Rainforest Automation: EMU-2

Total Page:16

File Type:pdf, Size:1020Kb

Rainforest Automation: EMU-2 Characterization and Potential of Home Energy Management (HEM) Technology Prepared by: Dr. Beth Karlin, University of California, Irvine Dr. Rebecca Ford, Victoria University of Wellington Dr. Angela Sanguinetti, University of California, Davis Cassandra Squiers, University of California, Santa Barbara John Gannon, University of California, Berkeley Mukund Rajukumar, University of California, Berkeley Dr. Kat A. Donnelly, Empower Efficiency, LLC Prepared for: David Thayer Pacific Gas and Electric Company Issued: February 2015 Cite as: Karlin, B., Ford, R., Sanguinetti, A., Squiers, C., Gannon, J., Rajukumar, M., & Donnelly, K.A. (2015). Characterization and Potential of Home Energy Management (HEM) Technology. San Francisco, CA: Pacific Gas and Electric. Table of Contents Executive Summary ........................................................................................................................ 5! 1. Introduction ................................................................................................................................. 8! 2. Methods..................................................................................................................................... 11! 2.1. Defining the Landscape ..................................................................................................... 11! 2.2 Technology Assessment ...................................................................................................... 12! 2.3 Delphi Study ....................................................................................................................... 12! 2.4 Savings and Adoption Assessment ..................................................................................... 14! 3. The Home Energy Management Landscape ............................................................................. 15! 3.1 HEM Objectives and Benefits ............................................................................................ 15! 3.2 HEMS Operational Definition ............................................................................................ 16! 3.3 HEM Functionalities ........................................................................................................... 17! 3.4 Network Capabilities .......................................................................................................... 22! 4. Technology Assessment ............................................................................................................ 24! 4.1 User Interface ...................................................................................................................... 25! 4.1.1 Energy Portal ............................................................................................................... 26! 4.1.2 In-Home Display .......................................................................................................... 27! 4.1.3 Load Monitor ............................................................................................................... 28! 4.2 Smart Hardware .................................................................................................................. 29! 4.2.1 Smart Appliances ......................................................................................................... 30! 4.2.2 Smart Thermostats ....................................................................................................... 31! 4.2.3 Smart Lighting ............................................................................................................. 32! 4.2.4 Smart Plugs .................................................................................................................. 33! 4.2.5 Smart Hubs................................................................................................................... 34! 4.3 Software Platforms .............................................................................................................. 35! 4.3.1 Smart Home Platform .................................................................................................. 36! 4.3.2 Data Analytics Platform ............................................................................................... 37! 4.3.3 Web Services Platform ................................................................................................ 38! 4.4 Protocols and Players .......................................................................................................... 39! 5. HEMS Savings Potential .......................................................................................................... 42! 5.1 Savings from Information-based HEMS ............................................................................ 42! 5.2 Savings from Control-based HEMS ................................................................................... 45! 2 5.3 Savings from Integrated Solutions ...................................................................................... 47! 5.4 Limitations of Savings Estimates ........................................................................................ 47! 6. HEMS Adoption ....................................................................................................................... 51! 6.1 Diffusion of Innovation: An Overview ............................................................................... 51! 6.2 The Knowledge Stage ......................................................................................................... 53! 6.3 The Persuasion Stage .......................................................................................................... 54! 6.4 The Decision Stage ............................................................................................................. 58! 6.5 The Implementation Stage .................................................................................................. 63! 6.6 The Confirmation Stage ...................................................................................................... 64! 6.7 Limitations of Adoption Research ...................................................................................... 64! 7. Conclusion ................................................................................................................................ 65! 7.1 Market Evolution ................................................................................................................ 65! 7.2 Key Barriers ........................................................................................................................ 66! 7.2.1 Interoperability ............................................................................................................. 66! 7.2.2 Data Privacy and Security ............................................................................................ 67! 7.2.3 Consumer Engagement ............................................................................................... 68! 7.3 The Role of the Utility ........................................................................................................ 69! References ..................................................................................................................................... 72! Appendix A: HEMS Product List ................................................................................................. 81! Appendix B: Brief Product Reports .............................................................................................. 93! Energy Portal ............................................................................................................................ 93! Opower: Energy Efficiency Solution .................................................................................... 93! C3 Energy: Residential Solution ........................................................................................... 94! SmartThings: SmartThings Mobile ....................................................................................... 95! Load Monitor ............................................................................................................................ 96! Belkin: Conserve Insight Energy-Use Monitor .................................................................... 96! Reliance Control: AmWatt Appliance Load Tester .............................................................. 97! P3 International: Kill-A-Watt ................................................................................................ 98! In-Home Display ....................................................................................................................... 99! Rainforest Automation: EMU-2 ............................................................................................ 99! Wink Inc: Relay .................................................................................................................. 100! Energy Inc.: TED 5000-C ................................................................................................... 101! Smart Appliance ...................................................................................................................... 102! 3 GE: Brillion Profile Oven ................................................................................................... 102! Whirlpool: Smart Washer ................................................................................................... 103!
