11:00 AM | Vector Concepts
Spray-Lock Concrete Protection : Colloidal Silica Concrete Waterproofing (1 LU/HSW)
1. Introduces the characteristics of colloidal silica concrete treatments
2. Reviews the environmental and health issues regarding concrete waterproofing
3. Introduces a new concrete protection technology, SCP
4. Defines substrates ready for application
5. Meets credit requirements for USGBC LEED and other green rating organizations
12:30 PM | Pinkgemini
Material Spotlight: Glass (1 LU/HSW + ADA)
As healthcare becomes increasingly complex and providing cost-effective, quality patient care becomes increasingly important, healthcare environments are challenged to consider alternatives to current design standards. These design opportunities underscore the importance of material choice in the healthcare environment, and how materials impact acoustics, safety, durability, and aesthetics, to name a few considerations. We use glass as a case study to explore how this building material can serve as a design solution to address four key areas in the care environment: (1) infection control, (2) dignity and privacy, (3) safety and visibility, and (4) beauty and satisfaction.
2:00 PM | Accessibility Unlimited
Understanding the Difference Between ADA and TDLR/TAS (1 LU/HSW + ADA)
Presentation will cover Americans with Disabilities (ADA) law and TDLR/TAS requirements and highlight significant difference in the two laws – one being a national civil rights law and Texas’ law which is a construction law. The presenter will also cover best practices for complying with TDLR/TAS rules and requirements
3:30 PM | True North Consulting
Technology and Security Infrastructure Updates (1 LU/HSW)
Technology, including security systems, changes on an almost daily basis. In this course, True North Consulting Group will discuss new standards, terminology, and advances in infrastructure systems, including structured cabling, network electronics, wireless networking, battery backup systems, unified communications, cameras, access control, intrusion systems, security analytics, and others. The course will end with a open-ended question and answer session allowing participants to ask top-of-mind questions related to technology and security infrastructure.