SlideShare uma empresa Scribd logo
1 de 40
Designers Light Forum
Human Machine
Interaction
Lindsay Stefans
Credit(s) earned on completion of
this course will be reported to AIA
CES for AIA members. Certificates of
Completion for both AIA members
and non-AIA members are available
upon request.
This course is registered with AIA CES
for continuing professional
education. As such, it does not
include content that may be deemed
or construed to be an approval or
endorsement by the AIA of any
material of construction or any
method or manner of
handling, using, distributing, or
dealing in any material or product.
_______________________________________
____
Questions related to specific materials, methods, and
services will be addressed at the conclusion of this
presentation.
AIA CES Credit Info Page
Learning Objectives
1. Compare __ the historical parallels of technological advances and the
social impact of such advances
2.Analyze __the impacts and benefits of recommending smart lighting
systems
3. Identify __ basic principles of data processing, data storage, and data
transmission
4. Describe __ Privacy concerns from connected lighting systems
At the end of the this course, participants will be able to:
LEARNING OBJS (COMPARE, ANALYZE+/-, DATA LIFE, PRIVACY)
What is HCI
Cybernetics is a term that refers to the study of
human control functions, as well as the
artificial systems that are used to replace, or
augment, them.
Cybernetics
Computer
Science
Design
Behavioral
Sciences
What is HCI Venn
Futurecrafting – influencing the future
–
U
b
e
r
v
T
a
xi
v
e
ry
cr
e
at
e
s
$
1
0
B
1. COMPARE HISTORICAL PARALLELS
What happens when you make a device “smart”
•New consumer goods and services
•New consulting opportunities
•Ability for non-industry players to gain access
to an otherwise insular market.
Source: CB Insights
How does
this Relate to
You?
Physical
Sensing
Cyber Space
Actual
Information
Data Processing – 4 Steps
Cloud Computing Defined
What is a network?
 May be open so that any new device can join
Example: Providing free wifi to building visitors
 May be closed so only approved devices can join
 Hardware, software, data can be shared
 May communicate with other networks
Example: Home network talks to Internet
Example: Accounting network talks to Marketing network
Network – Defined
structured and unstructured
Big Data
Network Devices Have a network identity
• Permanent
– MAC Address (like VIN for a car)
• Temporary
– TCP/IP Address (like a license plate)
Network – Address and Car Metaphor
Data Flow – Direction of Data Flow
Lighting Meets BMS
Data Flow – Lighting is an Island
Protocols Defined 2
Examples of Building Management Protocols
Bacnet
Lonworks
Mod-bus
BACnet is a communications protocol for building automation and control networks.
It is an ASHRAE, ANSI, and ISO 16484-5 standard protocol.
Protocols – Building Management Systems
Lighting Protocols
Bluetooth Zigbee / Snap
TCP/IP
Z-Wave
Visible Light Communication - VLC
Art-Net
Protocols – Lighting Management Systems
Mesh Network
Zigby is Mesh
Data
Concerns
Data Concerns
Physical and Logical Topologies
Physical view vs. Data view
Active vs. Passive Metadata
What is metadata?
M
e
t
a
d
a
t
a
–
W
h
a
t
i
s
m
e
t
a
d
a
t
a
Legal
»Reporting
»34B
»Retention requirements
Legal Concerns
Custodian PC Date Exists Phone Date Exists
Smith Dell 01.01.2001 –
06.05.2013
iPhone 5s 05.12.2013 –
Present
Jones Toshiba 01.01.2001 –
02.10.2016
Blackberry 02.10.2015 - Present
Data Mapping
data storage - data map
Control
System
Devices Where
does data
reside?
How long is
data
accessible
Who has
access?
Encrypted?
Bacnet Local 30 days Mr. G
AWS indefinitely Mr. H
Data Mapping 2
Is it connected to internet?
Are security measures in place?
Should I perform penetration testing?
Are communications encrypted?
Security Concerns
“We know not through our intellect
but through our experience.”
― Maurice Merleau-Ponty
Merleau-Ponty Quote
Merleau-Ponty Venn
Thank you.
lindsay@metafarm.com
takeaways:
Network ecosystem contain
diagnostic and user activity
Investigate/Document how
lighting connects to building
management systems
Who / What will control the data flow?
Ask questions…then
Ask more questions
This concludes The American Institute of Architects Continuing
Education Systems Course
End Page

