James King
๐ค SpeakerVoice Profile Active
This person's voice can be automatically recognized across podcast episodes using AI voice matching.
Appearances Over Time
Podcast Appearances
Germs, all that stuff.
I'm not even going to jump into that part, but they're comfortable.
But you throw a touch panel in front of them, they think it's alien language because it's not theirs.
They're not comfortable with it.
It could have the identical interface as their phone, and they're going to not want to touch the touch panel.
They're afraid they're going to break it.
So like I said, pros and cons to both ways.
My gut is dedicated because I want to be able to go in and verify that room is working 100% before anyone goes in that room.
My reaction, I have thought about this for a long time.
And my thought is because you look at our device, if I break my phone, it impacts me.
Mm-hmm.
Also, if I break my phone, I don't have egg on my face.
Only I know if my phone is broken.
Maybe I report, hey, yeah, my phone's broken.
If I break the touch panel in the room, that breaks it for others.
Or the touch panel is like I'm not 100% comfortable, but I can muddle around my phone and make it not look like I'm uncomfortable, but in front of the class or in front of the board,
in a board meeting trying to hit panel buttons and maybe i'm not sure what's going to happen that puts eggs on my face and i think that is why we see that timid oh well i'm going to use my own device because i don't want egg in my face and also if i break it i don't break it for me right well the performance anxiety sometimes you don't want to be the one who's goofing up in the room like i totally get it anything you would add steve
reinvent the wheel in every room you want to be able to kind of multiply these systems and have it apply at scale right yeah no one thing i would i wanted to add is that we didn't really touch on and that is going like diversity with the app you know personal devices is the security like to have a personal device communicate with the av system you've got to grant them access to it
And then that opens up security concerns and all that stuff where you have a closed system.
Even if you do a centralized close, and what I mean like do a centralized AV control system where you can talk to servers and stuff and not go for personal devices.