Cloud computing offers many benefits to almost every industry, but accessing and using cloud technology can be a daunting task. UrsaLeo handles it all for you, from security to dashboards to triggering alerts.
Download our Linux based gateway code and install on a suitable hardware platform. Simple menu options then set up the device to connect securely to the cloud and begin sending data.
The UrsaLeo cloud connection requires your connected devices to have unique security certificates. Once verified by our cloud platform, your encrypted data is transmitted securely using MQTT or HTTPS protocols.
We support multiple sensors pre-enabled in the code, with many additional sensors being added to our online sensor library. Don’t see what you’re looking for? We can do custom sensor additions upon request.
Each sensor has a unique dashboard panel associated with it and custom dashboards can be created by setting minimum and maximum values. Additional styles can be added on request from the vast D3.JS library.
HOW COMPANIES ARE USING URSALEO
Adding sensors to your equipment is just the first step. Collecting the sensor data, storing it, and using it to drive automated alerts amplifies the value of that data by orders of magnitude. Everything that can be measured can now be stored, processed, and acted on, using our robust alert system that can be customized to fit your business needs.
Collecting data from equipment opens many possibilities. Thresholds can be set to trigger alerts, alerts can also be triggered when data is NOT received. As larger amounts of data are gathered, correlations can be analyzed. Data can be used to train machine learning algorithms - leading eventually to AI driven predictions.
From fridges that send a text when the temperature rises to motors that email when vibration increases, we empower you to generate additional revenues from your customer base, and they get added product benefits with an easy monthly subscription.Ask about co-branding
Security is applied at every stage, all connections into the data platform are secured with cryptokey technology. User login is to a front-end server that is isolated from the main data server and communicates via cryptokeys for an added level of security.