Mais conteúdo relacionado

Mais procurados

updated-poster
updated-posterupdated-poster
updated-poster
Lucy Yan
 
Catalogo dialux ro beu-part1-2
Catalogo dialux ro beu-part1-2Catalogo dialux ro beu-part1-2
Catalogo dialux ro beu-part1-2
Jose Suarez
 
Resume Devin Earl
Resume Devin EarlResume Devin Earl
Resume Devin Earl
devin earl
 
Venture Lab 2012_Value Proposition
Venture Lab 2012_Value PropositionVenture Lab 2012_Value Proposition
Venture Lab 2012_Value Proposition
nitishrox
 
ODC Capabilities Presentation
ODC Capabilities PresentationODC Capabilities Presentation
ODC Capabilities Presentation
DonDavis
 

Mais procurados (10)

Wired-wireless or both - Presented by Ross Eberlin
Wired-wireless or both - Presented by Ross EberlinWired-wireless or both - Presented by Ross Eberlin
Wired-wireless or both - Presented by Ross Eberlin
 
The Evolution of SSL Lighting Controls - Presented by: Tony Parisi - SEMS
The Evolution of SSL Lighting Controls - Presented by: Tony Parisi - SEMSThe Evolution of SSL Lighting Controls - Presented by: Tony Parisi - SEMS
The Evolution of SSL Lighting Controls - Presented by: Tony Parisi - SEMS
 
updated-poster
updated-posterupdated-poster
updated-poster
 
Catalogo dialux ro beu-part1-2
Catalogo dialux ro beu-part1-2Catalogo dialux ro beu-part1-2
Catalogo dialux ro beu-part1-2
 
Resume Devin Earl
Resume Devin EarlResume Devin Earl
Resume Devin Earl
 
GREENTEK_ENG
GREENTEK_ENGGREENTEK_ENG
GREENTEK_ENG
 
Starc Energy Solutions Opc Private Limited, New Delhi, SLED Lights
Starc Energy Solutions Opc Private Limited, New Delhi, SLED LightsStarc Energy Solutions Opc Private Limited, New Delhi, SLED Lights
Starc Energy Solutions Opc Private Limited, New Delhi, SLED Lights
 
Venture Lab 2012_Value Proposition
Venture Lab 2012_Value PropositionVenture Lab 2012_Value Proposition
Venture Lab 2012_Value Proposition
 
Innovation and Startup Opportunities
Innovation and Startup OpportunitiesInnovation and Startup Opportunities
Innovation and Startup Opportunities
 
ODC Capabilities Presentation
ODC Capabilities PresentationODC Capabilities Presentation
ODC Capabilities Presentation
 

Destaque

Destaque (20)

DMX-512A FOR LED CONTROL: Getting Reacquainted With an Old/New Friend by Shos...
DMX-512A FOR LED CONTROL: Getting Reacquainted With an Old/New Friend by Shos...DMX-512A FOR LED CONTROL: Getting Reacquainted With an Old/New Friend by Shos...
DMX-512A FOR LED CONTROL: Getting Reacquainted With an Old/New Friend by Shos...
 
Is LED Lighting Old News? by Craig Bernecker, Daniel Blitzer and Melanie Taylor
Is LED Lighting Old News? by Craig Bernecker, Daniel Blitzer and Melanie TaylorIs LED Lighting Old News? by Craig Bernecker, Daniel Blitzer and Melanie Taylor
Is LED Lighting Old News? by Craig Bernecker, Daniel Blitzer and Melanie Taylor
 
IoT Lighting Control Development, Deployment and Scalability by Beatrice Witz...
IoT Lighting Control Development, Deployment and Scalability by Beatrice Witz...IoT Lighting Control Development, Deployment and Scalability by Beatrice Witz...
IoT Lighting Control Development, Deployment and Scalability by Beatrice Witz...
 
