Responsive BMS user interfaces
March 2015
IT in Manufacturing
Built for use in control rooms where the desktop PC reigns, building management system (BMS) applications have been slow to adapt to use on tablet PCs and smartphones. At best, they deliver a ‘clunky’ experience. To meet the rapidly growing requirement for anytime, anywhere access to the BMS via multiple device types, Johnson Controls has made a responsive interface the focus of the latest upgrade to its Metasys BMS.
“Users have become more mobile and use of smart devices has grown,” says Johnson Controls Building Efficiency for Africa general manager Neil Cameron. “At the same time, building systems have become more sophisticated and automated. To realise the potential this represents, Johnson Controls has focused its attention on ensuring Metasys users are able to access BMS information quickly and easily on any smart device.”
In enabling the front-end user interface of the BMS for different devices, Johnson Controls has ensured the user experience is as intuitive as possible, with relevant or critical information prioritised and displayed in a format that is accessible via the device. For example, a small format smartphone may more readily display system performance values graphically, while a tablet PC may facilitate viewing a dashboard display.
“This will put critical information at the fingertips of users, empowering them remotely to control building systems, pre-empting rapid response to situations from wherever they may be,” adds Cameron. “In addition, as system interfaces are easily configurable, users with different profiles, e.g. an electro-mechanical engineer versus the building manager, can easily adapt the interface to display whatever information they find most useful.”
To remain relevant and maximise the functionality of their BMS applications, users need to relook the capability of their solutions. This will become increasingly important as building management job functions continue to specialise, the systems become more automated, and decisions need to be made and acted on faster.
“BMS systems have advanced significantly in the last decade and they will continue to do so.
“To make those advances effective, ease of access to data and reports is essential, as is being able to action those decisions in a timely manner. Better user interfaces make that possible. It is a good time for users to revisit this functionality in their BMS’ and make the necessary upgrades,” concludes Cameron.
For more information contact Johnson Controls, +27 (0)11 921 7141, [email protected], www.johnsoncontrols.com
Further reading:
Enhancing cyber security for industrial drives
Siemens South Africa
IT in Manufacturing
The growing connection between production networks and office networks as part of IT/OT integration and the utilisation of IoT have many benefits for industrial companies. At the same time, they also increase the risk of cyber threats. Siemens ensures that your know-how and plants are protected at all times.
Read more...
Immersion cooling systems for data centres
IT in Manufacturing
The demand for data centres in Africa is growing. The related need for increasing rack densities brings with it escalating cooling requirements.
Read more...
Transforming pulp and paper with automation and digitalisation
ABB South Africa
IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.
Read more...
New world of process control: A completely web-based process control system
Siemens South Africa
IT in Manufacturing
Control technology is crucial for gaining a competitive edge in the process industry. That’s why there’s SIMATIC PCS neo - the innovative ground-breaking process control system by Siemens.
Read more...
Protecting industrial networks with resilient defence
RJ Connect
IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).
Read more...
The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.
Read more...
AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.
Read more...
Technology won’t save your business from cyber threats
IT in Manufacturing
Artificial Intelligence is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats.
Read more...
Addressing the cooling needs of the modern data centre
Schneider Electric South Africa
IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.
Read more...
South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.
Read more...