The present disclosure generally relates to buildings, and more specifically to work performed in buildings.
Buildings provide for hybrid workplaces for office workers to engage in a variety of tasks. For example, office workplaces enable building-based locations for financial workers to services to various clientele. The buildings provide for office space, communication services, conference spaces, and so on.
In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different letter suffixes may represent different instances of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed in the present document. Various ones of the appended drawings merely illustrate example embodiments of the present inventive subject matter and cannot be considered as limiting its scope.
Reference will now be made in detail to specific example embodiments for carrying out the inventive subject matter. Examples of these specific embodiments are illustrated in the accompanying drawings, and specific details are set forth in the following description in order to provide a thorough understanding of the subject matter. It will be understood that these examples are not intended to limit the scope of the claims to the illustrated embodiments. On the contrary, they are intended to cover such alternatives, modifications, and equivalents as may be included within the scope of the disclosure.
The techniques described herein solve various technical problems such as dynamically clustering a group of coworkers in a building (e.g., smart building) to provide for more efficient utilization of building resources, such as lights, temperature control, office spaces, information technology (IT) resources, and the like. Traditionally this has been done through fixed architectural plans and employee schedules. However, as hybrid work models become more common, there is increased unpredictability in who will be in the office and when.
In one example, a building utilization system uses location sensing and occupant identity data to dynamically group individuals, control access, and better optimize building resources in real time based on occupancy. The techniques described herein provide for enhanced employee collaboration and security while also using building resources such as lighting and HVAC more efficiently. The building utilization techniques described herein include using a variety of sensors, including location sensors, to identify the location and the identity of individuals within various areas of a building. Sensors include biometric sensors, global positioning system (GPS) sensors, WiFi signal sensors, Bluetooth beacons, cameras, infrared sensors, ultrawide band (UWB) sensors, radio frequency ID (RFID) readers, and the like.
Individual occupant identity is determined via biometrics, via badges, and/or via mobile devices. Stored access rights define which areas each individual may access. A building utilization system uses the location and identity data to dynamically assign individuals to work areas and/or clusters (e.g., groupings of work areas). Work area and/or cluster assignments are based on team membership, roles, scheduled activities, etc. Individuals are then restricted or granted access to work areas based their stored access rights. In addition, environmental building conditions (e.g., temperature, humidity, lighting levels, and the like), and building resources are optimized based on monitored occupant activity.
Notifications and wayfinding aids may also be provided to help individuals navigate to their assigned areas, such as areas assigned dynamically via a building utilization system further described below. Assigned areas include offices (e.g., an assigned office) as well as open seating areas (e.g., assigned group of offices, assigned group of cubicles, conference room areas, and so on). Occupancy and building resource usage data is logged to inform future space planning and to improve on electric power usage. Accordingly, the techniques described herein improve on building resource usage, provide enhanced security, enable collaboration, and assist building navigation based on real-time location and occupancy data.
Turning now to
In one example, the employee 108 alerts the building utilization system 100 that the employee 108 is headed to work in the building 102, for example, via an application executable by the mobile device 110. For example, the employee 108 enters authentication information and selects certain working dates when the employee 108 will be in the building 102. The mobile device 110 then provides geolocation information as the employee 108 heads towards the building 102, verifying that the employee 108 is headed to the building 102. When driving, the employee's vehicle 112 may then have a parking spot automatically reserved in the garage 104. For example, a sensor system 114 may include certain sensors, such as cameras and inductive sensors that detect the presence of various vehicles in the garage 104. The building utilization system 100 then uses the sensor information to detect open parking stops and assigns a parking spot to the employee 108.
The building utilization system 100 stores certain information, such as employee information, in a data store 132. The employee information includes membership in certain teams, e.g., sales team, engineering team, IT support, and so on. Additionally, the employee information includes a typical time and/or day of the week for the employee 108 to enter and to exit the building 102. In some examples, the parking spot is assigned as part of a cluster of neighboring parking spots based on the typical times that the employees in the parking cluster enter and exit the parking garage 104.