Beyond Vanity by Gabe Guilliams and James Clotfelter
Beyond Vanity by Gabe Guilliams and James ClotfelterBeyond Vanity by Gabe Guilliams and James Clotfelter
Beyond Vanity by Gabe Guilliams and James Clotfelter
 
Designing Public Lighting for the Public: The AMA Design Guide by Bob Parks
Designing Public Lighting for the Public: The AMA Design Guide by Bob ParksDesigning Public Lighting for the Public: The AMA Design Guide by Bob Parks
Designing Public Lighting for the Public: The AMA Design Guide by Bob Parks
 
Lighting for Behavioral Health by Lauren Roberts and Brienne Willcock
Lighting for Behavioral Health by Lauren Roberts and Brienne WillcockLighting for Behavioral Health by Lauren Roberts and Brienne Willcock
Lighting for Behavioral Health by Lauren Roberts and Brienne Willcock
 
Lighting the Classroom of the Future: a D.O.E Project by Tom Ward
Lighting the Classroom of the Future: a D.O.E Project by Tom WardLighting the Classroom of the Future: a D.O.E Project by Tom Ward
Lighting the Classroom of the Future: a D.O.E Project by Tom Ward
 
Update on NY State & NY City Energy Codes by Lee Brandt
Update on NY State & NY City Energy Codes by Lee BrandtUpdate on NY State & NY City Energy Codes by Lee Brandt
Update on NY State & NY City Energy Codes by Lee Brandt
 
Reconstructing the Business of Light by Deborah Gottesman
Reconstructing the Business of Light by Deborah GottesmanReconstructing the Business of Light by Deborah Gottesman
Reconstructing the Business of Light by Deborah Gottesman
 
Treat Your Building As A Patient by Clifford Yahnke
Treat Your Building As A Patient by Clifford YahnkeTreat Your Building As A Patient by Clifford Yahnke
Treat Your Building As A Patient by Clifford Yahnke
 
Effective Light Measurement and Data Use by Kevin Willmorth
Effective Light Measurement and Data Use by Kevin WillmorthEffective Light Measurement and Data Use by Kevin Willmorth
Effective Light Measurement and Data Use by Kevin Willmorth
 
Light and Health: It is more than tunable white light! by Mariana Figueiro
Light and Health: It is more than tunable white light! by Mariana FigueiroLight and Health: It is more than tunable white light! by Mariana Figueiro
Light and Health: It is more than tunable white light! by Mariana Figueiro
 
A Lighting Designer's Guide to Controls by Andrea Hartranft, Paula Ziegenbein...
A Lighting Designer's Guide to Controls by Andrea Hartranft, Paula Ziegenbein...A Lighting Designer's Guide to Controls by Andrea Hartranft, Paula Ziegenbein...
A Lighting Designer's Guide to Controls by Andrea Hartranft, Paula Ziegenbein...
 
Evidence based lighting, review of classroom case studies by Natalia Lesniak
Evidence based lighting, review of classroom case studies by Natalia LesniakEvidence based lighting, review of classroom case studies by Natalia Lesniak
Evidence based lighting, review of classroom case studies by Natalia Lesniak
 
Revisiting Visual Comfort in the Digital Age by John Katimaris
Revisiting Visual Comfort in the Digital Age by John KatimarisRevisiting Visual Comfort in the Digital Age by John Katimaris
Revisiting Visual Comfort in the Digital Age by John Katimaris
 
One Designer to Another - Color, Dimming, and Flicker in the Age of LEDs by K...
One Designer to Another - Color, Dimming, and Flicker in the Age of LEDs by K...One Designer to Another - Color, Dimming, and Flicker in the Age of LEDs by K...
One Designer to Another - Color, Dimming, and Flicker in the Age of LEDs by K...
 
Square Law Dimming: Presumed Perception or Reality? by Craig Bernecker
Square Law Dimming: Presumed Perception or Reality? by Craig BerneckerSquare Law Dimming: Presumed Perception or Reality? by Craig Bernecker
Square Law Dimming: Presumed Perception or Reality? by Craig Bernecker
 
Tunable White Lighting Control with LEDs by Tom Shearer and Craig Casey
Tunable White Lighting Control with LEDs by Tom Shearer and Craig CaseyTunable White Lighting Control with LEDs by Tom Shearer and Craig Casey
Tunable White Lighting Control with LEDs by Tom Shearer and Craig Casey
 
Are Industry Lighting Metrics Fit for Purpose?
 Are Industry Lighting Metrics Fit for Purpose? Are Industry Lighting Metrics Fit for Purpose?
Are Industry Lighting Metrics Fit for Purpose?
 
