Diagram decorative image

Griffin to Discuss Integrated Solutions at UIC

The methodology behind ESD’s integrated design approach is to establish performance goals for a project, design for the climate, reduce thermal loads, use energy-efficient systems and apply best technologies.

Ken Griffin will talk about the types of analysis ESD performs with the purpose of improving the built environment during his AIA Building Analytics & Integrated Design Practice presentation to students at the University of Illinois at Chicago on Monday, Nov. 12. He will demonstrate how at ESD we take each project and optimize its own set of unique performance variables for our clients so they can make informed design decisions with all of the data needed to achieve the building or development performance goals.

Related News

Interested in learning more? Check out these related news items.

Shaping Future Healthcare Facilities

ESD Studio Leaders Craig Kos (Healthcare) and Erik Nelson (Technology) will be joining a panel of industry experts at an upcoming Chicago event sponsored by The Association of Medical Facility Professionals (AMFP). It is part of AMFP’s mission “To be the hub where healthcare-built environment leaders share ideas, gain knowledge, solve challenges, connect with peers, and shape the future of the industry.” (Learn more about the AMFP event.)

Karnatz Joins Conference to Talk Building Operations Technology

Getting the most out of buildings—cost, speed to market, sustainability, user experience, wellness, and more—is the focus of “The Buildings Conference 2023” sponsored by BuiltWorlds. ESD President Kurt Karnatz joins a panel of professional peers as part of the two-day event starting May 18 in Chicago. (Learn more about BuiltWorlds conference.)

Is Your Smart Building an Easy Target for Hackers?

The latest building system technologies being adopted bring many benefits in terms of operational efficiencies, reduced environmental impact, and enhanced occupant experience. But these systems also introduce new vulnerabilities and present a much more tempting target for malicious actors seeking to launch cyberattacks. So do the benefits outweigh the risks, and how should potential vulnerabilities be addressed? (Learn more about cybersecurity.)