In certain examples, the building utilization system 100 assigns a work area inside of the building 102, such as an office, to the individual based on data stored in the data store 132 indicating membership of the individual in one or more teams. For example, team members are assigned a cluster of neighboring offices when the team members are going to work in the building 102 during the same workday. The work area assignment (and cluster selection) also takes into account building resource usage optimization. For example, during winter, a certain side of the building 102 may be warmer due to sun exposure. Accordingly, the building utilization system 100 will take into account time of year, expected weather (e.g., via a weather prediction provided by a weather forecasting source), building sun exposure, and the like, in addition to team membership, when assigning work areas in order to minimize electrical power usage.
In one example, a group of individuals that are members of a team are located near each other. Team members notice each other upon arrival and then “organically” tend to sit near each other. For example, when 3 team members have already sat near each other, the building utilization system 100 notices that team members have already chosen locations near each other, and uses the locations as a basis for defining the cluster. The system then guides the 4th to Nth team members to go to that cluster. The cluster thus grows in place.
As the employee 108 enters the building 102, tracking sensors in the geolocation system 106 detect the entry of the employee 108. A security system 116 is used to enable the identification of the employee 108 and to open and/or close certain doors based on access granted to the employee 108. In some examples, biometric techniques, such as facial identification, voice identification, retinal identification, fingerprint identification, and/or electroencephalogram-based identification are used to authenticate and identify the employee 108.
The building utilization system 100 will monitor, via sensors, the employee's location along a designated route to the assigned work area, and provide notifications to the employee 108 to guide them along the designated route. As the employee 108 moves on the designated route, lighting ahead of them along the designated route is activated to provide a well-lit route and aid wayfinding. Lighting can also be color changed and/or blinked to provide clues of where to go next. Electronic door locks along the designated route are dynamically controlled to only allow access to authorized areas based on the individual's identity and assigned access rights. For enhanced security, individuals may be dynamically assigned to groups as they cluster in different areas. Access to the clusters can then be restricted to members of the cluster only. This allows for ad-hoc security zones to be established based on real-time occupancy patterns. Notifications may be provided if an individual attempts to access an unauthorized area. Activity logging allows auditing of access control and detection of potential intrusions.
Lights included in a lighting system 118 are dimmed or turned off behind them as the user progresses through the designated route. The lighting system 118 includes controllable light fixtures throughout the building. These may include LED fixtures capable of dimming and color tuning. The lighting system 118 further optimizes lighting usage based on real-time occupancy patterns. Occupancy sensors included in the sensor system 114 detect the presence and location of individuals in each area. This is used to activate lighting only in occupied areas. Lights are dimmed or turned off in unoccupied areas to conserve energy. In addition, the lighting system 118 can implement circadian lighting schedules to support occupant health. This adjusts color temperature and intensity throughout the day to match natural light patterns.
When individuals are clustered in teams, the lighting system 118 can tune the lighting to match the group's preferences and/or to better suit the type of work being performed. For focused work, brighter “cool” lighting may be provided. For creative sessions, softer “warm” lighting may be activated. Occupancy patterns are logged over time and analyzed by statistical techniques and/or machine learning algorithms to continuously optimize lighting control logic for efficiency and user comfort. In this manner, the lighting system 118 provides dynamic, personalized lighting optimized for occupant needs, energy efficiency, and aesthetics.
A heating, ventilation and air conditioning (HVAC) system 120 further optimizes heating, ventilation, and air conditioning based on real-time occupancy patterns. The HVAC system 120 includes air handlers, chillers, pumps, vents, and other equipment to condition air temperature, humidity, and flow rates. The HVAC system 120 controls these components based on the number and location of occupants detected by sensors in the sensor system 114. In areas with high occupancy, air flow is increased, and temperature is controlled to occupant comfort setpoints. Unoccupied areas may be allowed to drift to wider setpoint ranges to conserve energy.