Recommended publications
  • USER GUIDE FEATURES • Remotely Operate Individual Lights Or Groups • Automate Lighting to Fit Your Schedule • Dim Or Highlight for the Perfect Setting
    USER GUIDE FEATURES • Remotely operate individual lights or groups • Automate lighting to fit your schedule • Dim or highlight for the perfect setting WHAT’S INCLUDED (in the box) • 2 GE Link LED A19 light bulbs • 1 Link Hub (required to connect GE Link bulbs) REQUIRED FOR USE (not in the box) • Apple iPhone®, iPod touch®, or Android™ phone • The Wink app downloaded to your mobile device from the iTunes® App Store or Google Play™ • A Wi-Fi® network with 2.4GHz router (5GHz is not supported) Supported wireless security: WEP (40-bit, 128-bit), WPA-PSK (TKIP/AES), or WPA2-PSK (TKIP/AES) GETTING STARTED 1 Install the included GE Link light bulb(s) 3 Open the Wink app and log in or sign up. and leave on. 4 Tap “Add a product,” then tap “Hubs,” 2 Plug your Link Hub into an AC outlet in a then tap “Link Hub.” central location device. 5 Carefully follow the steps in the Wink app. Note: On first connection, the LED light on the hub will be blinking RED as it downloads the latest firmware. Do not unplug during this process. You will be prompted to restart the pairing process after the firmware is installed. 6 Once Link Hub setup is complete, tap “Add a product,” then tap “Lights,” then tap “Link Light Bulb.” 7 Follow the steps in the Wink app to connect and control your Link bulbs. Radiation Exposure Statement: This equipment COPYRIGHT AND TRADEMARK NOTICES complies with FCC radiation exposure limits set forth for © 2015 Quirky, Inc. All rights reserved.
    [Show full text]
  • Guidelines on Energy Conserving Design of Buildings — 2020 Edition
    GUIDELINES ON ENERGY CONSERVING DESIGN OF BUILDINGS — 2020 EDITION Section I. Purpose 1.1 To encourage and promote the energy conserving design of buildings and their services to reduce the use of energy with due regard to the cost effectiveness, building function, and comfort, health, safety, and productivity of the occupants. 1.2 To prescribe guidelines and minimum requirements for the energy conserving design of new buildings and major renovation of existing buildings that fall and are covered under these guidelines and provide methods for determining compliance with the same to make the buildings always energy-efficient. Section Il. Definition of Terms 2. As used in these Guidelines, the following shall mean: Air— refers to any of the following: Ambient Air — air surrounding a building; the source of outdoor air brought into a building. Exhaust Air — air removed from a space and discharged to outside the building by means of mechanical or natural ventilation. Indoor Air— air in an enclosed occupiable space. Outdoor Air— ambient air that enters a building through a ventilation system, through intentional openings for natural ventilation, or by infiltration. Return Air— air removed from a space to be recirculated, or exhaust air. Supply Air — air delivered by mechanical or natural ventilation to a space and composed of any combination of outdoor air, recirculated air, or transfer air. Ventilation Air — supply air that is outdoor air plus any recirculated air that has been treated for the purpose of maintaining acceptable Indoor Air Quality. Air Conditioning — the process of treating air so as to control simultaneously its temperature, humidity, cleanliness, and distribution to meet the requirements of conditioned space.
