InfoComm Seminar & MasterClass Program – Day 3

Day 1 Day 2 Day 3


11:00 12:00

Everyone wants 4K...But does it make sense for your Application and Content?

4K display technology has now been well established and is finding its way into all sorts of applications other than domestic displays. Companies providing support equipment such as switching, distribution and scaling is fast catching up, meaning full 4K capable system designs are becoming a reality. However, apart from some serious challenges that remains on the technological front to distribute and manage all these high resolutions in the real World, perhaps the biggest challenge is how to manage the content and implementation of it. 4K is a wonderful technology when applied in the right environment and to view content that was created specifically for the medium. However, if some fundamental principles are not taken into consideration for the design, things can go very wrong! Simple fact is – the human eye only works a certain way, so putting fine text on a high resolution display is great if you are close to it, not so if that very display is placed too far from the viewer! We hope to explore practical examples and share some tips and tricks to help with the adoption of 4K into the traditional presentation environment…

Renewal Units for this session:
CTS: 1
CTS-D: 1
CTS-I: 1

Expiry date: 31/08/2018

LOCATION: South Pod Hall 1

John Ungerer John Ungerer
12:30 2:30

InfoComm MasterClass: AV/IT Security Needs Analysis

Traditionally Audiovisual (AV) and Presentation technologies have been isolated from the Enterprise IT network. With the rise of unified communications, cloud applications, enterprise management, and as AV technology reaches further into the organization, AV installations can no longer be isolated from the enterprise network. As AV systems are being migrated onto enterprise data networks, user organizations expect the AV system to maintain a security posture in alignment with their security goals. In many cases these requirements may be more than a case of business best practices, but may be a matter of regulatory compliance. Security governance typically requires that any device attached to the network has the relevant security features and configuration. With this presentation, a detailed whitepaper and templates are provided (via download) which will allow the students to adopt the provided analysis framework into their own business practices. This presentation will discuss: 1.Understand the process, stakeholders, and tools used to determine and agree upon the security requirements of an AV installation 2.Understand the tools and techniques to ensure those requirements are met. •Mitigation Plan •Common security mitigations 3.Understand how to include the outputs of this analysis in their RFPs, Proposals, Statements of Work, and Acceptance Criteria.

Renewal Units for this session:
CTS: 2
CTS-D: 2
CTS-I: 2

Expiry date: 31/08/2018

LOCATION: South Pod Hall 1

Paul Zielie, CTS-D, CTS-I Paul Zielie, CTS-D, CTS-I