The Leader Magazine

SEP 2016

Issue link: https://theleader.epubxp.com/i/718980

Contents of this Issue

Navigation

Page 63 of 75

64 SEPTEMBER 2016 Craig Van Pelt's professional experience is in the public, private and non-profit sectors and includes financial analysis and mod- eling, corporate real estate, valuation, development economics, site selection, and market research. Craig holds an MBA from the University of Michigan and a BA in Urban Planning from Miami University. r eferences 1. Maycotte, H.O. "Beacon Technology: The where, what, who, how and why". Posted September 1, 2015. Forbes. com. Accessed April 2016 from: www.forbes.com/sites/ homaycotte/2015/09/01/beacon-technology-the-what- who-how-why-and-where/#54ab0b834fc1 2. Accessed April 2016 from www.engadget. com/2014/03/28/san-francisco-giants-mlb-ibeacon/ 3. Note: In July 2015, Google launched its Bluetooth technology specification called Eddystone, a direct competitor to Apple's iBeacon. 4. Shu, Les. "Van Gogh vs. Candy Crush: How museums are fighting tech with tech to win your eyes". Digitaltrends.com. Access April 2016 from: www.digitaltrends.com/cool-tech/ how-museums-are-using-technology/ Note: The Brooklyn Museum has installed beacon technol- ogy, but not without some issues. For further reading please see: www.brooklynmuseum.org/community/ blogosphere/2015/02/04/the-realities-of-installing-ibeacon- to-scale/ 5. Morgan, Jacob. "A simple explanation of 'The Internet of Things'". Posted May 13, 2014. Forbes.com. Accessed April 2016 from: www.forbes.com/sites/jacobmor- gan/2014/05/13/simple-explanation-internet-things-that- anyone-can-understand/#23585ac36828 6. Information related to beacon and sensor technology and their potential uses to track occupancy was found here: ap.haworth.com/docs/ default-source/white-papers/haworth-analytics---april-2015. pdf?sfvrsn=6 7. Cheng, Natalie. "A Guide to iBeacon Hardware and Con- textually Aware Platforms". Posted April 28, 2014. Chaione. textually Aware Platforms". Posted April 28, 2014. Chaione. com. Accessed April 20166 from: chaione.com/a-guide-to- ibeacon-hardware-and-contextually-aware-platforms/ 8. Accessed April 2016 from: en.wikipedia.org/wiki/Con- text_awareness 9. Danigelis, Alyssa. "S.O.S. app turns smartphone into emer- gency beacon". Discovery.com. Accessed April 2016 from: news.discovery.com/tech/apps/sos-app-turns-smartphone- into-emergency-beacon-140429.htm property of mobile devices that is defined complementarily to location aware- ness. 8 In other words, the system must know about the preferences or identity of particular individuals in order to deliver the right message when they pass near a designated area. • Tenant experience: Simplifying and improving occupants' experiences within a building is the goal of any facility manager or building owner. The idea behind the Internet of Things and smart buildings is to facilitate these experiences for tenants. For example, a tenant enters a building and her office computer and lights are turned on, HVAC is set to the preferred temperature, and the coffee machine is triggered. Through beacon technology and context awareness, these features can be implemented into building automation systems to improve users' experience. i experience. • Disaster management: Threats or danger can come in many forms – natural me • Disaster management: Threats or danger can come in many forms – natural in many forms – natural disasters, fires, power outages, or terrorist attacks. Because rrorist disasters, fires, power outages, or terrorist attacks. Because attacks. Because beacons work on batteries and send signals through Blue- nd beacons work on batteries and send signals through Blue- send signals through Blue- tooth technology, connection to the Internet is not tooth technology, connection to the Internet is not nection tooth technology, connection to the Internet is not to the Internet is not necessarily dependent. ndent. 9 Beacons can provide immediate updates to people quietly updates immediate updates to people quietly to people quietly and securely on the one device that urely and securely on the one device that on the one device that most have with them at any given t most have with them at any given have with them at any given moment – their smartphones. ment moment – their smartphones. – their smartphones. Providing updated information viding Providing updated information updated information and escape routes can prove to be escape and escape routes can prove to be routes can prove to be invaluable. Beacons can also send able. invaluable. Beacons can also send Beacons can also send the location of individuals to emergency of individuals to emergency personnel to let responders know where people ponders personnel to let responders know where people know where people are located in rescue and recovery efforts. e are located in rescue and recovery efforts. and recovery efforts. Challenges The actual or perceived threat of the invasion of privacy t The actual or perceived threat of the invasion of privacy of the invasion of privacy is a very real issue surrounding beacons and micro-location- is a very real issue surrounding beacons and micro-location- acons is a very real issue surrounding beacons and micro-location- and micro-location- enabling services. Although the technology is intended to provide enabling services. Although the technology is intended to provide enabling services. Although the technology is intended to provide enabling services. Although the technology is intended to provide nology enabling services. Although the technology is intended to provide is intended to provide efficiencies and increased safety, there are scenarios, such as when efficiencies and increased safety, there are scenarios, such as when re efficiencies and increased safety, there are scenarios, such as when scenarios, such as when tracking employee locations, that may be considered intrusive. Users of tracking employee locations, that may be considered intrusive. Users of nsidered tracking employee locations, that may be considered intrusive. Users of intrusive. Users of beacon technology can opt in or opt out of the service on their Bluetooth beacon technology can opt in or opt out of the service on their Bluetooth service on their Bluetooth enabled device. Adoption of this service will have to be widely used and enabled device. Adoption of this service will have to be widely used and enabled device. Adoption of this service will have to be widely used and ave enabled device. Adoption of this service will have to be widely used and to be widely used and generally accepted for the technology to reach its full potential. Other issues generally accepted for the technology to reach its full potential. Other issues generally accepted for the technology to reach its full potential. Other issues its full potential. Other issues such as security, interference problems, and accuracy will only improve as such as security, interference problems, and accuracy will only improve as ccuracy such as security, interference problems, and accuracy will only improve as will only improve as beacon technology proliferates. Further, compatibility between the beacon beacon technology proliferates. Further, compatibility between the beacon beacon technology proliferates. Further, compatibility between the beacon atibility beacon technology proliferates. Further, compatibility between the beacon between the beacon manufacturers and the associated software, coupled with the hardware of manufacturers and the associated software, coupled with the hardware of manufacturers and the associated software, coupled with the hardware of pled manufacturers and the associated software, coupled with the hardware of with the hardware of different phones, will need to be consistent and inclusive for beacon technology to different phones, will need to be consistent and inclusive for beacon technology to different phones, will need to be consistent and inclusive for beacon technology to different phones, will need to be consistent and inclusive for beacon technology to different phones, will need to be consistent and inclusive for beacon technology to lusive different phones, will need to be consistent and inclusive for beacon technology to for beacon technology to truly succeed. Once these challenges are addressed, the use of beacons will flourish y truly succeed. Once these challenges are addressed, the use of beacons will flourish truly succeed. Once these challenges are addressed, the use of beacons will flourish g truly succeed. Once these challenges are addressed, the use of beacons will flourish he truly succeed. Once these challenges are addressed, the use of beacons will flourish use of beacons will flourish and can become a seamless part of our experiences – truly connecting the physical and digital world for tenants, occupiers, and guests. F E A T U R E A R T I C L E

Articles in this issue

Links on this page

Archives of this issue

view archives of The Leader Magazine - SEP 2016