As people move through the building, HVAC is preconditioned along their anticipated path to provide comfort. HVAC usage is reduced in areas that they have vacated. Total building 102 occupancy is analyzed to better optimize start/stop times and economizer power modes. In low occupancy periods, HVAC operation may be minimized or shut down in unused areas. Ventilation rates are modulated based on density of occupancy to maintain air quality. The HVAC system 120 may be turned off to maximize fresh air intake when outdoor conditions permit free cooling. Statistical and/or machine learning algorithms analyze occupancy patterns over time to develop personalized comfort models and to tune HVAC control sequences for efficiency. In this manner, the HVAC system 120 provides for more optimized comfort, air quality, and energy conservation based on real-time occupancy data.
Information technology (IT) systems 122 are also included in the building utilization system 100. IT systems 122 maintain access control lists indicating which building areas the individual is authorized to access. Access rights may be defined based on an employee's team, the employee's role, the employee's security clearance, scheduled activities, etc. In addition, IT systems 122 maintain user preference profiles. This includes preferences for lighting, temperature, privacy, parking spots, desk locations, etc. As individuals move through the building, the IT systems 122 interface with other systems, e.g., lighting system 118 and HVAC system 120, to control experiences to match their preferences, while still optimizing overall resources. The IT systems 122 also interface with the geolocation system 106, the sensor system 114, and the security system 116 to collaborate in authenticating the employees 108, and to provide an ongoing identification and authentication of the employees 108 while employees are in the building 102 and garage 104. Indeed, in certain examples, employee badges are not used.
IT systems also interface with equipment such as laptops, phones, printers, audio/video (AV) systems to load appropriate software, configurations, settings, and credentials based on identity. User activity, customizations, and other events are logged by the IT systems 122 to inform access controls and preference models. Statistical and/or machine learning algorithms analyze the aggregated data to provide for improved personalization and security. In this manner, the IT systems 122 help identify users, provide access rights, and support user preferences to drive personalized, secure experiences while working in the building 102.
Other systems 124 include, for example, speakers disposed at various locations and used to implement a “cone of silence” around sensitive conversations by activating sound masking systems near a group's location. This prevents eavesdropping by those without authorization. Other systems 124 additionally include providers of snacks and beverages, including vending machines and robotic delivery systems. Other systems 124 further include health improvement systems, such as systems that reminds an employee 108 to stand after a certain amount of time, to take a break, to talk a short walk, to engage in breathing exercises, and so on.
Guidance is provided via lighting, e.g., hallway lights, which come on as the employee 108 enters an area. For example, lighting along the guided route 202 is activated to provide a well-lit route and aid wayfinding. As the employee 108 walks the guided route 202 towards the office 204, lights are dimmed or turned off behind them. Doors are unlocked and locked as the employee 108 passes through. For example, door 206 is unlocked as the employee enters the building 102 and locked once the employee 108 is inside. Audio announcements, such as “you are headed towards office 57, turn left at the corridor” may also be provided. Electronic door locks are dynamically controlled to only allow access to authorized areas based on the employee's identity and assigned access rights. Navigation guidance through the building 102 can also be provided via a mobile application, via badges that use voice guidance, and so on. If the employee 108 needs to shift locations, new navigation guidance is provided, for example, by deriving another guided route. Sensors continue to track the employee 108 via the new guided route and update conditions (e.g., environmental conditions) in each area as the employee 108 travels.
Once the employee 108 is in their assigned work area, e.g., office 204, the employee's preferences for lighting, room temperature, sound, and the like, are used to provide a user-customizable work environment. Likewise, IT systems 122 such as desktops, monitors, printers, and so on, present in the assigned work area, are customized according to user profiles. The user profiles include software that is loaded for use by the employee 108, arrangement of desktop icons, resolution for monitor displays, preferred email configuration, preferred web browser configuration, preferred conferencing software configuration, and so on. Accordingly, the employee 108 saves time by not having to manually customize the IT systems 122 in the assigned work area.
In some examples, the assignment of the work area is based on clustering. That is, when teammates are scheduled to be in the building 102 on the same day, the building utilization system 100 assigns the team to a common zone or cluster, such as cluster 208, based on their team membership, current location(s) of team members in the building 102, planned activities, building resource use, and past clustering behavior. For example, the building utilization system 100 determines, based on employee input (e.g., input stating that the employee is going to be in the office a certain day) as well as based on observed behavior (e.g., driving behavior, location of teammates in the building 102), how many offices are needed to host the team close or next to each other, such as N offices. The building utilization system 100 then uses occupancy data to determine locations of N unoccupied offices that are next or close to each other. For some buildings, there may be more than one cluster that has unoccupied N offices next to each other.
Team members notice each other upon arrival and then “organically” tend to sit near each other. For example, when 3 team members have already sat near each other, the building utilization system 100 notices that team members have already chosen locations near each other, and uses the locations as a basis for defining the cluster. The system then guides the 4th to Nth team members to go to that cluster. The cluster thus grows in place. If a group had clustered in area 209 yesterday and today, someone else arrived earlier and was routed to area 208, in some examples, the building utilization system 100 then clusters to area 208 when someone from the original group arrives. Individuals can also opt out of clustering, and then opt in at a later time or date.
Alternate location clustering is also provided. For example, of an individual is clustered with a team in building 102 on Monday but Thursday goes to another building, if others from the building 102 Monday cluster arrive at the second building on Thursday, in some examples, the original cluster in building 102 is remembered (or recommended) and the new arrivals are directed to the original cluster. In another example, a new cluster is created in the second building based on the first arriving teammate.
The cluster 208 is also selected based on building resource usage. For example, during the winter, an eastern side of the building 102 is preferred for clustering because the eastern side has more sun exposure and is thus warmer. Accordingly, the cluster 208 is selected when compared to another cluster 209 having six unoccupied offices because the cluster 208 of offices would use less heat and thus less electrical power.
Once selected for occupancy, the cluster 208 is further optimized for the team's needs. HVAC, lighting, and sound settings are tuned to their preferences. Relevant equipment (e.g., IT systems 122) and connections are automatically customized. In cases where an IT system is needed, such as a laptop, a request is made to add the laptop to the appropriate office to be used by the requestor employee. Access control policies are configured to restrict entry to the team's cluster 208 to authorized members only for information security. Notifications alert the team if anyone approaches or enters the area. As team members come and go, the cluster 208 is expanded, contracted, or relocated dynamically based on real-time occupancy patterns. The system learns over time when and where specific teams tend to cluster. This data informs future cluster assignments and recommendations.
The figure also illustrates certain sensors, lighting, and other systems that are provided in each office and hallway sections and included in building utilization system 100 or are operatively coupled to the building utilization system 100. For example, an office 210 includes sensors 212 used to detect presence of individuals, such as occupancy sensors. The sensors 212 also include motion sensors to track movement and location, temperature sensors to detect room temperature, humidity sensors to detect room humidity, noise/sound sensors to detect decibel levels, and/or light sensors to detect lumens. The sensors 212 also include biometric scanners and camera sensors suitable for detecting and identifying the employees 108. The sensors 212 are provided as part of the sensor system 114 and used by the building utilization system 100 to customize the user work area, for safety purposes (e.g., fire detection), as well as to provide guidance during a traverse of the guided route 202.
The office 210 also includes lighting 214, such as LED fixtures capable of being dimmed and color tuned by the building utilization system 100. The lighting 214 is customized by the building utilization system 100 according to user preference and/or certain modes, such as focused work or creative sessions mode. For focused work, brighter “cool” lighting may be provided. For creative sessions, softer “warm” lighting may be activated. The lighting 214 is provided as part of the lighting system 118.
The office 210 additionally includes certain actuators 216, such as HVAC vents, blind actuators, curtain actuators, fan actuators, humidifier actuators, desiccant actuators and the like, that are operatively controlled by the building utilization system 100 to set certain temperatures, to provide for opening and closing of blinds/curtains, to provide for more air movement, and to set certain humidity levels. The actuators 216 also include remotely actuated locks, such as door locks, to lock and unlock certain areas of the building 102 and/or offices. Speaker systems 218 are also provided, to be used for announcements, for playing music and other sounds, and so on. Hallway sections, conference rooms, break rooms, cafeterias, and the like, also include the sensors 212, the lighting 214, the actuators 216, and the speaker systems 218. Accordingly, the building utilization system 100 provides for team clustered, power efficient, and more personalized experiences via automated and more optimized control of building systems.
Using all these inputs, the building 102 then assigns the employee 108 a work area for the day—this could be a desk, office, conference room, etc. In some examples, the work area is assigned in advance based on recurring schedule patterns. The work area assignment is derived to cluster teammates together, when possible, in a cluster such as the cluster 208. The cluster 208 is assigned by deriving a number of adjacent offices that can fit a certain number of employees 108, for example, based on team membership. There may be more than one cluster of adjacent offices that could be assigned. Resources, such as electric power usage is also taken into consideration. For example, weather exposure for the building 102 can be used to further filter the available clusters based on clusters that, for the time of the year, will use less electric power (e.g., HVAC power) due to sun exposure, newer insulation, the presence of natural light, and so on. The cluster is also assigned based to minimize travel, or example, to the garage 104, to conference rooms, and so on.
As the employee 108 enters the garage 104 and/or building 102, the process 300 then guides via a guided route, at block 304, the employee 108 to their assigned work area. More specifically, sensors (e.g., camera sensors, biometric sensors, wearable tag sensors, and so on) detect and identify the employee 108 as the employee 108 enters the garage 104 and/or the building 102. Navigation prompts are then provided, in certain examples, via lighting. For example, hallways are lit so show direction of travel, and as the employee 108 moves down a hallway, lights behind the employee 108 are dimmed or turned off. Lights can also be “blinked” and/or have their color changed to show direction of travel. Navigation prompts are also sent to the person's mobile device telling them which zone they are assigned to, directions to get there, and a map. In some examples, digital signage displays in the lobby and at elevator banks indicate work area assignments and directions as the user is sensed to be at the lobby or at the elevator bank. Audio announcements can provide orientation in lobbies and common areas. Once on the correct floor, overhead LED lighting fixtures can pulse and change color to lead the employee 108 to their desk or office. Doors are locked and unlocked as the employee 108 traverses various building sections. When the employee 108 enters the assigned work area, an audible tone can sound to confirm arrival.
In situations where more than one person will be using navigation (e.g., via lighting), the process 300 can provide each person with alternative navigation options including using mobile device apps, signage (e.g., signs with person's name directing the person to their cluster), verbal navigation (e.g., directing people by name), and so on. The process 300 can also provide navigation, for example, from various starting locations to various ending locations. That is, a person may be in an unfamiliar building and the process 300 can then provide navigation to desired locations, such as to a restroom, to a conference room, back to an assigned area, and so on.
The process 300 then customizes, at block 306, the work area. For example, a computer workstation can be turned on and personalized to have the employee's preferences, including a list of software to be used, an arrangement of desktop icons, a selection of a default printer, customization of email programs, customization of web browsers, customization of conferencing software, and so on. The process 300 also customizes the work area's temperature, humidity, lighting level, light colors, and/or sound (e.g., music) based on the employee's preferences, for example, by adjusting the lighting, actuating blinds, curtains, and/or HVAC vents, and turning on certain music. Team preferences are also taken into account. For example, certain teams prefer the use of specific software (e.g., conferencing software), have certain “do not disturb” preferences, have certain security preferences, and so on. In some examples, access to cluster can then be restricted to members of the group only by unlocking access to the cluster only to team personnel and other selected personnel (e.g., security personnel, emergency first responder personnel (e.g., firemen, police, medical personnel)) and by locking access to non-members of the team. This allows for ad-hoc security zones to be established based on real-time occupancy patterns. Notifications may be provided if an individual attempts to access an unauthorized cluster.
