Efficient energy useEfficient energy use, sometimes simply called energy efficiency, is the process of reducing the amount of energy required to provide products and services. For example, insulating a building allows it to use less heating and cooling energy to achieve and maintain a thermal comfort. Installing light-emitting diode bulbs, fluorescent lighting, or natural skylight windows reduces the amount of energy required to attain the same level of illumination compared to using traditional incandescent light bulbs.
Energy conservationEnergy conservation is the effort to reduce wasteful energy consumption by using fewer energy services. This can be done by using energy more effectively (using less energy for continuous service) or changing one's behavior to use less service (for example, by driving less). Energy conservation can be achieved through efficient energy use, which has some advantages, including a reduction in greenhouse gas emissions and a smaller carbon footprint, as well as cost, water, and energy savings.
Energy auditAn energy audit is an inspection survey and an analysis of energy flows for energy conservation in a building. It may include a process or system to reduce the amount of energy input into the system without negatively affecting the output. In commercial and industrial real estate, an energy audit is the first step in identifying opportunities to reduce energy expense and carbon footprint. When the object of study is an occupied building then reducing energy consumption while maintaining or improving human comfort, health and safety are of primary concern.
Access controlIn physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization. Locks and login credentials are two analogous mechanisms of access control. Physical security Geographical access control may be enforced by personnel (e.g. border guard, bouncer, ticket checker), or with a device such as a turnstile.
Central heatingA central heating system provides warmth to a number of spaces within a building from one main source of heat. It is a component of heating, ventilation, and air conditioning (short: HVAC) systems, which can both cool and warm interior spaces. A central heating system has a furnace that converts fuel or electricity to heat. The heat is circulated through the building either by fans forcing heated air through ducts, circulation of low-pressure steam to radiators in each heated room, or pumps that circulate hot water through room radiators.
Underfloor heatingUnderfloor heating and cooling is a form of central heating and cooling that achieves indoor climate control for thermal comfort using hydronic or electrical heating elements embedded in a floor. Heating is achieved by conduction, radiation and convection. Use of underfloor heating dates back to the Neoglacial and Neolithic periods. Underfloor heating has a long history back into the Neoglacial and Neolithic periods.
Role-based access controlIn computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to implementing mandatory access control (MAC) or discretionary access control (DAC). Role-based access control is a policy-neutral access control mechanism defined around roles and privileges. The components of RBAC such as role-permissions, user-role and role-role relationships make it simple to perform user assignments.
Electric heatingElectric heating is a process in which electrical energy is converted directly to heat energy. Common applications include space heating, cooking, water heating and industrial processes. An electric heater is an electrical device that converts an electric current into heat. The heating element inside every electric heater is an electrical resistor, and works on the principle of Joule heating: an electric current passing through a resistor will convert that electrical energy into heat energy.
Security-Enhanced LinuxSecurity-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). SELinux is a set of kernel modifications and user-space tools that have been added to various Linux distributions. Its architecture strives to separate enforcement of security decisions from the security policy, and streamlines the amount of software involved with security policy enforcement.
Heating, ventilation, and air conditioningHeating, ventilation, and air conditioning (HVAC) is the use of various technologies to control the temperature, humidity, and purity of the air in an enclosed space. Its goal is to provide thermal comfort and acceptable indoor air quality. HVAC system design is a subdiscipline of mechanical engineering, based on the principles of thermodynamics, fluid mechanics, and heat transfer. "Refrigeration" is sometimes added to the field's abbreviation as HVAC&R or HVACR, or "ventilation" is dropped, as in HACR (as in the designation of HACR-rated circuit breakers).
Physical securityPhysical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.
SecuritySecurity is protection from, or resilience against, potential harm (or other unwanted coercion) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g.
Mandatory access controlIn computer security, mandatory access control (MAC) refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In the case of operating systems, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices, etc. Subjects and objects each have a set of security attributes.
Lattice-based access controlIn computer security, lattice-based access control (LBAC) is a complex access control model based on the interaction between any combination of objects (such as resources, computers, and applications) and subjects (such as individuals, groups or organizations). In this type of label-based mandatory access control model, a lattice is used to define the levels of security that an object may have and that a subject may have access to. The subject is only allowed to access an object if the security level of the subject is greater than or equal to that of the object.
Seasonal energy efficiency ratioIn the United States, the efficiency of air conditioners is often rated by the seasonal energy efficiency ratio (SEER) which is defined by the Air Conditioning, Heating, and Refrigeration Institute, a trade association, in its 2008 standard AHRI 210/240, Performance Rating of Unitary Air-Conditioning and Air-Source Heat Pump Equipment. A similar standard is the European seasonal energy efficiency ratio (ESEER). The SEER rating of a unit is the cooling output during a typical cooling-season divided by the total electric energy input during the same period.
Environmental impact of the energy industryThe environmental impact of the energy industry is significant, as energy and natural resource consumption are closely related. Producing, transporting, or consuming energy all have an environmental impact. Energy has been harnessed by human beings for millennia. Initially it was with the use of fire for light, heat, cooking and for safety, and its use can be traced back at least 1.9 million years. In recent years there has been a trend towards the increased commercialization of various renewable energy sources.
Heating oilHeating oil is any petroleum product or other oil used for heating; a fuel oil. Most commonly, it refers to low viscosity grades of fuel oil used for furnaces or boilers use for home heating and in other buildings. Home heating oil is often abbreviated as HHO. Most heating oil products are chemically very similar to diesel fuel used as motor fuel; motor fuel is typically subject to higher fuel taxes. Many countries add fuel dyes to heating oil, allowing law enforcement to check if a driver is evading fuel taxes.
Zero-energy buildingA Zero-Energy Building (ZEB), also known as a Net Zero-Energy (NZE) building, is a building with net zero energy consumption, meaning the total amount of energy used by the building on an annual basis is equal to the amount of renewable energy created on the site or in other definitions by renewable energy sources offsite, using technology such as heat pumps, high efficiency windows and insulation, and solar panels. The goal is that these buildings contribute less overall greenhouse gas to the atmosphere during operations than similar non-ZNE buildings.
Sustainable energyEnergy is sustainable if it "meets the needs of the present without compromising the ability of future generations to meet their own needs." Most definitions of sustainable energy include considerations of environmental aspects such as greenhouse gas emissions and social and economic aspects such as energy poverty. Renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy are generally far more sustainable than fossil fuel sources.
Computer securityComputer security, cyber security, digital security or information technology security (IT security) is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field is significant due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi.