SlideShare una empresa de Scribd logo
1 de 19
IceSpy System5


Wireless Monitoring & Alarm
         Solutions
Key Features



Reliable Wireless Monitoring

Live and Continuous Data

Flexible Alarm Options (PC, text message, email, modem)

Easy Data Access and Reporting

Assists Regulatory Compliance (HACCP, GAMP, 21 CFR Part 11)
Key Industries


• Temperature monitoring is important to a
  wide variety of MHRA regulated areas,
  including:

     •   Pharmaceutical Research
     •   Pharmaceutical Manufacture
     •   Pharmaceutical Distribution and Storage
     •   Hospital Pharmacy
     •   Hospital Pathology
How does IceSpy work?


• Central to the system is a Base or BasePlus
  – This is the controller
  – The BasePlus model includes a screen to highlight
    alarms and scroll through and display sensor data.
How does IceSpy work?

• Scout units are placed in each area to be
  monitored, or device i.e. fridge/freezer etc.
    – Multiple types are available, dependent on the
      requirement and the temperature range.
    – ScoutPlus units can range down to -80 degrees
      Celcius.
    – Humidity sensors are also available.


• Calibration is also available at point of
  installation, and is available onsite or offsite in
  subsequent years.
How does IceSpy work?
System Overview

• Sensors connect wirelessly, once per
  minute to the base station.

• Once every 10 minutes, a PC or
  Server connects to the Base to
  download the data and save it to a
  database.

• If there is an out-of-specification
  sensor, an alarm is triggered.
Software Overview

• System5 View
   – Shows current system
     status

   – Shows sensor readings

   – Allows printing of
     reports / graphs

   – Allows configuration of
     settings and alarm limits

   – Graphs can be zoomed
     and scrolled
Software

• IceSpy System5 is not a web-based system. Your database
  and system is held by you.

• Several web-based systems are available, but with web-
  based systems the customer does not own their own data.

• This means with IceSpy System5 you are not locked in to a
  subscription model, you own your database and sensors.

• That said…
Sensilla.net

• We do offer a web based add-on to our systems.

• Some customers like the features of web-based systems, such as
  off-site access and iPhone/Smartphone applications.

• Sensilla.net is a subscription service which allows remote access to
  data, and advanced reporting functionality, without compromising
  the ownership of data, which is always held on your own IT
  network.

• This also allows Isatec Ltd to assist with remote support with any
  problems which you may have with the running of your system.
Sensilla.net


    Demonstration

   http://sensilla.net

Username: hospitaldemo
 Password: <Provided>
Sensilla Remote View
Sensilla Historic Trends
Sensilla Archive
Sensilla Reports
Contact

For more information, or to arrange a no-obligation
        consultation visit, please contact:


               info@isatec.co.uk
               www.isatec.co.uk
                 01494 792602

Más contenido relacionado

La actualidad más candente

Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcareRay Treurniet
 
PurpleX Cashless Payment
PurpleX Cashless PaymentPurpleX Cashless Payment
PurpleX Cashless PaymentChristian Lohse
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesAlgoSec
 
Seguridad de la información
Seguridad de la información Seguridad de la información
Seguridad de la información Isabeloa Cadena
 
Integrated Security Solutions for MSME
Integrated Security Solutions for MSMEIntegrated Security Solutions for MSME
Integrated Security Solutions for MSMEAmit Pandya
 
IBM i Security Exposures Infographic
IBM i Security Exposures InfographicIBM i Security Exposures Infographic
IBM i Security Exposures InfographicHelpSystems
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentAlgoSec
 
BYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionBYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionMarko Ruusinen
 
IPCDC-Sucat-web
IPCDC-Sucat-webIPCDC-Sucat-web
IPCDC-Sucat-webMIN AUNG
 

La actualidad más candente (17)

Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcare
 
ThermaSense_Brochure
ThermaSense_BrochureThermaSense_Brochure
ThermaSense_Brochure
 
PurpleX Cashless Payment
PurpleX Cashless PaymentPurpleX Cashless Payment
PurpleX Cashless Payment
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy Changes
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
About Techport Solutions
About Techport SolutionsAbout Techport Solutions
About Techport Solutions
 
Seguridad de la información
Seguridad de la información Seguridad de la información
Seguridad de la información
 
Data Quality Solution
Data Quality SolutionData Quality Solution
Data Quality Solution
 
A. leng development of telehealth hub infrastructure in yorkshire
A. leng development of telehealth hub infrastructure in yorkshireA. leng development of telehealth hub infrastructure in yorkshire
A. leng development of telehealth hub infrastructure in yorkshire
 
Integrated Security Solutions for MSME
Integrated Security Solutions for MSMEIntegrated Security Solutions for MSME
Integrated Security Solutions for MSME
 
IBM i Security Exposures Infographic
IBM i Security Exposures InfographicIBM i Security Exposures Infographic
IBM i Security Exposures Infographic
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
 
BYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionBYOD and your favourite ITSM solution
BYOD and your favourite ITSM solution
 
Inv i carepro_brochure
Inv i carepro_brochureInv i carepro_brochure
Inv i carepro_brochure
 
IPCDC-Sucat-web
IPCDC-Sucat-webIPCDC-Sucat-web
IPCDC-Sucat-web
 
Windows XP End of Support
Windows XP End of SupportWindows XP End of Support
Windows XP End of Support
 
DataPower as PCI
DataPower as PCIDataPower as PCI
DataPower as PCI
 

Destacado

Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...Torsten Braun, Universität Bern
 
Manual de edmodo aula de tecnología
Manual de edmodo   aula de tecnologíaManual de edmodo   aula de tecnología
Manual de edmodo aula de tecnologíaGuisella Jimenez
 
Training iso dan konsultan iso di selenggarakan oleh bmd street consulting
Training iso dan konsultan iso di selenggarakan oleh bmd street consultingTraining iso dan konsultan iso di selenggarakan oleh bmd street consulting
Training iso dan konsultan iso di selenggarakan oleh bmd street consultingAbu Yazid
 
Choosing a conductivity salinity logger part 2 of 2
Choosing a conductivity salinity logger part 2 of 2Choosing a conductivity salinity logger part 2 of 2
Choosing a conductivity salinity logger part 2 of 2HOBO Data Loggers
 
Procedimiento examen de recuperacion
Procedimiento examen de recuperacionProcedimiento examen de recuperacion
Procedimiento examen de recuperacionAngel Barrios
 
Factoring: Liquidez inmediata para crecer
Factoring: Liquidez inmediata para crecerFactoring: Liquidez inmediata para crecer
Factoring: Liquidez inmediata para crecerGermán Lynch Navarro
 
Configuracion de rockolas 2014
Configuracion de rockolas 2014Configuracion de rockolas 2014
Configuracion de rockolas 2014Yoni Banda
 
Charla Presentacion Libro GRAFITICA: Grafica Popular Costarricense
Charla Presentacion Libro GRAFITICA: Grafica Popular CostarricenseCharla Presentacion Libro GRAFITICA: Grafica Popular Costarricense
Charla Presentacion Libro GRAFITICA: Grafica Popular CostarricenseCaro Goodfellow
 
Play faster and longer: How Square Enix maximized Android* performance and ba...
Play faster and longer: How Square Enix maximized Android* performance and ba...Play faster and longer: How Square Enix maximized Android* performance and ba...
Play faster and longer: How Square Enix maximized Android* performance and ba...Gael Hofemeier
 
Introduction to design specifications to Summer of Code NZ students
Introduction to design specifications to Summer of Code NZ studentsIntroduction to design specifications to Summer of Code NZ students
Introduction to design specifications to Summer of Code NZ studentsLulu Pachuau
 
Horarios y Recorridos Semana Santa Pedro Abad 2016
Horarios y Recorridos Semana Santa Pedro Abad 2016Horarios y Recorridos Semana Santa Pedro Abad 2016
Horarios y Recorridos Semana Santa Pedro Abad 2016jumamudi74
 
Guide for intensive intervention
Guide for intensive interventionGuide for intensive intervention
Guide for intensive interventionjsbartecchi
 
Introduciendo el proyecto Endesa E3 (castellano)
Introduciendo el proyecto Endesa E3 (castellano)Introduciendo el proyecto Endesa E3 (castellano)
Introduciendo el proyecto Endesa E3 (castellano)Endesa Educa
 

