Computerworld - The transparent enterprise is characterized by increased data integration possibilities across formerly stovepiped databases. Now, even the buildings that house our transparent enterprises are becoming transparent themselves. In response to the demands of energy efficiency, security, lower operating
costs and the need to increase space-planning flexibility, the physical structures in which we work are on their way to becoming more closely integrated with our information infrastructure.
Consider these new requirements in the design of building systems and some of the issues they raise:
- Secure access control: Linking the provisioning of RFID-type security systems to human resources systems will ensure that the right employees get through the right doors. This will require organizations to make sure appropriate privacy policies and practices are in place.
- Energy efficiency: Electric power demand-monitoring systems promise cheaper power and higher levels of availability from the public power grid. Enterprise users must be ready to have their power utilization monitored and possibly even controlled down to the individual device level for this to work.
- Security: Video monitoring of premises for both external and internal security purposes is increasingly common. We can hope that this improves the physical security of our buildings, but whether it does or not, it certainly makes the environment more transparent -- or intrusive, depending on which side of the camera one sits.
- Building signage: Even building signs (e.g., lobby directories, special-purpose meeting-instruction signs and emergency exits) are being integrated in the interoperable building of the future. On arrival in an unfamiliar building, it will be nice to have signs that are dynamically configured to point us in the right direction. I'm not sure how I'll feel, however, when information screens in every elevator lobby of a high-rise inform me -- and every other occupant -- that my car has been towed out of the parking lot because I'm two months late on my parking fees.
In support of these goals, building systems, once the domain of HVAC engineers and security services, are becoming just one more information system. As with our other information systems, the first design requirement is that it be built on open standards for interoperability. The International Standards Organization has even released a standard (ISO 16484-5:2003) that "defines data communication services and protocols for computer equipment used for monitoring and control of heating, ventilation, air conditioning and refrigeration, and other building systems." The aim of the standard is to facilitate "the application and use of digital control technology in buildings."
As buildings become more automated, formerly disparate components (HVAC, LANs, security systems and even signage) will become interoperable
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts