Crestron Reveals Building Management Technology

Crestron, showcased a lineup of Integrated by Design products at last week's InfoComm International 2012 in Las Vegas. Integrated by Design is a Web-based technology platform, developed by Crestron, for building management, including digital signage, room scheduling, audio-visual, HVAC, voice and data, energy, and security.

With DigitalMedia, users can connect, display, distribute and manage all audio and video signals, according to a prepared statement issued by the company. Components of DigitalMedia include an Ethernet switch that requires a single IP address, and capability for IT staff to track their AV system from a variety of dashboards, including IBM Tivoli and HP Network Management Center.

CaptureLiveHD is a meeting, lecture capture, and live-streaming platform. Users can record lectures and presentations then publish them online for viewers to access.

Fusion enterprise management platform includes Fusion RV (RoomView) and Fusion EM (Energy Management). Fusion RV lets users track and manage room scheduling through Outlook, Lotus Notes and R25 or through a touch screen, as well as equipment for audio-visual presentations and video conferencing. Fusion RV also generates reports with built-in templates, and features remote control and chat through the help desk. Fusion EM monitors and tracks buildings' energy sources in real time. It allows users to analyze energy consumption, turn lights on or off, adjust heating and cooling, and sets actions for when rooms will be in use.

Crestron 3-Series Control Systems provide BACnet/IP support for buildings. It integrates a variety of technologies such as information technology, security, BMS, audio-visual, HVAC, shades, and lighting. The 3-Series integrates with other building management systems. Crestron has six models of the series.

Also displayed at the show was the all-in-one DMPS-300-C-AEC. The product includes full-bandwidth acoustic echo canceling for mic inputs, signal routing, control for HD presentations, mic mixer, amplifier with DigitalMedia technology, and audio DSP and amplifier. The DMPS-300-C-AEC transmits all signals over a CAT5e wire.

In addition, Crestron unveiled the TSW-750 touch screen, a seven-inch display that uses Core 3 UI graphics. The touch screen allows the user to use five buttons for building management functions such as up or down, lights, home, and power.

More information is available at Crestron's Web site.

About the Author

Tim Sohn is a 10-year veteran of the news business, having served in capacities from reporter to editor-in-chief of a variety of publications including Web sites, daily and weekly newspapers, consumer and trade magazines, and wire services. He can be reached at [email protected] and followed on Twitter @editortim.

Featured

  • DreamBox Math

    Discovery Education Announces Updates to Experience, DreamBox Math

    K-12 learning solution provider Discovery Education has announced enhancements to its Discovery Education Experience and DreamBox Math products, designed to create a more personalized, engaging learning experience for students.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • digital dashboard featuring a shield icon, graphs, a world map, and network nodes

    IBM Launches Agentic AI Governance and Security Platform

    IBM has introduced a new software stack for enterprise IT teams tasked with managing the complex governance and security challenges posed by autonomous AI systems.

  • laptop and fish hook

    Security Researchers Identify Generative AI 'Vishing' Attack

    A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.