The process 300 then monitors, at block 308, the work area and clusters to adjust the environment. For example, sensors continuously monitor occupancy, noise levels, temperature, light levels, and other conditions in each work area and/or cluster. As people move through the space, motion sensors track their location in real-time for locking and unlocking doors. Noise sensors detect conversation levels and adjust white noise emitters to enhance privacy. Temperature sensors feed data to the HVAC system 120 to further optimize heating or cooling. Light sensors dim or brighten lighting fixtures based on changing ambient light and occupancy. When zones become unoccupied, systems go into energy conservation mode by reducing or turning off lighting, HVAC, and so on. As new occupants arrive in a work area or cluster, the environment ramps back up to comfort settings.
The process 300, at block 310, logs work area/cluster utilization and then uses the logs to further optimize building utilization and resources. For example, the occupancy sensor data is continuously logged, including counts of people in various building zones (e.g., building sections, work areas, and/or clusters). Likewise, electric power utilization data is logged. This logged utilization data is analyzed to establish usage patterns across days, weeks, and seasons. Patterns can be identified using statistical techniques, such as linear and non-linear recursion, as well as via artificial intelligence (AI) techniques, such as machine learning. The patterns help identify underutilized areas that can be reclaimed as ad-hoc collaboration spaces. The patterns also help identify areas that are using more electric power than similar areas, and are thus candidates for electric power conservation by adding new insulation, HVAC vents, upgrading HVAC systems in these areas, and so on.
The patterns identified also help ensure that frequently occupied zones have appropriate services and amenities provisioned, including IT services. Historical averages are used by the process 300 to optimize assignments, forecast demand, and improve building zone recommendations. Usage outside of scheduled hours is logged for potential space reconfiguration. The process 300 also uses access control logs to validate logged occupancy. Comparing actual occupancy to scheduled bookings flags utilization issues. The process 300 logs energy consumption and correlates the logged energy consumption to occupancy to identify energy savings opportunities. Cluster selection is also saved in logs to determine patterns of cluster use. In this manner, a higher building space utilization, improved use of building resources, and more precisely aligned services to actual demand is provided.
The machine 400 may include processors 404, memory 406, and input/output I/O components 408, which may be configured to communicate with each other via a bus 410. In an example, the processors 404 (e.g., a Central Processing Unit (CPU), a Reduced Instruction Set Computing (RISC) Processor, a Complex Instruction Set Computing (CISC) Processor, a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Radio-Frequency Integrated Circuit (RFIC), another processor, or any suitable combination thereof) may include, for example, a processor 412 and a processor 414 that execute the instructions 402. The term “processor” is intended to include multi-core processors that may comprise two or more independent processors (sometimes referred to as “cores”) that may execute instructions contemporaneously. Although
The memory 406 includes a main memory 416, a static memory 418, and a storage unit 420, both accessible to the processors 404 via the bus 410. The main memory 416, the static memory 418, and storage unit 420 store the instructions 402 embodying any one or more of the methodologies or functions described herein. The instructions 402 may also reside, completely or partially, within the main memory 416, within the static memory 418, within machine-readable medium 422 within the storage unit 420, within at least one of the processors 404 (e.g., within the processor's cache memory), or any suitable combination thereof, during execution thereof by the machine 400.
The I/O components 408 may include a wide variety of components to receive input, provide output, produce output, transmit information, exchange information, capture measurements, and so on. The specific I/O components 408 that are included in a particular machine will depend on the type of machine. For example, portable machines such as mobile phones may include a touch input device or other such input mechanisms, while a headless server machine will likely not include such a touch input device. It will be appreciated that the I/O components 408 may include many other components that are not shown in
In further examples, the I/O components 408 may include biometric components 428, motion components 430, environmental components 432, or position components 434, among a wide array of other components. For example, the biometric components 428 include components to detect expressions (e.g., hand expressions, facial expressions, vocal expressions, body gestures, or eye-tracking), measure biosignals (e.g., blood pressure, heart rate, body temperature, perspiration, or brain waves), identify a person (e.g., voice identification, retinal identification, facial identification, fingerprint identification, or electroencephalogram-based identification), and the like. The motion components 430 include acceleration sensor components (e.g., accelerometer), gravitation sensor components, rotation sensor components (e.g., gyroscope).
