Want to set up a wireless Conference Room?Try Now

Conference room technology and AV equipment have grown leaps and bounds in recent years. They have changed the way we communicate in the workplace, amongst ourselves, across departments, and across the globe. That shift has set expectations for more immediate collaboration and conversation during meetings. This is why the wireless presentation system has become one of the most in-demand conference room AV products of the BYOD era.
Wireless presentation systems turn meeting rooms into central access points for content. Through secured environments, team members can meet in one digital location from various physical locations and multiple devices. Wireless presentations turn the meeting room into a collaborative place where content can be shared through any pre-existing audio visual setup.
Wireless presentations turn meeting rooms into a central access point for content. Through secured environments, team members can meet in one location from various locations and multiple devices. Wireless presentations turn the meeting room into a collaborative place with shareable content and readily available means of communication.
So, why go with Ubiq over anyone else? Ubiq’s wireless presentation system is an all-in-one solution that provides a cable free, hassle free, seamless experience for meetings and conferences. Built around the concept of hives, Ubiq’s hardware resides in the center of your meeting room, connecting people to content across multiple devices and (soon) remote locations.
Here are just some of the benefits:

  1. Easy set-up. Ubiq has designed the system for self set-up and provides step-by-step instructions. Ubiq’s wireless presentation system integrates with your current IT infrastructure. It works with the A/V technology you currently use. The hardware, also known as a “hive,” only needs to be set up in center of your meeting room. The system is supported by PC and Mac operating systems, and will be compatible with multiple tablets and mobile devices (coming soon).
  2. Quick access. Wireless presentations can be activated and accessed in under 10 seconds. Using P2P and WiFi connectivity, it takes a few simple clicks to enter your meeting session in and out of the conference room. Remote presentations will allow for your virtual teams to share in the experience in real-time, creating greater communication and collaborative opportunities.
  3. Time. Ubiq not only is easy to use, but it promotes productivity. Integrating with calendar tools, like Google Calendar, teams can schedule meetings, reserve rooms and request “hive” access. It sets structure around meeting organization for all parties involved.
  4. Security. Ubiq works with your enterprise security structure and policies. It can bridge corporate and guest networks to allow all key parties to partake in the same session. Live session data is encrypted and protected to only be accessed through the designated meeting with the hive. Ubiq also supports corporate SSO (single sign-on) to create a simple authentication process through Ubiq’s software.
  5. Less strain on IT. Ubiq is user-friendly. It is meant to empower employees to set-up their own meetings using easy to manage technology with minimal IT involvement. IT can spend their time more efficiently to support your company in other areas. Ubiq also provides an administrative dashboard for monitoring of “hive” activity from a single, remote location. IT does not need to be in the room, and can be proactive in making sure all systems are a-go!

Discover how Ubiq can work for your organization. Request a demo today!

Want to set up a wireless Conference Room?Try Now

The way we conduct meetings has changed over the years, thanks to technology. From the telephone to video to the interactive display, meeting rooms and huddle spaces are no longer bound to location and time zones. The tools we use have certainly evolved to help us be more productive, efficient, and collaborative.
Let’s look at how conference room technology has grown:
Telephone conferencing. Alexander Graham-Bell’s telephone in 1877 changed how we communicate from remote locations. Business meetings didn’t need to be in the same room. No need to wait for messages to arrive via telegraph or post. He brought real-time communication!
Since then, we’ve seen the telephone’s purpose change thanks to innovations, such as:

  • The speakerphone allowed groups to speak through a single 1:1 communication flow.
  • Conference functionality allowed a user to connect more than one phone line to another or transfer to another.
  • Conference call systems opened communication to allow multiple phones to connect into a single line.

WATCH:The Birth of Telecommunications” (History)
Video conferencing added a visual element to work communication. People could see and speak to one another. Video initially was an enhancement to audio. Since then, it flipped with the rise of the Internet and cloud connectivity.
Video communication has changed how we see, hear, and speak with one another. Tools like Skype, Facetime, Google Hangouts and WebEx gives us options to record or live stream our conversations. All the while, we make our business portable and social.
VIEW:The History of Videoconferencing” (Telemerge, Inc./SlideShare)
Where are we today? The wireless presentation has bridged the gap between teleconferencing and videoconferencing. It has promoted unified communication to allow teams to connect across different platforms, devices, and audio visual setups. It’s changing company cultures by bringing people together through a central access point.
We’re able to contribute and bring value to our meetings no matter our location.
WATCH: Get Started with Ubiq
Where do we go next? Take a look at what Lightpath put together in a great timeline infographic on “The Evolution of the Business Meeting.”
Tell us where you see conference room technology and conference room AV equipment are heading!

Want to set up a wireless Conference Room?Try Now

A top concern for CIOs, CEOs, and IT personnel is the leaking of sensitive or proprietary information revealed during exclusive meetings. Now that everyone owns a mobile device and data breaches are on the rise (up 40 percent last year), information security in meeting rooms is even more difficult to maintain.
Ensuring that your data is safe before, during, and after meetings is crucial for any organization, especially for those in government, healthcare, and technology sectors. Below are some tips for ensuring that your meeting rooms are under lock and key.
1. Control preparation materials
When preparing materials for a presentation or conference, limit the use of physical data as much as possible. In many cases, losing or leaking physical data can be more likely due to the lack of control. If you are using collaboration tools or software to pull together figures, graphics, and presentations, make sure that it is with a secure provider and only select individuals have access to it. If it’s online, never use an insecure network or public Wi-FI.
2. Assess the space
One of the best ways to ensure your meeting rooms are secure is to assess them beforehand. If it is located in your office space or another entity that you control, this is easier to accomplish. If it is located elsewhere, try to do a security walkthrough before the event. Get to know the security staff and any meeting policies.
person-apple-laptop-notebook
3. Using wireless presentation systems
It is easier to limit possible security leaks if you own or control the meeting space. But oftentimes, you may need to present at other locations off-site with another company’s AV equipment. In these instances, using a wireless presentation system can allow you to upload data straight from your device to any pre-existing audio visual setup. This limits the access points and narrows the chance of a breach.
(4) Blog
4. Verify attendees
For bigger meetings, having a list of approved participants is key. Some may go as far as giving each attendee an ID badge or other mode of identification to ensure that only select individuals are allowed in. This can prevent any competitors or leaks from entering, and it can track participants in case one does occur.
5. Brief participants
Before beginning a meeting that may contain restricted information, quickly inform participants. Let them know that it is sensitive, give them a tip sheet on how to protect data after the meeting ends, or have them sign a short, to-the-point contract regarding the release of information and responsibilities.
(5) Blog
6. Restrict the devices used
Another threat to security in meeting rooms is the use of mobile devices. In a Ponemon Institute study, leakage of information was the top risk of insecure mobile devices. In some cases, restricting the use of a smartphone, tablet or any mobile device, can be extremely difficult to impossible, especially when it comes to larger events. However, you can still ask participants to refrain from using these devices during all or some restricted parts of the meeting. Personnel can help monitor the room and enforce the rule when a meeting is in session.
In an age where everyone has a smartphone camera or recording device, it can be difficult to keep sensitive information released in meetings a secret for long. However, companies can take control of the situation and increase security with these best practices.

Contact Us!