    [Show full text]
  • Final Report
    Final Report Team 22 - SHARC Sustainable Housing And Responsible Construction Andrew Blunt, Robert LaPlaca, Oscar Lopez, and Julie VanDeRiet Engineering 339/340 Senior Design Project Calvin College May 10, 2018 © 2018, Calvin College and Andrew Blunt, Robert LaPlaca, Oscar Lopez, and Julie VanDeRiet 1 Executive Summary This document outlines the work that Team 22 of Calvin College’s engineering senior design project achieved over the academic year, as well as the goals they achieved. The accomplished work contains research and feasibility analysis for design decisions regarding the design of the a sustainable home. The client family desires a sustainable home near Calvin College. Team 22’s goal was to provide a solution to their problem by designing a home to comply with Passive House Institute US’s certification. This task requires a variety of engineering disciplines with specific objectives that require a parallel design process. This document outlines the research and work that Team 22 has achieved. Table of Contents 1 Executive Summary 2 Introduction 1 2.1 Project Introduction 1 2.1.1 Location 1 2.1.2 Client 1 2.2 Passive House US Requirements 1 2.3 The Team 3 2.3.1 Andrew Blunt 3 2.3.2 Robert LaPlaca 3 2.3.3 Oscar Lopez 4 2.3.4 Julie VanDeRiet 4 2.4 Senior Design Course 4 3 Results 5 3.1 Thermal Results 5 3.2 Home Design 5 3.3 Energy Performance 6 4 Project Management 7 4.1 Team Organization 7 4.2 Schedule 7 4.2.1 First Semester 7 4.2.2 Second Semester 8 4.2.3 Project Management Visualization 8 5 Design Process 9 5.1 Ethical Design
    [Show full text]
  • Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
    Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems Nan Zhang∗, Xianghang Mi∗, Xuan Fengy∗, XiaoFeng Wang∗, Yuan Tianz and Feng Qian∗ ∗Indiana University, Bloomington Email: fnz3, xmi, xw7, [email protected] yBeijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China Email: [email protected] zUniversity of Virginia Email: [email protected] Abstract—Virtual personal assistants (VPA) (e.g., Amazon skills by Amazon and actions by Google1) to offer further Alexa and Google Assistant) today mostly rely on the voice helps to the end users, for example, order food, manage bank channel to communicate with their users, which however is accounts and text friends. In the past year, these ecosystems known to be vulnerable, lacking proper authentication (from the user to the VPA). A new authentication challenge, from the VPA are expanding at a breathtaking pace: Amazon claims that service to the user, has emerged with the rapid growth of the VPA already 25,000 skills have been uploaded to its skill market to ecosystem, which allows a third party to publish a function (called support its VPA (including the Alexa service running through skill) for the service and therefore can be exploited to spread Amazon Echo) [1] and Google also has more than one thousand malicious skills to a large audience during their interactions actions available on its market for its Google Home system with smart speakers like Amazon Echo and Google Home. In this paper, we report a study that concludes such remote, large- (powered by Google Assistant).