The environmental components 432 include, for example, one or more cameras (with still image/photograph and video capabilities), illumination sensor components (e.g., photometer, color meters), temperature sensor components (e.g., one or more thermometers that detect ambient temperature), humidity sensor components, pressure sensor components (e.g., barometer), acoustic sensor components (e.g., one or more microphones that detect background noise), proximity sensor components (e.g., infrared sensors that detect nearby objects), gas sensors (e.g., gas detection sensors to detection concentrations of hazardous gases for safety or to measure pollutants in the atmosphere), or other components that may provide indications, measurements, or signals corresponding to a surrounding physical environment. The position components 434 include location sensor components (e.g., a global positioning system (GPS) receiver component), altitude sensor components (e.g., altimeters or barometers that detect air pressure from which altitude may be derived), orientation sensor components (e.g., magnetometers), and the like.
Communication may be implemented using a wide variety of technologies. The I/O components 408 further include communication components 436 operable to couple the machine 400 to a network 438 or devices 440 via respective coupling or connections. For example, the communication components 436 may include a network interface component or another suitable device to interface with the network 438. In further examples, the communication components 436 may include wired communication components, wireless communication components, cellular communication components, Near Field Communication (NFC) components, Bluetooth® components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and other communication components to provide communication via other modalities. The devices 440 may be another machine or any of a wide variety of peripheral devices (e.g., a peripheral device coupled via a universal serial bus (USB) port), internet-of-things (IoT) devices, and the like.
Moreover, the communication components 436 may detect identifiers or include components operable to detect identifiers. For example, the communication components 436 may include Radio Frequency Identification (RFID) tag reader components, NFC smart tag detection components, optical reader components (e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar code, multi-dimensional bar codes such as Quick Response (QR) code, Aztec code, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code, UCC RSS-2D bar code, and other optical codes), or acoustic detection components (e.g., microphones to identify tagged audio signals). In addition, a variety of information may be derived via the communication components 436, such as location via Internet Protocol (IP) geolocation, location via Wi-Fi® signal triangulation, location via detecting an NFC beacon signal that may indicate a particular location, and so forth.
The various memories (e.g., main memory 416, static memory 418, and memory of the processors 404) and storage unit 420 may store one or more sets of instructions and data structures (e.g., software) embodying or used by any one or more of the methodologies or functions described herein. These instructions (e.g., the instructions 402), when executed by processors 404, cause various operations to implement the disclosed examples.
The instructions 402 may be transmitted or received over the network 438, using a transmission medium, via a network interface device (e.g., a network interface component included in the communication components 436) and using any one of several well-known transfer protocols (e.g., hypertext transfer protocol (HTTP)). Similarly, the instructions 402 may be transmitted or received using a transmission medium via a coupling (e.g., a peer-to-peer coupling) to the devices 440.
The techniques described herein provide for improved building resource use and dynamic allocation of work areas. In one example, a building utilization system includes sensors distributed throughout the building to detect a location of individuals within the building. Based on the detected location and stored affiliation data, the system assigns a work area to the individual, such as an office or conference room. The assigned work area is selected to cluster teammates together while also optimizing building resource usage. Once assigned, the environmental conditions including lighting, temperature, background noise, and music, may be customized for the individual. As teams work in collaborative zones, other areas of the building can minimize lighting, HVAC, and other systems to conserve energy. The building automation integrates access control, information security protocols, and facilities management based on real-time occupancy patterns and team member locations. Machine learning techniques may be implemented to continually improve optimization and assignment procedures. The system provides a smart building that enhances collaboration and creativity while also conserving resources.