Reach

The IoT Solution Creation Framework

IoT or Internet of Things is a large set of interconnected devices capable of sharing data amongst them for monitoring and control. A edge system is a location with multiples of devices installed and connected to the main network. There can be – not necessarily be – a central control and monitoring system which provides interconnection, Human interface and management of the devices in the network.

[expand]

In an IoT system, one should be able take decisions in real time and allocate priorities to specified devices or actions. It cannot operate using conventional mode but using Real Time Operation System with definite and assured time of detection and activation.

When it comes to AIoT systems, the processing power of the data collation nodes or even the sensor or actuator nodes are enhanced to support AI algorithms. Thus, enabling ubiquitous computing and intelligence.

Typical IoT System Architecture
Typical IoT System Architecture

Webyfy IoT provides end to end hardware devices and software systems which supports conventional IoT, IIoT and AIoT systems. The REACH Framework has the ability to plot the required processes and create the specific solutions with very low cycle time of a few days even for the most complex of systems.

[/expand]

REACH is a bundle of technologies designed by Webyfy IoT to configure an IoT solution with ease by a business domain expert. It contains scores of hardware modules and hundreds of software modules..

[expand]

REACH is designed:

  • to seamlessly integrate video, audio, sensor and actuator systems.
  • to create multiple types of applications for multiple domains.
  • to manage thousands of distributed systems.
  • to enable rapid prototyping and in service alteration.
  • to facilitate real time execution of complex rules.
  • to facilitate rapid customization without any additional software/hardware development.
  • to integrate industry standard hardware.
  • to enable easy and effective integration of devices with low tech manpower.
  • to make maintenance easy and increase reliability & availability.
  • to assure the quality of individual module which will ensure the quality of the entire system.
  • to enable continuous development of functional or technology modules with backward compatibility.
Reach Enabled Iot Technology Stack
Reach Enabled Iot Technology Stack

[/expand]

REACH has the capacity to support all types of cameras and operate the Pan, Tilt, and Zoom movements. It follows the ONVIF standards and other custom standards can be easily integrated. ONVIF (Open Network Video Interface Forum) is a global and open industry forum that promotes a global open standard for the interface of physical IP-based security products. Learn More

[expand]

The diagram shows different types of video functions are interconnected

REACH supports multiple methods of interconnecting the audio devices. Webyfy has developed its own protocol for interconnecting audio devices – Microphones and audio amplifier/speakers. The audio communication processing node helps to interconnect using Wi-Fi, Ethernet, 4G modes of communication. As many numbers of microphones and announcement devices can be connected and individual device can be accessed.

[/expand]

One of the main advantages of REACH is its capability to communicate in multiple data communication protocols. It has the capacity to interconnect any protocol to any other.

[expand]

Reach-Support WAN and EDGE Communication Protocols
Reach-Support WAN and EDGE Communication Protocols

The following diagram is an indication of the protocols supported and their interconnection.

The diagram below shows the data flow for respective protocols in the REACH EDGE system

Reach EDGE System Protocols
Reach EDGE System Protocols

[/expand]

The sensors are of different types but can be broadly classified as ones with outputs like ON/OFF, Analog signals, PWM, or multiple types of serial data. REACH has the capability to integrate all types of sensors including custom sensors or actuators.

[expand]

Webyfy IoT has also designed and fabricated several sensors that are commonly used in applications. It is in the process of expanding the sensor actuator basket.

Typical Sensor Actuator Data Collation Network
Typical Sensor Actuator Data Collation Network

The sensors are connected to specific terminals according to the type which in turn communicates with Data Collation devices. Webyfy has designed the system to be very rugged and fail proof by incorporating 6 kV Optical isolation and also with adequate transient protection. Webyfy IoT has also designed tamper proof digital sensor connection as well as activation assurance and output current measurement relay modules. It can also provide Analog and PWM outputs in addition to relay activation.

The system also supports mesh network along with interconnection capability.

