Modularity not always better

February 2016 Editor's Choice, Integrated Solutions

There’s no disputing the value that a building management system (BMS) can add. It can be a big ticket item, however. This can make the idea of purchasing a scaled-down, modular BMS that can be expanded on a pay-per-feature basis attractive. Let the buyer beware – it’s a trap that may cost you more than you imagine.

Neil Cameron.
Neil Cameron.

The lure is that the company only pays for the features it needs, so the initial capital outlay may be as little as one third of the price of a complete solution. The snare: once a user has bought into the model, they may be stuck with annual licence fees, crippled by a lack of key functionality, and stuck with a solution that cannot grow with the business as its needs change.

The core value of a BMS is that it provides a single platform for the integration and management of building systems – from heating, ventilation and air conditioning (HVAC) systems to lighting, security and fire protection solutions. BMSs make buildings smarter and more efficient by providing essential instrumentation and control, which saves energy, lowers operational costs and enables productive and secure environments.

BMS platforms built on open standards allow integration of disparate systems, sophisticated features enable enhanced system configurations, programming capabilities facilitate proprietary enhancements to the system, and user interfaces designed for ease of use deliver information, trends and reporting that help facility managers make better decisions, refine tactics and deliver on strategic imperatives.

Minimum solution

The challenge facing companies that select a BMS with a minimum spec is that they will pay separately for almost every component of the product. Often, in response to a Request for Pricing (RFP), solution providers will propose a minimum spec that meets the requirements – a solution that may only comprises a base model, an inferior product in terms of features and functionality, which can be upgraded, but at a cost.

The problem is that the buyer is often unaware of what, exactly, should be defined as key functionality. They may consequently find themselves paying to connect to diverse third-party systems or to connect devices, i.e. paying for inclusion of basic open data communication protocols for building automation and control networks like BACnet or a networking platform like LONworks to connect devices. They may also find themselves shelling out for basic reporting (e.g. a sliding scale based on the size of the trend) or for alerting. These are all features that come standard with leading BMS systems which, for the most part, don’t require annual licensing either.

The greatest loss to the business is the inability of these basic and modular systems to grow with the business. In the majority of BMS installations, key functionality is initially commissioned and additional functionality is activated as the organisation becomes familiar with the features and begins to refine its management capabilities. With a basic system in place each decision comes with an additional financial investment, hampering advancement and cutting short the benefits to the organisation.

In addition, fully featured BMS solutions typically provide users with ongoing updates, enhancing features and introducing new solutions that enable the organisation to keep abreast of trends and participate in beneficial industry advances, such as smart grid and smart city initiatives. A basic system provider is unlikely to be able to provide users with that kind of functionality as only some of the key features this advanced functionality requires will be activated.

The bottom line? Keep your eyes open to the full cost of ownership across the lifecycle of the BMS product, and find a solution that will allow your organisation to meet strategic imperatives such as energy and cost management, and grow.

For more information contact Johnson Controls, +27 (0)11 921 7141, [email protected], www.johnsoncontrols.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...