Light, Color and Improved Color Quality Possibilities with LED
 Light, Color and Improved Color Quality Possibilities with LED Light, Color and Improved Color Quality Possibilities with LED
Light, Color and Improved Color Quality Possibilities with LED
 

Semelhante a Human Machine Interaction by Lindsay Stefans

Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
smumbahelp
 
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdfPart I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
anandatalapatra
 
1- How does the transport layer use stop and wait to control flow .docx
1- How does the transport layer use stop and wait to control flow .docx1- How does the transport layer use stop and wait to control flow .docx
1- How does the transport layer use stop and wait to control flow .docx
dorishigh
 
Raffi_Service desk Management resume
Raffi_Service desk Management resumeRaffi_Service desk Management resume
Raffi_Service desk Management resume
Shaik Mohammad Raffi
 
Networks for Schools
Networks for SchoolsNetworks for Schools
Networks for Schools
danafredwell
 
BrownResearch_CV
BrownResearch_CVBrownResearch_CV
BrownResearch_CV
Abby Brown
 
AbhinavAggarwal_06_30_2016
AbhinavAggarwal_06_30_2016AbhinavAggarwal_06_30_2016
AbhinavAggarwal_06_30_2016
Abhinav Aggarwal
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
Gabrielle Curtis
 

Semelhante a Human Machine Interaction by Lindsay Stefans (20)

Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
 
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdfPart I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
 
1- How does the transport layer use stop and wait to control flow .docx
1- How does the transport layer use stop and wait to control flow .docx1- How does the transport layer use stop and wait to control flow .docx
1- How does the transport layer use stop and wait to control flow .docx
 
Raffi_Service desk Management resume
Raffi_Service desk Management resumeRaffi_Service desk Management resume
Raffi_Service desk Management resume
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
BIM: The Promise of an Integrated Approach to Project Delivery
BIM: The Promise of an Integrated Approach to Project DeliveryBIM: The Promise of an Integrated Approach to Project Delivery
BIM: The Promise of an Integrated Approach to Project Delivery
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Networks for Schools
Networks for SchoolsNetworks for Schools
Networks for Schools
 
Cisco Analytics: Accelerate Network Optimization with Virtualization
Cisco Analytics: Accelerate Network Optimization with VirtualizationCisco Analytics: Accelerate Network Optimization with Virtualization
Cisco Analytics: Accelerate Network Optimization with Virtualization
 
BrownResearch_CV
BrownResearch_CVBrownResearch_CV
BrownResearch_CV
 
Abhinav aggarwal 03-29-16
Abhinav aggarwal 03-29-16Abhinav aggarwal 03-29-16
Abhinav aggarwal 03-29-16
 
Abhinav aggarwal 06_30_2016
Abhinav aggarwal 06_30_2016Abhinav aggarwal 06_30_2016
Abhinav aggarwal 06_30_2016
 
AbhinavAggarwal_06_30_2016
AbhinavAggarwal_06_30_2016AbhinavAggarwal_06_30_2016
AbhinavAggarwal_06_30_2016
 
SIDDARTH new
SIDDARTH newSIDDARTH new
SIDDARTH new
 
Chapter01
Chapter01Chapter01
Chapter01
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
 
Cmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.com
Cmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.comCmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.com
Cmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.com
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Human Machine Interaction by Lindsay Stefans

