The Internet of Things is the Land of Opportunity

November 2015 Editor's Choice, Information Security, Security Services & Risk Management

The worldwide web most of us are familiar with is a place populated by about 2.5 billion people who go online to find information, entertainment and shopping, or to stay in touch with friends and share ideas with colleagues. The Internet was made by people, for people.

Neil Cameron, GM, Johnson Controls Building Efficiency.
Neil Cameron, GM, Johnson Controls Building Efficiency.

But now it has become the Internet of Things (IoT). Experts predict that in a few years there could be 100 billion devices – actual physical things – connected to the web. Some of these devices are online today and more, many more, are coming soon.

In the IoT, devices equipped with sensors, hardware and software are networked together through the Internet, where they can communicate with one another, machine-to-machine (M2M). Intelligent devices are changing the way we eat, drive, communicate, receive medical care, light our cities and consume energy.

Sensors embedded in roads control traffic flow. Vending machines tell us when they need to be refilled. A heart patient’s pacemaker alerts her cardiologist to a problem before it becomes dangerous. With sensors in the soil, farm fields know when they need to be irrigated and fertilised.

Nowhere is the impact of the IoT felt more than in the world of building efficiency. The big game-changer is M2M communication, coupled with sophisticated new tools like cloud-based solutions and applications, which analyse the massive amounts of data gathered by sensors and turn it into useful information that helps building managers do their jobs better. Imagine thousands of electrical switches, thermostats, lights, door locks, air-handling units, chillers and other components gathering and sharing data, even solving problems on their own.

We are seeing this more acutely in the South African market where buildings aggregate information or data from sensors but there isn’t a significant uptake to share this information over the Internet, ultimately underpinning smart environments that lead to smart cities. However, value is certainly being derived with real-time communication and access to data which delivers a number of benefits such as proactive monitoring of the facility and the early detection of failure which can significantly reduce downtime.

In the very near future, lights equipped with sensors that detect the presence or absence of building occupants will cut energy consumption by an estimated 50 to 75 percent. Interconnected units of equipment will work together to find the most efficient way to heat or cool a facility without human intervention. Machines will diagnose their own need for maintenance, which will be scheduled automatically. Total integration will become a reality.

This is all happening now because two important drivers are in place: opportunity and necessity.

Advances in wireless networking technology and standardised communication protocols make it possible to collect data from sensors almost anywhere, any time. Silicon chips continue to get smaller and more powerful even as their cost drops. Advancements like cloud computing make it possible to crunch numbers and store data on a never-before-seen scale, again with declining costs.

And there are real needs. As the global demand for energy rises, sustainability and energy efficiency aren’t just good financial goals – they’re becoming mandates in many countries, creating new and very real business challenges.

The IoT gives us the power to meet these challenges, and the opportunity to redefine absolutely every aspect of our industry. Because when everything works together, everything works better, works more efficiently and lasts longer than ever before. And it doesn’t stop with making buildings more efficient. Because the IoT makes us humans work better and more efficiently, too.

For more information contact Johnson Controls, +27 (0)11 921 7141, [email protected], www.johnsoncontrols.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...