    [Show full text]
  • Assessing Players, Products, and Perceptions of Home Energy Management ET Project Number: ET15PGE8851
    PG&E’s Emerging Technologies Program ET15PGE8851 PG&E’s Emerging Technologies Program Assessing Players, Products, and Perceptions of Home Energy Management ET Project Number: ET15PGE8851 Project Manager(s): Kari Binley and Oriana Tiell Pacific Gas and Electric Company Prepared By: SEE Change Institute Rebecca Ford Beth Karlin Angela Sanguinetti Anna Nersesyan Marco Pritoni Issued: November 19, 2016 Cite as: Ford, R., Karlin, B., Sanguinetti, A., Nersesyan, A., & Pritoni, M. (2016). Assessing Players, Products, and Perceptions of Home Energy Management. San Francisco, CA: Pacific Gas and Electric. © Copyright, 2016, Pacific Gas and Electric Company. All rights reserved. PG&E’s Emerging Technologies Program ET15PGE8851 Acknowledgements Pacific Gas and Electric Company’s Emerging Technologies Program is responsible for this project. It was developed as part of Pacific Gas and Electric Company’s Emerging Technology program under internal project numbers ET15PGE8851. SEE Change Institute conducted this technology evaluation for Pacific Gas and Electric Company with overall guidance and management from Jeff Beresini, Kari Binely and Oriana Tiell. For more information on this project, contact Pacific Gas and Electric Company at [email protected]. Special Thanks This project was truly a team effort and the authors would like to thank all those who contributed to making it a reality. First, we’d like to acknowledge Pacific Gas and Electric (PG&E) for funding this research. Particular thanks go to Susan Norris for having the vision and foresight to make this project a reality and to Oriana Tiell, Kari Binley, and Jeff Beresini for continued support and feedback throughout the project. Several partners also collaborated with our team on the various research streams and deserve acknowledgement.
    [Show full text]
  • Download a Transcript of the Interview with Doug King
    Episode 63 Smart Energy and Data The show notes: www.houseplanninghelp.com/63 Intro: Data is what we're talking about today. When I go to various different talks they will often reflect on data that has been collected, whether it's from moisture sensors or CO2 sensors so I did wonder whether it's something that I should be doing on my project, making sure that there is something useful coming out of it in terms of data. That probably means planning upfront so I just wanted to find out all about that. Recently I saw a talk on smart energy so I thought we'd tie this all together and see how we go with it. Doug King has a lot of experience in construction, particularly high performance buildings - which is what we like - and he's someone that I've been wanting to talk to for a while. I started by asking him for a little bit of background on his work. Doug: I started out as a physicist. I fell into the profession of building services engineering, out of curiosity, and then I spent the last 20 years thinking about how building services systems work together with building fabric, with the technology to control them and finally how human beings relate to all of that as a system in order to try and understand the key issues about optimisation, how to get these things working together properly rather than the building services systems fighting against the building fabric and the users not understanding what the hell is going on.
    [Show full text]
  • Schlage Electronics Brochure
    Safer. Smarter. More stylish. SCHLAGE KEYLESS LOCKS Deliver quality and innovation with reliable access control systems from Schlage. PROVIDE YOUR CUSTOMERS WITH SIMPLE, KEYLESS SECURITY. HUB HUB HUB CONNECTION CONNECTION CONNECTION HUB HUB HUB CONNECTION CONNECTION CONNECTION FREE FREE FREE APP APP APP BUILT-IN BUILT-IN BUILT-IN WIFI WIFI WIFI SMART WIFI DEADBOLT HANDS-FREE HANDS-FREE HANDS-FREE VOICE CONTROL VOICE CONTROL VOICE CONTROL A smarter way in. The built-in WiFi of the Schlage EncodeTM Smart WiFi Deadbolt provides secure remote access from anywhere – no hubs or adapters required – making integration with smart home technology seamless and simple. LIFETIME LIFETIME LIFETIME GUARANTEE GUARANTEE GUARANTEE SMART LOCK. SMART INVESTMENT. ● Works with Schlage Home app, Key by Amazon and Ring Video Doorbell ● Use the Schlage Home app to update the lock to the latest features SECURITY AND DURABILITY EASY EASY EASY INSTALLATION INSTALLATION INSTALLATION ● Built-in alarm technology senses potential door attacks ● Highest industry ratings for residential Security, Durability and Finish ACCESS CODES ● Schedule access codes so guests can only enter when you want them to ● Lock holds up to 100 access codes The Schlage Home app provides simple setup, remote connectivity and future compatibility exclusively for the Schlage Encode Smart WiFi Deadbolt and Schlage Sense Smart Deadbolt. 3 SMART DEADBOLT Smart made easy. The Schlage Sense® Smart Deadbolt makes it easy to set up and share access with the Schlage Home app for iOS and Android™ smartphones.
    [Show full text]
  • A Survey of Smartwatch Platforms from a Developer's Perspective
    Grand Valley State University ScholarWorks@GVSU Technical Library School of Computing and Information Systems 2015 A Survey of Smartwatch Platforms from a Developer’s Perspective Ehsan Valizadeh Grand Valley State University Follow this and additional works at: https://scholarworks.gvsu.edu/cistechlib ScholarWorks Citation Valizadeh, Ehsan, "A Survey of Smartwatch Platforms from a Developer’s Perspective" (2015). Technical Library. 207. https://scholarworks.gvsu.edu/cistechlib/207 This Project is brought to you for free and open access by the School of Computing and Information Systems at ScholarWorks@GVSU. It has been accepted for inclusion in Technical Library by an authorized administrator of ScholarWorks@GVSU. For more information, please contact [email protected]. A Survey of Smartwatch Platforms from a Developer’s Perspective By Ehsan Valizadeh April, 2015 A Survey of Smartwatch Platforms from a Developer’s Perspective By Ehsan Valizadeh A project submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Information Systems At Grand Valley State University April, 2015 ________________________________________________________________ Dr. Jonathan Engelsma April 23, 2015 ABSTRACT ................................................................................................................................................ 5 INTRODUCTION ...................................................................................................................................... 6 WHAT IS A SMARTWATCH
    [Show full text]
  • Veracode White Paper—The Internet of Things: Security Research Study
    Veracode White Paper – The Internet of Things: Security Research Study The Internet of Things: Security Research Study Veracode White Paper – The Internet of Things: Security Research Study Introduction As the Internet of Things (IoT) continues to gain traction and more connected devices come to market, security becomes a major concern. Businesses are increasingly being breached by attackers via vulnerable web-facing assets1; what is there to keep the same from happening to consumers? The short answer is nothing. Already, broad-reaching hacks of connected devices have been recorded2 and will continue to happen if manufacturers do not bolster their security efforts now. In this light, Veracode’s research team examined six Internet-connected consumer devices and found unsettling results. We investigated a selection of always-on consumer IoT devices to understand the security posture of each product. The result: product manufacturers weren’t focused enough on security and privacy, as a design priority, putting consumers at risk for an attack or physical intrusion. Our team performed a set of uniform tests across all devices and organized the findings into four different domains: user-facing cloud services, back-end cloud services, mobile application interface, and device debugging interfaces. The results showed that all but one device exhibited vulnerabilities across most categories. It’s clear there is a need to perform security reviews of device architecture and accompanying applications to minimize the risk to users. Further, the study
    [Show full text]
  • No Recharging Or Power Stealing. It's the Smart Thermostat Pros Trust
    No recharging or power stealing. It’s the smart thermostat Pros trust. 5-YEAR PRO INSTALL WARRANTY Get our 3-year standard warranty plus 2 years for pro purchase and install. Here’s why pros love us. Here’s why consumers love us. RELIABLY POWERED CONTROL FROM ANYWHERE, ANYTIME No common wire? No problem. Your ecobee comes with a Customers can easily control temperature and settings Power Extender Kit so it doesn’t rely on other equipment from anywhere with an Apple Watch, Android, or to charge itself. iOS device. COMPATIBLE WITH MOST AVERAGE 23% SAVINGS* ecobee3 lite works with most HVAC systems including When customers bring home the ecobee3 lite, they radiant heating systems, multistage, and dual fuel save an average of 23% annually on heating and heat pumps. ecobee.com/compatibility cooling costs. *Learn more at ecobee.com/savings EASY INSTALLATION UPDATES YOU AS NEEDED Installation takes 30 minutes or less in most cases. We also ecobee3 lite monitors heating and cooling systems, and offer easy access to HVAC tech support, wiring diagrams, alerts customers if it senses something is wrong. and manuals if you ever need assistance. SUPPORT HOURS Available 8am–10pm (Mon–Fri) and 9am–9pm (Sat-Sun). 1.866.518.6740 | [email protected] Apple, iPhone, iPad, and iPod touch are trademarks of Apple Inc., registered in the U.S. and other countries. HomeKit is a trademark of Apple Inc. Use of the HomeKit logo means that an electronic accessory has been designed to connect specifically to iPod, iPhone, or iPad, respectively, and has been certified by the developer to meet Apple performance standards.
    [Show full text]
  • Task XIII Guide Book 6
    Version 6.0 IEA DSM Task XIII Project Guidebook November 2006 Copyright 2006 - IEA DRR LLC - Proprietary Information SECTION 6: DR TECHNOLOGIES 2 I. INTRODUCTION We all use tools to simplify our daily lives. Things such as the hammer, coffee maker, and computer are used to reduce the time it takes to complete a life’s daily chores. The demand response industry has also developed technologies that simplify the implementation and utilization of DR resources in the energy marketplace. In order for a DR resource to be useful in the energy market it must have the ability to react when needed and its response must be measurable. Tools and systems have been developed that help activate a DR asset (e.g. direct load control) and manage a DR asset portfolio (e.g. DR software products). These and other DR related technologies help the DR resource react to load reduction request and opportunities and they help provide the business process mechanisms that connect the resource to the energy marketplace. This chapter will explore how technology is being used in the demand response industry today. The objective of this section is to help the DR market participant identify technologies and systems that are used to make DR more effective in the energy marketplace from the perspective of the participating customer, the energy provider and the system operator. Improvement in communication and metering technologies has helped the demand response industry grow in recent years. In fact, some people have suggested that the demand response industry was made possible by the improvement and wide scale deployment of Internet communications in the late 1990s.
    [Show full text]
  • Autoadd: a Study of Bootstrapping of an Iot Device on a Network
    AutoAdd: A Study of Bootstrapping of an IoT Device on a Network Anoop Kumar Pandey, Balaji Rajendran, Kumari Roshni V S Centre for Development of Advanced Computing 68, Electronics City Bangalore, India {anoop, balaji, roshnivs}@cdac.in a smart home system designed to control lights and other Abstract electrical devices from an app, started giving error messages leading to disruption of services lasting 12 hours. IoT devices are fast getting embedded into our lives, and Owners were not able to control their devices with the when put together they have the potential to generate a Wink app, and any scheduled or other automated processes precise and detailed history of our lives and store them didn’t work. While the problem, according to the company, forever. Their networking and communicational power can was “misconfiguration” of a “security measure”; Engadget be unleashed for malicious and sabotage purposes, by a reported [4] that the blame should be put on an expired motivated attacker sitting in the far corner of the world. security certificate. Attacks on Industrial IoT systems can cause greater disasters. It is therefore essential to inculcate the security 2. Introduction aspect, right from design to development to operations. The Let’s put together all the smart devices, home appliances, first operation of an IoT device is to bootstrap itself, and vehicles, sensors and similar electronic gadgets on a due importance should be placed to ensure that this network and we get Internet of Things (IoT). Kevin Ashton operation is carried out securely and with due diligence. coined the term "Internet of Things (IoT)" and defined it as However, it’s easier said than done, and this paper outlines a system where the internet is connected to the physical several approaches for secure automated bootstrapping world via ubiquitous sensors.
    [Show full text]