Rob Allen’s 7 Minutes in Control: Neptronic’s EVC Controller — Low Cost, High Performance VAV

This ultra-informative episode of Rob Allen’s 7 Minute in Control reviews the Neptronic EVC Conroller. Neptronic offers an exceptional low cost, high performance stand-alone or BACnet MS/TP, VAV solution — that works! The EVC products are geared for the Light Commercial Contractor, DDC Controls Contractors, and the savvy end-user customer. NO sign-up fees, NO sales minimums, and NO training requirements, Neptronic’s VAV low cost solution features easy to configure, drop-down menu programming.

ControlTrends Around the World: India

Do you want to know what it takes to be a successful building automation controls system integrator or smart buildings controls provider in India? India is one of the fastest growing markets in the world for building automation and smart building controls and we had a chance to talk with the top movers and shakers in this expansive market.

Our guests include:
Vinayak Sane
Principal Consultant & Chief Technical Architect
Mumbai Area, India Environmental Services

Bhartesh Jamdade
GM-Sales & Operations (BMS Division) at GMP Technical Solutions
Mumbai Area, India Security and Investigations

Ajay Shirgurkar
CEO UCS ENGINEERING DESIGN SOLUTIONS PVT LTD
Sangli, Maharashtra, India Design

Pradip Sheth_Gmail
Owner, SHETH TECHNO CONSULTANTS PVT. LTD.
Ahmedabad Area, India Design
Current

SHETH TECHNO CONSULTANTS PVT. LTD.
Education
L D engineering college, Ahmedabad, India

Sunil Gupta has an unmatched experience in an industry (IT Infrastructure Services – IDC, Hosting and Cloud)) that’s barely over a decade old. He is best known as the person who has built and run the most number of data centers in India. With an experience of setting up 12 data centers spread over 12,000,000 sq.ft. of space, he can guide an organization who wants to build and operate large data centers both from a macro and micro perspective.

Thanks to Easy IO for introducing us to our new friends at the Easy IO world conference in Madrid, Spain. Remember, “Pound the rock and release the beast.”

2014 ICS Cyber Security Conference October 20-23, 2014 in Atlanta, GA

ics_cybersecurityAs the longest-running cyber security-focused conference for the industrial control systems sector, the 2014 ICS Conference will cater to the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations. The conference will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

The 2014 ICS Cyber Security Conference will address the myriad cyber threats facing operators of ICS around the world, and will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

Bigger and better than ever before, select sessions of interest in the 2014 ISC Conference will include:

* A summary and status of the two utilities performing Aurora hardware mitigation projects in conjunction with the Department of Defense
* A summary and status of the two utility ICS cyber security test beds (the equipment is the same as in water, oil/gas, pipelines, chemicals, etc.
* A summary and status of the Department of Defense ICS cyber security test bed
* A summary of the recovery and remediation actions from one the most significant ICS cyber incidents to date – complete loss of DCS logic with plants at power
* A summary of Project Shine findings
Discussions of recent non-North American ICS cyber incidents
* Immerse yourself in the reality of managing a plant under cyber-attack: Play KIPS, the Kaspersky Industrial Protection Simulation

Online Registration!

Cyber Security EYE-OPENER: Project SHINE (SHodan INtelligence Extraction) Reveals Magnitude of Internet-connected Critical Control Systems

lock-cyber-security2ControlTrends thanks Marc Petock, VP, Marketing Lynxspring, Inc for this Cyber Security eye-opener article about Project SHINE that revealed that 2.2 million SCADA and BACnet devices were identified as being directly or indirectly exposed to hacking.

In review of Rasshid’s article, Marc writes, “Project SHINE Reveals Magnitude of Internet-connected Critical Control Systems. We have witnessed that SCADA, building management and energy management systems can have security weaknesses, such as inadequate password protection, software that can be breached and various unmonitored/unprotected access points within the network.”

Excerpts from Fahmida Y. Rasshid’s October 6th, 2014, Project SHINE article in securityweek.com:

Project SHINE was undertaken to determine the magnitude of SCADA/control systems’ devices that are exposed directly to the Internet. The results were astounding. Roughly 2.2 MILLION devices were identified as being exposed either directly or indirectly related to SCADA or control systems.

Researchers identified 182 manufacturers who were considered traditional SCADA and control system manufacturers, and built relevant search queries based on those names to find devices. That was a surprise, considering the team expected only a dozen or so manufacturers. In the end, the team sampled about 2.2 million devices during the course of the project.

The project didn’t end in January because the team found everything. “We didn’t see an end to this effort, so we decided to put a stake in the sand and say, ‘At this point we have enough data to report about this.’ This is a snapshot,” Radvanosky told SecurityWeek.

Of the sampled devices, roughly a quarter of them, or 586,997 industrial systems—such as RTUs and PLCs—were manufactured by vendors such as Allied-Telesys, Niagara, DIGI International, Intoto, Siemens, Lantronix, Moxa, EnergyICT, and VXWorks. EnergyICT, Siemens, and Moxa were the most widely used.