Destacado (20)

Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
 
Manual de edmodo aula de tecnología
Manual de edmodo   aula de tecnologíaManual de edmodo   aula de tecnología
Manual de edmodo aula de tecnología
 
Training iso dan konsultan iso di selenggarakan oleh bmd street consulting
Training iso dan konsultan iso di selenggarakan oleh bmd street consultingTraining iso dan konsultan iso di selenggarakan oleh bmd street consulting
Training iso dan konsultan iso di selenggarakan oleh bmd street consulting
 
Choosing a conductivity salinity logger part 2 of 2
Choosing a conductivity salinity logger part 2 of 2Choosing a conductivity salinity logger part 2 of 2
Choosing a conductivity salinity logger part 2 of 2
 
Procedimiento examen de recuperacion
Procedimiento examen de recuperacionProcedimiento examen de recuperacion
Procedimiento examen de recuperacion
 
Factoring: Liquidez inmediata para crecer
Factoring: Liquidez inmediata para crecerFactoring: Liquidez inmediata para crecer
Factoring: Liquidez inmediata para crecer
 
Configuracion de rockolas 2014
Configuracion de rockolas 2014Configuracion de rockolas 2014
Configuracion de rockolas 2014
 
Charla Presentacion Libro GRAFITICA: Grafica Popular Costarricense
Charla Presentacion Libro GRAFITICA: Grafica Popular CostarricenseCharla Presentacion Libro GRAFITICA: Grafica Popular Costarricense
Charla Presentacion Libro GRAFITICA: Grafica Popular Costarricense
 
Satelites
SatelitesSatelites
Satelites
 
Play faster and longer: How Square Enix maximized Android* performance and ba...
Play faster and longer: How Square Enix maximized Android* performance and ba...Play faster and longer: How Square Enix maximized Android* performance and ba...
Play faster and longer: How Square Enix maximized Android* performance and ba...
 
Disruptive code
Disruptive codeDisruptive code
Disruptive code
 
Seminario di web content - Scheda corso LEN
Seminario di web content - Scheda corso LENSeminario di web content - Scheda corso LEN
Seminario di web content - Scheda corso LEN
 
Introduction to design specifications to Summer of Code NZ students
Introduction to design specifications to Summer of Code NZ studentsIntroduction to design specifications to Summer of Code NZ students
Introduction to design specifications to Summer of Code NZ students
 
Horarios y Recorridos Semana Santa Pedro Abad 2016
Horarios y Recorridos Semana Santa Pedro Abad 2016Horarios y Recorridos Semana Santa Pedro Abad 2016
Horarios y Recorridos Semana Santa Pedro Abad 2016
 
Guide for intensive intervention
Guide for intensive interventionGuide for intensive intervention
Guide for intensive intervention
 
Libro de judit
Libro de juditLibro de judit
Libro de judit
 
T espe-021852
T espe-021852T espe-021852
T espe-021852
 
Ud Judo
Ud JudoUd Judo
Ud Judo
 
Introduciendo el proyecto Endesa E3 (castellano)
Introduciendo el proyecto Endesa E3 (castellano)Introduciendo el proyecto Endesa E3 (castellano)
Introduciendo el proyecto Endesa E3 (castellano)
 
Lengua vasca
Lengua vascaLengua vasca
Lengua vasca
 

Similar a IceSpy Demo

Existco Plant Control System for Meat, Poultry, Seafood, Fruit and Veg Indust...
Existco Plant Control System for Meat, Poultry, Seafood, Fruit and Veg Indust...Existco Plant Control System for Meat, Poultry, Seafood, Fruit and Veg Indust...
Existco Plant Control System for Meat, Poultry, Seafood, Fruit and Veg Indust...Existco Pty Ltd
 
SyAM Software Solutions Overview
SyAM Software Solutions OverviewSyAM Software Solutions Overview
SyAM Software Solutions OverviewSyAM Software
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA SystemInductive Automation
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA SystemInductive Automation
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]akquinet enterprise solutions GmbH
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_SolutionSteve Lim
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
20171003 - SignalZ - wyStack Case Study - en
20171003 - SignalZ - wyStack Case Study - en20171003 - SignalZ - wyStack Case Study - en
20171003 - SignalZ - wyStack Case Study - enTom van Oost
 
Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014Michael Miller
 
iot enabling technologies for IOT subject
iot enabling technologies for IOT subjectiot enabling technologies for IOT subject
iot enabling technologies for IOT subjectKotiBabu7
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling TechnologiesPrakash Honnur
 

Similar a IceSpy Demo (20)

Existco Plant Control System for Meat, Poultry, Seafood, Fruit and Veg Indust...
Existco Plant Control System for Meat, Poultry, Seafood, Fruit and Veg Indust...Existco Plant Control System for Meat, Poultry, Seafood, Fruit and Veg Indust...
Existco Plant Control System for Meat, Poultry, Seafood, Fruit and Veg Indust...
 
Week 6.pptx
Week 6.pptxWeek 6.pptx
Week 6.pptx
 
SyAM Software Solutions Overview
SyAM Software Solutions OverviewSyAM Software Solutions Overview
SyAM Software Solutions Overview
 
Rotronic RMS Catalog
Rotronic RMS CatalogRotronic RMS Catalog
Rotronic RMS Catalog
 
ITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet ENITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet EN
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
20171003 - SignalZ - wyStack Case Study - en
20171003 - SignalZ - wyStack Case Study - en20171003 - SignalZ - wyStack Case Study - en
20171003 - SignalZ - wyStack Case Study - en
 
Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014
 
MPL 2016 PRESENTATION
MPL 2016 PRESENTATIONMPL 2016 PRESENTATION
MPL 2016 PRESENTATION
 
iot enabling technologies for IOT subject
iot enabling technologies for IOT subjectiot enabling technologies for IOT subject
iot enabling technologies for IOT subject
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
inmation Presentation_2017
inmation Presentation_2017inmation Presentation_2017
inmation Presentation_2017
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

IceSpy Demo

  • 2. Key Features Reliable Wireless Monitoring Live and Continuous Data Flexible Alarm Options (PC, text message, email, modem) Easy Data Access and Reporting Assists Regulatory Compliance (HACCP, GAMP, 21 CFR Part 11)
  • 3. Key Industries • Temperature monitoring is important to a wide variety of MHRA regulated areas, including: • Pharmaceutical Research • Pharmaceutical Manufacture • Pharmaceutical Distribution and Storage • Hospital Pharmacy • Hospital Pathology
  • 4. How does IceSpy work? • Central to the system is a Base or BasePlus – This is the controller – The BasePlus model includes a screen to highlight alarms and scroll through and display sensor data.
  • 5. How does IceSpy work? • Scout units are placed in each area to be monitored, or device i.e. fridge/freezer etc. – Multiple types are available, dependent on the requirement and the temperature range. – ScoutPlus units can range down to -80 degrees Celcius. – Humidity sensors are also available. • Calibration is also available at point of installation, and is available onsite or offsite in subsequent years.
  • 7. System Overview • Sensors connect wirelessly, once per minute to the base station. • Once every 10 minutes, a PC or Server connects to the Base to download the data and save it to a database. • If there is an out-of-specification sensor, an alarm is triggered.
  • 8. Software Overview • System5 View – Shows current system status – Shows sensor readings – Allows printing of reports / graphs – Allows configuration of settings and alarm limits – Graphs can be zoomed and scrolled
  • 9.
  • 10.
  • 11.
  • 12. Software • IceSpy System5 is not a web-based system. Your database and system is held by you. • Several web-based systems are available, but with web- based systems the customer does not own their own data. • This means with IceSpy System5 you are not locked in to a subscription model, you own your database and sensors. • That said…
  • 13. Sensilla.net • We do offer a web based add-on to our systems. • Some customers like the features of web-based systems, such as off-site access and iPhone/Smartphone applications. • Sensilla.net is a subscription service which allows remote access to data, and advanced reporting functionality, without compromising the ownership of data, which is always held on your own IT network. • This also allows Isatec Ltd to assist with remote support with any problems which you may have with the running of your system.
  • 14. Sensilla.net Demonstration http://sensilla.net Username: hospitaldemo Password: <Provided>
  • 19. Contact For more information, or to arrange a no-obligation consultation visit, please contact: info@isatec.co.uk www.isatec.co.uk 01494 792602