How Secure are Plugins from the Autodesk App Store?
Explore the world of Revit/CAD plugins: the benefits, potential security risks, and best practices to protect you. Empower your workflow and stay secure.
Employee and Culture Development in AEC
Learn why building high-performing teams is needed for a successful business development culture that places people at the center of organizational strategies.
A Comprehensive Guide for API Workflow Automation in the AEC
Explore the significance of APIs in the AEC industry, learn how to create and automate them, and understand their role in improving BIM workflows through seamless data interoperability.
AI Image Generator in Architecture: Revolutionizing Design Workflows
Exploring AI image generators for architecture. Learn how to set up and utilize AI models to enhance design workflows and creativity in our comprehensive guide on AI in construction.
Improving Solar Plant Design Through Automation
Our goal is to explain the design process for solar plants, their potential for automation in the current market, and the solutions that can be implemented.
Construction Data Analytics: Connecting BIM Data with Power BI
This article provides a tutorial on analyzing and visualizing BIM data with Power BI, introducing Sarah and its features to improve construction data analytics.
8-Step Guide To identify the Best Construction Technology Consultants
8-Step Guide to Engaging Construction Technology Consultants in the AEC Industry The demand for specialized software in the construction industry, from BIM […]
When to automate a business process in your company
Business automation is not as straightforward as it looks Automation can be a game-changer for any business looking to streamline its processes […]
Neo4j database generated from a Revit model
What is Neo4j and how to set up a Neo4j instance environment using .NET. Learn how to retrieve different metrics, perform complex queries for our data, and export elements and their relations from a Revit Model to a Neo4j database.
Dynamo Nodes Security: The monster underneath your bed
The idea of this article is to show an experiment of uploading a Dynamo Node and trying to get as much data from the user's computer, install a Keylogger, get files, get the browser history, record the camera, etc. The experiment, for security reasons, will be conducted by only allowing us to extract data from my IP address just in case someone downloads the node, as these nodes cannot be deleted.v
Coordinate Systems: From definitions to real-life
Learn about the importance of coordinate systems in the AEC industry. Understand their applications in software modeling tools and construction machinery to reduce errors and improve efficiency.