent you an email.
Speaker B:Preach it.
Speaker C:Come on.
Speaker B:Come on now.
Speaker B:$25 gift card.
Speaker B:Personally, I will send that to you.
Speaker B:If person sends me an email with the subject line, I'm still here.
Speaker B:And yeah, I don't.
Speaker B:I think I'll be waiting for that email for a long time.
Speaker B:So, anyway, third attempt to wrap.
Speaker B:This was excellent.
Speaker B:Very good discussion.
Speaker B:I think we should go back to the topic.
Speaker A:Yeah.
Speaker B:But there's no clear right answer.
Speaker B:I think Megan's got a really good point.
Speaker D:You got it.
Speaker B:You gotta work.
Speaker B:You gotta get work done.
Speaker B:How else are you gonna get work done if you go to Ox and then we.
Speaker B:Boris got a point.
Speaker B:Hey, while you're getting your work done, you know, let's not burn down the barn.
Speaker B:So we're gonna keep going to keep this friction going.
Speaker B:It's hopefully, I mean there yeah, hopefully.
Speaker C:There is a lot less going forward.
Speaker C:And I again with a lot of.
Speaker D:So I agree with a lot of what Megan says.
Speaker D:I think I also I understand the other side and I'm trying to think.
Speaker C:In this scenario I'm playing more devil's.
Speaker D:Advocate where I But that's important too, right?
Speaker D:Because we need to understand what both sides are going to argue.
Speaker A:Well and I think this is a plug for AEC specific IT professionals like yourselves because we really appreciate getting into firms and working with people like you who understand the intricacies of Autodesk because it's a beast on its own to manage on the IT side outside of Autodesk Docs, we need your help.
Speaker B:Awesome.
Speaker B:That is if you are the last architect slash engineer left on this podcast and still listening to us and you need IT support.
Speaker B:What are the odds?
Speaker B:Nicole, go to getarchite.com or email me or Boris.
Speaker B:We're easily accessible through the Arc IT website.
Speaker B:Just click Contact Us or the aforementioned email address for your 25 gift card.
Speaker B:If you happen to be also prospect and a person to get to gift card, that'd be awesome.
Speaker B:But in any event, this is it guys.
Speaker B:I'm wrapping it up.
Speaker B:Have a fantastic day.
Speaker B:Thank you very much for listening and thank you very much for participating.
Speaker B:Everyone here and all of you who are listening.
Speaker B:We'll see you all next time.
Speaker B:Thank you.
Speaker E:Thank you.
Speaker E:Thank you.
Speaker C:Awesome.
Speaker C:Thank you.