Diagram decorative image

Jalayerian’s Expertise With Drawings Will Be on Display Online

Documents are crucial to the building process.

Mehdi Jalayerian will offer insights about the importance of MEP engineering documents and the complex world of construction documents during the “Construction Drawing Four-Part Series,” which will be conducted online by BOMA Chicago from May 7 to June 4.

During the first session on May 7, Jalayerian will provide a basic overview of key construction documents and expose participants to the fundamental elements of construction drawings and other important specifications. His second presentation on May 14 will focus on mechanical, plumbing, electrical and fire protection drawings on the engineering side.

Related News

Interested in learning more? Check out these related news items.

Shaping Future Healthcare Facilities

ESD Studio Leaders Craig Kos (Healthcare) and Erik Nelson (Technology) will be joining a panel of industry experts at an upcoming Chicago event sponsored by The Association of Medical Facility Professionals (AMFP). It is part of AMFP’s mission “To be the hub where healthcare-built environment leaders share ideas, gain knowledge, solve challenges, connect with peers, and shape the future of the industry.” (Learn more about the AMFP event.)

Karnatz Joins Conference to Talk Building Operations Technology

Getting the most out of buildings—cost, speed to market, sustainability, user experience, wellness, and more—is the focus of “The Buildings Conference 2023” sponsored by BuiltWorlds. ESD President Kurt Karnatz joins a panel of professional peers as part of the two-day event starting May 18 in Chicago. (Learn more about BuiltWorlds conference.)

Is Your Smart Building an Easy Target for Hackers?

The latest building system technologies being adopted bring many benefits in terms of operational efficiencies, reduced environmental impact, and enhanced occupant experience. But these systems also introduce new vulnerabilities and present a much more tempting target for malicious actors seeking to launch cyberattacks. So do the benefits outweigh the risks, and how should potential vulnerabilities be addressed? (Learn more about cybersecurity.)