Computerworld - The transparent enterprise is characterized by increased data integration possibilities across formerly stovepiped databases. Now, even the buildings that house our transparent enterprises are becoming transparent themselves. In response to the demands of energy efficiency, security, lower operating
costs and the need to increase space-planning flexibility, the physical structures in which we work are on their way to becoming more closely integrated with our information infrastructure.
Consider these new requirements in the design of building systems and some of the issues they raise:
- Secure access control: Linking the provisioning of RFID-type security systems to human resources systems will ensure that the right employees get through the right doors. This will require organizations to make sure appropriate privacy policies and practices are in place.
- Energy efficiency: Electric power demand-monitoring systems promise cheaper power and higher levels of availability from the public power grid. Enterprise users must be ready to have their power utilization monitored and possibly even controlled down to the individual device level for this to work.
- Security: Video monitoring of premises for both external and internal security purposes is increasingly common. We can hope that this improves the physical security of our buildings, but whether it does or not, it certainly makes the environment more transparent -- or intrusive, depending on which side of the camera one sits.
- Building signage: Even building signs (e.g., lobby directories, special-purpose meeting-instruction signs and emergency exits) are being integrated in the interoperable building of the future. On arrival in an unfamiliar building, it will be nice to have signs that are dynamically configured to point us in the right direction. I'm not sure how I'll feel, however, when information screens in every elevator lobby of a high-rise inform me -- and every other occupant -- that my car has been towed out of the parking lot because I'm two months late on my parking fees.
In support of these goals, building systems, once the domain of HVAC engineers and security services, are becoming just one more information system. As with our other information systems, the first design requirement is that it be built on open standards for interoperability. The International Standards Organization has even released a standard (ISO 16484-5:2003) that "defines data communication services and protocols for computer equipment used for monitoring and control of heating, ventilation, air conditioning and refrigeration, and other building systems." The aim of the standard is to facilitate "the application and use of digital control technology in buildings."
As buildings become more automated, formerly disparate components (HVAC, LANs, security systems and even signage) will become interoperable
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts