|
|
Building our Tomorrows Together |
|
|
2017 has been an eventful year for us at Johnson Controls. Thanks to our merger with Tyco, we are able to offer you a complete, integrated and end-to-end portfolio to help you create and manage smarter, safer and more sustainable built environments. |
|
In line with our expanded solutions, we are rebranding our Asia Pacific newsletter from “BE Inspired” to “Building Tomorrow Today”. Besides updates about our business and product offerings, you can expect more insights from our resident experts that will keep you up-to-date on the buildings industry and aid you in addressing challenges and capturing growth.
We value your partnership and look forward to building the cities of the future – together!
Trent Nevill
President, Asia Pacific
|
|
Product Spotlight
|
YORK® YZ Chiller: the revolutionary chiller from tomorrow
Just launched! YORK® YZ Magnetic Bearing Centrifugal Chiller, the first chiller fully optimized for ultimate performance with a safe, efficient and available low-global warming potential (GWP) refrigerant – R-1233zd(E). With capacities from 165 to 1,000 TR (580 to 3,500 kW), the YORK YZ Chiller delivers superior real-world performance, lower cost of ownership and a new definition of sustainability: up to 35 percent annual energy savings versus traditional fixed-speed oil bearing chillers.
Find out more here.
|
|
Highlights
|
Maximize IoT value in facility management with the 3Ps
The Internet of Things (IoT) has the ability to transform facility management but its implementation can be confusing for facility owners, managers and operators. Johnson Controls’ Sudhi Sinha, vice president and general manager, Data-Enabled Business is here to help you understand and capture the value of IoT with a 3P framework – performance, productivity and predictability. Read about it here.
|
|
Harnessing the benefits of identity-based access controls without the risk
How can you leverage identity-based access control technologies such as mobile credentialing, biometrics and wearables without introducing new security vulnerabilities? Our whitepaper offers five effective steps to help you do so. Download it here.
|
|
|
|