Another 13,475 devices were HVAC and building automation systems from Bacnet International, Bosch Automation, Honeywell, Lennox, and LG Electronics. Heatmiser and Honeywell accounted for the most of the devices in the sample. Considering HVAC and automation systems as part of SHINE’s data set was important considering many attackers are using these systems as an indirect avenue of attack, Radvanosky said. These systems let attackers come into the network and scan to find out what other systems are accessible. Consider what happened with Target, and with a number of healthcare organizations recently, he said.

FahmidaFahmida Y. Rashid is a Senior Contributing Writer for SecurityWeek. She has experience writing and reviewing security, core Internet infrastructure, open source, networking, and storage. Before setting out her journalism shingle, she spent nine years as a help-desk technician, software and Web application developer, network administrator, and technology consultant.

Building Energy Efficiency Frontiers and Innovation Technologies (BENEFIT) – 2015 Funding Opportunity Announcement

DOE1The Building Technologies Office (BTO)’s Emerging Technologies Program has announced the availability of nearly $8 million under the Building Energy Efficiency Frontiers and Innovations Technologies (BENEFIT) Funding Opportunity Announcement (FOA) DE-FOA-0001166. This FOA combines an early-stage research and development topic (Innovations) with a later-stage research and development topic (Frontiers) that complements the core funding provided to the national labs. The FOA allows all interested parties, including corporations, universities, and non-profits as well as the national labs, to contribute to advancement in two of these core technological areas: non-vapor compression HVAC technologies and advanced vapor compression HVAC technologies. It is anticipated that six awards will be made and range from $500,000 to $1.5 million

Applications for this funding opportunity are open under the following topics:

INNOVATIONS: Non-vapor Compression HVAC Technologies – This topic includes developing approaches and technologies for heating, ventilating, and air conditioning (HVAC) that replace vapor compression technologies, which are currently the dominant HVAC technologies due to their scalability, relatively compact size, high reliability, and other attributes. However, vapor compression technologies make use of conventional refrigerants. This research topic seeks to explore long-term non-vapor compression solutions that result in HVAC equipment that does not use refrigerants. Solutions for both natural gas and for electric HVAC equipment are of interest.

FRONTIERS: Advanced Vapor Compression HVAC Technologies – Regional HVAC solutions offer significant energy saving potential for new construction and the existing building stock. Today’s vapor compression equipment has limited cooling control. This topic seeks to develop equipment optimized for specific environments and that can provide dramatic improvements in energy efficiency with modest increases to equipment costs. Because the building stock increases by only a few percent annually, concepts which are applicable only to new construction will have limited energy savings potential. Therefore, concepts that are applicable to both new construction and retrofits of existing buildings are particularly encouraged.

HOW TO APPLY: This funding opportunity is open to individuals, corporations, universities, non-profits, as well as national labs. The final funding amount is subject to congressional appropriations.

See How Honeywell Integrates Access and Security

We caught up with the very knowledgable and passionate Roger Rebennack at the 2014 ASIS Show in Atlanta. See what makes the Honeywell Webs-AX Access and Security so special. From modular control to seamless integration, WEBs-AX Security offers a range of options for meeting the needs of nearly any size or type of building or network of facilities. WEBS-AX Security is open and scalable, offers complete, seamless integration, and it can provide you energy savings — that’s why you should want WEBS-AX Security in your building!

Project Haystack Announces Haystack Connect 2015 Conference

Project HaystackThis is THE EVENT that Connects Community and Ecosystem — Driving Smart Data, Smart Devices, Smart Buildings and Smart Business!

COLORADO SPRINGS, COLORADO –October, 14, 2015 Project Haystack, a non-profit, 501C organization focused on developing common standards to streamline the interchange of data among today’s smart devices announced the dates and venue for the Haystack Connect 2015 conference.

Taking place May 18-May 20, 2015 at the Cheyenne Mountain Resort in Colorado Springs Colorado, Haystack Connect 2015 is an open forum conference where the community of leading technology suppliers, systems integrators and forward looking end users come together to advance the state of the art in managing, presenting and analyzing the vast amount of data generated by today’s smart devices and equipment systems.

Haystack Connect provides a unique venue for professionals involved in automation, control and the Internet of Things to come together to learn and share the latest techniques for connecting systems and utilizing device data in applications including intelligent buildings, energy management, remote monitoring, and other smart-device applications. Session topics will include data acquisition, communications, protocol translation, data visualization, analytics and methods to effectively bring data together for improved systems and equipment performance.

What Is Project Haystack? The devices that make up the Internet of Things – automation systems, metering systems, sensors and smart devices – produce tremendous amounts of data. This data is very hard to organize and use across different applications because it is stored in several different formats; has inconsistent naming conventions and very limited data descriptors. In essence it lacks information to describe the meaning of the data. And without meaning a time-consuming manual effort is required before value creation can begin.

