The single most important key characteristic of Databoom is its compatibility with existing industrial hardware. It is an increasingly common need to have to connect different branded devices with different communication means and have to manage them all with a single application. The list of compatible devices is constantly being enlarged and updated.
Data is organised chronologically following a simple device and signal hierarchy. The way in which this data is viewed is personalized and based on the use of simple and effective dashboards that allow the user to configure its own viewing style.
Another fundamental characteristic is the ability to share data with employees. The single and team sharing features make Databoom a very effective sharing tool allowing a fine control of the shared entities.
Another aspect worth highlighting is the possibility to automate the platform to make it not only a passive monitoring tool but also an interactive tool between users and devices. Through the use of rules, it is possible to automate the sending of emails under certain circumstances or the sending of signals to other devices thereby creating a real distributed automation control system.
It is of course possible to send alarms via an email or via SMS to warn users of abnormal functioning or potentially dangerous situations. Using the application it is then possible to reconstruct the history of alarms to understand what led to the undesirable event and use it to avoid future replicates.
The signals registered by the devices can be combined to generate other virtual signals such as programmable performance indicator signals. Even using this kind of generated signals, a set of rules can be applied to generate alarms or particular events.
Security is a major issue when it comes to IoT and cloud computing. Databoom's structure has been thought out to ensure the highest possible level of security through encryption and secure protocols. The devices connected to Databoom do not need open gateways given that the communication is initiated solely by the devices. However, a bidirectional communication is also possible.
The data collected is protected and backed up automatically without the user being aware. It is also possible to export the data in some of the most common formats at any desired time to take full control of the data.