Notas do Editor

  1. 1. [phone and discovery transition to “smart” status] [uber v. taxi’s example and social impact; show parallels to lighting (futurecrafting slide)] [city of tomorrow] 2. Impacts examples: benefits to citizens vs. tenants, urban expansion 3. [drag networks explained to bottom, replace with high-level overview in lighting context 4. 4.   Describe  __ Privacy concerns from connected lighting systems Basic setup addresses privacy: standalone lighting lan vs. connected to Internet and/or building LAN, offering – access from local only or from remote (Eg. Admin 10 lighting LANs), create graphic
  2. HCI (human-computer interaction) is the study of how people interact with computers and to what extent computers are or are not developed for successful interaction with human beings Passive vs. Active computer interaction. Passive: RFID cards (enter buildings, activate theft alarms), wifi and bluetooth connections Active: Entering PIN codes, keyboards, searching Google, using app to turn off lights
  3. Cybernetics is a transdisciplinary[1] approach for exploring regulatory systems – their structures, constraints, and possibilities. Norbert Wiener defined cybernetics in 1948 as "the scientific study of control and communication in the animal and the machine.“ As such, cybernetics involves the bridging the gap between biologic and technological processes
  4. human-computer interaction is situated at the intersection of computer science, behavioral sciences, design, media studies, and several other fields of study
  5. “futurecraft”—not predicting the future, but influencing it positively—
  6. The main reason Uber exists is because of smart-phones. When lighting is “smart”, there will be new apps. People expected to hail taxis with an app. The Taxi industry couldn’t reach consensus, so Uber obliged. A great example of how making a device “smart” changed how we “call a cab”. The Uber App extended functionality beyond what a traditional taxi or dispatcher offered: a shareable real-time GPS of trip/route; autopay; email receipt with route map; website with ride history; rider pooling; the list goes on. These are features we still don’t see the taxi industry offer. Data over lighting is already a reality. The lighting industry needs to understand, own and administrate the new features, or someone else surely will. Designers need to be able to explain the value to the building owners, and that the designers can aid in this part of the lighting project. The Taxi industry thought it was insulated against new competition. They owned the laws and, essentially entry into their marketplace. Who could possibly bypass them, putting cars on the streets and riders into those cars? Having customers stand on the side of the road or call and wait 45 minutes for a pick-up was, to their thinking, sufficient. Thus they stopped innovating and rested on their laurels. (consider adding graph: value of taxi medallion over time)
  7. Moving from paper document review to electronic “native” format review created $2.7B in software and $7B in services. Attorney: “I’ve been litigating for 30 years and now you’re going to tell me that I need all these new services and software to do my job?” Me: “Yes.” This is a true 2001 encounter between a seasoned partner in a large law firm and a litigation support consultant. I was promoting the benefits of using the native format instead of paper for review. In 2006 the Federal Rules of Civil Procedure made it official: everyone was to go native. This moved document review from a paper format to an electronic format (aka “ediscovery”) thereby generating a $10+ billion dollar industry. Litigators need to review every document which is potentially related to the case. The attorneys rely upon the eDiscovery Software and Services Market to collect and put those documents onto their screens. At the time, specialty photocopy shops made all the photocopies for litigators and owned that industry. They now had the ability to provide additional consulting services and even develop new software.
  8. Lighting systems can generate and transmit data as an isolated network or connected to the Internet and building management systems. As lighting becomes “smart” we must educate ourselves and control the new data aspect or watch consulting fees go to others. Smart lighting shouldn’t just evolve lighting, but the lighting profession, as well. The following are three examples: Phones Uber v. Taxi Litigation Discovery Lights
  9. Welcome to the Internet of Things Internet of Things allows objects to be sensed and controlled remotely across existing network infrastructure,[2] creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit;[3][4][5][6][7][8] when IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, smart homes, intelligent transportationand smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of almost 50 billion objects by 2020n both energy management and smart homes and possibly retail. Security is related to all.
  10. Motoko Ishii is a legendary Japanese Lighting Designer. She didn’t have to think about IoT in her profession. However, this relates to you on a personal level and a professional level. “How do you think this relates to you?” As an exercise, think of a powered object (anything that is plugged into an outlet, runs on batteries or is permanently wired/powered) that you use, encounter or rely upon in your daily life. For my example, I will use an electric shaver. What could the shaver tell me? What would I say to it? It could use bluetooth to order replacement blades, or alert you (Tweet, email, call, txt message) that it’s time for a new one. Now it’s your turn. [potential question: Think of an installation you are designing now. What are the objects in that environment? What information could they tell you? If you could control or at least communicate with them from an app, what could you do? ]
  11. The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data Cyber-Physical systems
  12. [lindsay, I included 2 good graphics.] Data Processing consists of 4 steps: Data Input Data Storage Data Processing Data Output The main questions: From where is data input? A person on a smartphone, a sensor telling the amount of ambient light, an admin command configuring the lights. Input could come from any number of sources, people or sensors. If connected to the Internet, the people and the sensors could be anywhere. Where is data processed and stored? Those computers could be on the Net or in the computer room, down the hall.
  13. “The cloud” is just a metaphor for the Internet. “Cloud storage” or “cloud computing” refers to storing data and programs on a remote computer which you access via the Internet instead of storing the same data and programs on your desktop computer hard drive. When you store files on Dropbox, Evernote or Google Drive, they are saved onto some remote computer that is connected to the Internet 24/7. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided to computers and other devices on-demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources.
  14. If I have a thermostat, it is standalone, but if it is on network then software can look at that What is a “networked device” Any electronic device that communicate with other electronic devices Smartphones Laptop LED The rental car stereo that connected to your phone via Bluetooth How does data know where to go? Networked devices all have a “network address”. When your phone requests a webpage, it puts the website address as the “to” address. It also puts it’s “return” address. That’s how each device knows how to route data to other devices on any network. An ecosystem of metadata. Each device is both ingesting and producing data. It could be about the machine requesting a file or it could be a machine sending a print job. Or it could be a bacnet server providing management controls to the building manager’s desktop. And that desktop could be on local or remote network. Sample metadata fields: username, device network address/IP address, security parameters, logging of activities “digital footprint” which can be digital footprints created by user or automatically created. For example, there is antivirus software running on local network. It is constantly looking for viruses and keeping logs, webserver keeps logs of who get into various sites. Logs of outside systems trying to connect to your system. If a building has 4 or 5 systems, information is logged automatically.
  15. Big data is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, querying and information privacy. The term often refers simply to the use of predictive analytics or certain other advanced methods to extract value from data, and seldom to a particular size of data set. Accuracy in big data may lead to more confident decision making, and better decisions can result in greater operational efficiency, cost reduction and reduced risk. Big data is a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and strategic business moves.
  16. In order to travel on roads (local, intrastate or interstate) we require cars to display a license plate. We also require certain protocols: car must have windshield, seatbelts, headlights, and so forth. The roads are your networks. Just like roads, some kinds of traffic are not allowed. Some plates are allowed to drive on certain roads (local, intrastate) but not others. People determine how they want to administrate the flow of vehicles. So it is with data communications. A road is a network. The car is a container. In the container are passengers. These passengers represent the data. Data could be a webpage, bank transaction or a new lighting configuration. A network consists of two of more devices that communicate with each other. Every device on the network has two unique identifiers: the MAC address and the IP address. The manufacturer assigns each network card a MAC address. It stays the same regardless of the network. The IP address is a temporary address assigned by the network, and can change every time a device is reconnected. When you browse a website on your phone, it is on a network. It has a unique ID, and the data goes from one network to another until it reaches the website. The “inter” in internet means “between” networks. By contrast, a business private intranet is set up for access and communications within the network (intra – internal). The Internet is a network of networks, allowing a phone app in Chicago communicate with a light fixture in New York.
  17. [graphic: https://www.slideshare.net/paolopat/io-t-protocols-landscape] Depending upon a device’s purpose on the network, we have a few configuration options. Telemetry – information flows from device to other systems for conveying status changes in the device. Inquiries – Requests from devices looking to gather required information or asking to initiate activities. Commands – Command from other systems to a device or a group of devices to perform specific activities. Notifications – Information flows from other systems to a device or a group for conveying status changes in the world.
  18. Building owners can choose (1) isolated lighting data network (2) data connection to building data network (3) data connection to Internet. What makes the IoT and all our new and potential apps (and related goods/services) possible is connectivity. Think of Comcast as a data carrier (or Internet Service Provider). In this role, it is less concerned with what it transmits than how many GBs of data someone consumed. By turning the lights into data carriers, you enable communications with many objects, indoor or outdoor. You also allow those objects to communicate with each other. If the lighting network is connected to the building network, then you could provide the building engineer with access to management systems, such as security, HVAC and elevators.
  19. In this network diagram (map) we see that both the lighting and bms have their own separate connections to the Internet. All communications must go through a gateway to reach the next network. Data Flow Options: Lighting Outbound Only – the lighting system sends data to the Internet, but no inbound allowed; Lighting 2 Way – apps can communicate with lighting via direct connection or via Internet; BMS – same thing; This layout could allow for someone to access lighting from inside the BMS network, and vice versa. Security is how we restrict communications and access from outside a given network. In the above layout one would need to set up security on both the lighting and BMS gateways.
  20. In this network configuration, we see that, in theory… Someone on the Internet could connect to the BMS and from there, to the lighting system. Someone could admin the BMS via the Internet or Lighting network. If BMS’s Internet connect goes down, lighting has no connection. Again, security is how we restrict access and flow of data from one network to another, or within a given network, too.
  21. In this data communications config, we see that the lighting network is self-contained. It is not accessible to/from the Internet or BMS networks. The BMS is able to communicate with the Internet in our example.
  22. Your smart phone is able to communicate with all of the network devices on any of these networks. Whether it is simply an RSS feed from lighting that lets you know public information or apps that controls lighting and HVAC, the options for controlling access to data and the flow of data is mostly limited by the owner’s vision.
  23. Protocol http://slideplayer.com/slide/5357404/ A protocol is a system of rules that define how something is to be done. In computer terminology, a protocol is usually an agreed-upon or standardized method for transmitting data and/or establishing communications between different devices.
  24. This Website is dedicated to providing the latest information on BACnet - A Data Communication Protocol for Building Automation and Control Networks. Developed under the auspices of the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE), BACnet is an American national standard, a European standard, a national standard in more than 30 countries, and an ISO global standard. The protocol is supported and maintained by ASHRAE Standing Standard Project Committee 135 whose members have created and provided the content for this Website.
  25. Mesh networking is a key architecture for the Internet of Things (IoT). Standards such as IEEE804.15 ZigBee have implemented mesh networking over the last twenty years with success in industrial automation. This means each node of the network can accept and forward data to a neighboring node, allowing a network to scale more easily by just adding new nodes. This is more cost effective and easier to implement than having to use additional gateway devices or access points which often also need more extensive planning to avoid clashing frequencies. Bluetooth by comparison has essentially been a point-to-point connection, linking to a terminal such as a smartphone or to an access point such as an iBeacon or Eddystone. As such it has been very successful in wearable technologies, providing a link back to a smartphone and from there to the wider Internet. This has allowed Bluetooth technology to be used in a range of applications that are increasingly connecting directly to the Internet and is driving a demand for mesh networking. Bluetooth Low Energy (LE) (also called Bluetooth Smart or Version 4.0+ of the Bluetooth specification) is the power- and application-friendly version of Bluetooth that was built for the Internet of Things (IoT). - See more at: https://www.bluetooth.com/what-is-bluetooth-technology/bluetooth-technology-basics/low-energy#sthash.WhAsgHkZ.dpuf
  26. Operational How long is data stored Where is data stored How will data be accessed, processed, used and by whom Security Custom hardware attacks Stuxnet
  27. Difference between the layout of the cables and hardware versus how data experiences the eco-systems and flow.
  28. The accounting software can store both (1) ledger values and (2) user activity values. Metadata shows Sue Jones logged into the server at 3:45pm, made 4 ledger edits and printed 3 reports.
  29. Metadata includes fields and values which summarize basic information about a thing: Books could include: [FIELDNAME] = [VALUE] Author = Title = Published = Call # = Keywords = Each Light could include: Make Model Component/Module Serial Numbers GPS coordinates (including altitude) Local Area Network Address More…
  30. [break out into 3 slides+] Explain 34B 34b is the section of the federal rules of civil procedure (FRCP) which is how the law defines identification and collection and use of ESI. What is the lighting ESI? Where is it located? How do you collect it? Who is in charge? Who is the administrator?
  31. Data maps are needed for buildings both operational and for litigation.
  32. data map should be system name, software metadata access, where is it stored, who is administrator, end user, security concerns multiple systems, what devices are there? Where are those devices? In litigation this would be an evidence map. Not specific to any vendor. Security---metadata information “where are the bodies buried? Where is weak link?