Taking cues from other data intensive applications such as Facebook, Twitter, Google and others who utilize tags and semantic data models, the work developed by the Project-Haystack community addresses this challenge by defining and easy to use methodology to describe the meaning of data. This enables software applications to automatically consume, analyze and present data from devices and equipment systems.

Project Haystack is an open, flexible, extensible, data modeling approach and standard for today’s common equipment systems and devices that makes it easy and simple for software applications to consume, analyze and present data from devices and equipment systems in the same way and with the same meaning.

Since its formation in March of 2011, Project-Haystack.org has grown tremendously providing the industry with an open-source, collaborative environment where people and organizations work together to address the challenge of utilizing semantic modeling (also known as tagging) to streamline the interchange of data among software applications. The community has developed a flexible, extensible, data modeling approach and standard models for common equipment systems. The standard includes detailed documentation describing the data modeling techniques, significant libraries of equipment models, and software reference implementations to easily enable software applications to consume smart device data that is “marked up” with Project-Haystack data descriptions. More information on Project-Haystack can be found at: www.project-haystack.org.

About Haystack Connect 2015: Connecting Companies, Communities and People who are re-defining smart and connected systems, Haystack Connect 2015 is the event that brings together the systems integrators, technology suppliers and customers who are leading the way to more efficient and sustainable buildings and advanced smart-device applications. Haystack Connect is a unique “open forum” conference organized and sponsored by the community, for the community.

Contacts:

John Petze
Project Haystack, Executive Director
Principal, SkyFoundry
john@skyfoundry.com

Marc Petock
Project Haystack, Secretary
Lynxspring, Inc. Vice President, Marketing
marc.petock@lynxspring.com

Realcomm’s Jim Young asks Cisco’s Rick Huijbregts, “Are You Back?”

Cisco’s venture into the building space with the Mediator came and went — leaving a lot of unanswered questions behind. In response to Jim Young’s first question, “Is Cisco Back?” Rick Huijbregts, VP, Industry Transformation and General Manager, IoE Smart + Connected Communities at Cisco Canada, answers, “Yes,” and that “Cisco is here to stay,” as he reviewed Cisco’s past, present, and future positions — and reminded everybody that Cisco enters billion dollar opportunities quickly, as they did in the telephony, video, and data center markets. Cisco has the option to make, buy, or partner their way into the smart connected building market, and in this instance, Cisco has chosen to partner with companies like Honeywell, Johnson Controls, Schneider, Rockwell, and Intel. Cisco sees tremendous opportunities in the IoE, with particular focus in the IoT and cloud services, and has created four IoE Centers of Excellence to accelerate the co-creation of future real estate and smart communities advancements.

Alpert Üzmezler: What is New at BASSG Graphics

ControlTrends had a chance to catch up with Alpert Üzmezler, the Managing Partner at BAS Services and Graphics. The very talented Alpert gave us a demo of his new look and feel visualization software and showed us some very cool looking thermostats.

Founded in 2004, BASSG has been an innovator in Building Automation Technology and BAS Analytics delivery that reduce implementation and facility management energy costs.

Through in-house developed easy-to-deploy, multi-system software tools, BASSG branded OEM products and multiple distributorships, BASSG can be a one-stop provider for everything BAS at unbeatable value, significantly lowering implementation and maintenance costs.

If you like what you see, be sure to nominate Alpert and BASSG by clicking here to nominate your favorite People, Products and Companies for the 2014 ControlTrends Awards.

October is Cybersecurity Awareness Month!

Marc PetockExcerpt from Automated Buildings, October, 2014 Edition. Article written by Marc Petock, Vice President, Marketing Lynxspring & Connexx Energy. Go to LynxSpring CyberPro Newsroom for the latest cyber security information.

How many organizations still treat cybersecurity as they did 11 years ago? How about five years ago? Or even as a year ago? Shockingly, most companies are still relying on outdated, only partially effective methods.

While buildings are smarter and more connected than ever before, when it comes to cybersecurity, they are stuck in the 1980s. Today’s connected business world means there are thousands of entry points in and out of companies. It is impossible to miss the continued headlines on the latest breaches and cyberattacks. We have witnessed that BMS and EMS technology have weaknesses, such as inadequate password protection, software that can be breached and various unmonitored/unprotected access points within the network. Cyberattacks today are more sophisticated and targeted than ever before.The truth is that network security and the security of devices and systems do not work as well as we thought.

Cybersecurity protection and defense prevention for building automation systems and the operational technology that operate and manage our facilities is now a necessity and should not be treated differently than an IT network when it comes to cybersecurity. Just like an IT network, building automation networks should have multiple layers of defense and protection as well as policies and procedures that are continuously addressed. In fact, cybersecurity should be an integral part of the design of intelligent buildings and today’s building automation system and not an afterthought; it has gone from a nice-to-have to a must-have.

When it comes to cybersecurity, there are three types of companies (a) those that have been hacked and admit it, (b) those that have been hacked and don’t admit it, and (c) those that will soon be hacked. Click here for the rest of the article.

Another great source for Cybersecurity information and guidance: Official website of the Department of Homeland Security.