Data Flow through Mesh Topology
Data Flow through Mesh Topology

Generic sensors and their utility

Dam Water Outlet Pipe Flow Meter Flow meter for water outflow through large pipes Pan Tilt Zoom Ip Camera Pan, Tilt and Zoom camera to scan large area Flow Controller Flow control system for water release system
Dam Laminar Flow Flow meter for water outflow through sluicegate Indoor Ip Camera Indoor cameras 3d Accelerometer 3 Axis Vibration Sensing 3D accelerometer to detect movement, vibration, movement
Dam Water Level Monitoring Dam water level sensor Indoor Ip Camera Outdoor cameras Electric Motor Control Motor control/ integration with motor controller for remote management
Water Level Monitoring Of Upstream Rivers Water level sensor module with data transmission facility Outdoor Ip Camera Microphones with data transmission capability for audio surveillance Monitoring Solar Power System Solar Modules for powering the remote sensor /actuator system
Earthquake Detection Sensor Earthquake sensor on the dam structure or other locations Microphone Speakers to make announcements for audio surveillance Multi Mode Access Control Multi authentication module for access control and attendance monitoring
Weather Station Weather station module with data transmission facility Speaker For Announcements Hooters to warn of imminent danger or a critical situation Panic Switch Panic Switch at appropriate locations to indicate an emergency situation
Down Stream Flood Warning Independent water release warning stations for down stream locations High Low Water Level Sensor Water high / low level sensor for water pumping system Monitoring Levels Of Harmful Gases Harmful gases and environment sensor
Water Seepage Detection Water seepage Detector Shutter Down Sensing Shutter open /Close sensor Power Available Sensor Detect availability of electrical power – 3 phase
Glass Break-sensor Glass brake /vandalism sensor Monitoring Multi Point Temerature Detect temperature at multiple points like inside a electrical control panel 1 And 3 Phase Energy Meter Metering of electrical power consumption
Person Movement Sensor Pir People Presence using infrared sensor Monitoring Fuel And Other Liquid Level Detect fuel levels in diesel fuel tank- typically that of a DG set 1 And 3 Phase Voltage Sensing AC Voltage sensor
Equipment Vibration Monitoring Vibration sensor for detecting banging, water turbulence, vandalism Temperature Humidity Sensor Temperature and Humidity sensor – Interior and ambient Dc Voltage Sensing DC Voltage sensor for monitoring battery banks
Detect Door Opening Door Open / close position sensor for access detection Illumination Level Sensor As an input for automatically operating lights Monitoring Earthing Effectiveness Earthing effectiveness sensor for ensuring electrical safety
Detect Equipment Movement Detect shifting of equipment from its position Transformer Temperature Monitoring Temperature sensors on the surface of transformers in a substation Quality Of Electrical Power Monitoring quality of power which affects operation and health of equipment
Fire Emergency Switch To give warning of a detected fire hazard Fire Sensor Fire / Smoke Sensor Fire Alarm Fire alarm to indicate the occurrence of fire at a location


Webyfy has developed software modules which can use multiple sensor inputs and specific logics to detect a condition. Examples are given below

People Presence Sensing Determine and ascertain the presence of people in a given location Air Conditioner Not Working Detect loss of air-conditioning and duration of malfunctioning Duration Of People Presence Sensing Determine the duration of presence of people in a given location
Lights Not Working Detect loss of lighting or detect the non working of a set of /a light fitting Foreign Object Detection Detect presence of objects that did not belong to a location Possible Fire Detection Early detection of the chance of fire at a location
Vandalism Detection And Warning Detect vandalism attempt at a location Battery Condition Diagnosis Monitor the actual status of functioning battery like charging , discharging or floating conditions and the deviations Detect People Screaming Detect distress and scream at a location
Status Of Electrical Power Supply Power supply monitoring including the quality of power supply Camera Masking Loss Of Video Detect masking of video camera lens and loss of video signals Machine Working As Per Schedule Check if the machines are operated as per schedule and the deviations
Weilding And Arc Detection Detect welding and gas cutting at a location Operational Status Of Machines Check if the operational status of machines and its operating parameters and their deviations

[/expand]

REACH is capable of integrating a large number of devices in one site or in hundreds of sites across geographies into a single entity.

[expand]

There is no limit to the number of Devices, Locations, Sensors / Actuators in a location, Cameras or Audio devices in a location, Number of rules that govern the behaviour of a system, the number of Remote Monitoring stations through which the system can be interfaced or the geographical spread. The standard data protocols for machine to machine / Internet of Things connectivity like MQTT, Web socket, Node etc are also adhered to. A typical example is shown below – a complex entity to manage seemingly dissimilar systems in a factory.

Integrated Factory Monitor and Control.png
Integrated Factory Monitor and Control.png

Centralised management system (CMS) is essential in case the system spreads across multiple locations.

The CMS is basically used for the following purposes

  • Centralise the controls of all the EDGE systems
  • Have a central repository of the data from each EDGE system
  • Manage information and control to the Remote Monitoring system managed by Human Operators
  • Manage information and control to the Mobile Monitoring managed by authorised Human Operators
  • Execute all the rules for the EDGE system which does not have local processing
  • Execute all the rules which pertains to data from multiple EDGE locations
  • Manage Video wall and bandwidth aware video communication
  • Manage Email and SMS communication
  • Facilitate external voice communication through mobile network
  • Manage the software and hardware assets in all locations
  • Run Trouble ticketing and escalation system
  • Consolidate the reports from all the EDGE system
  • Distribute the reports automatically to the authorised
  • Intimate the alerts to the operator of authorised and escalate as designed
  • Provide two-way video and audio communication between the RMS or Mobile user and the respective EDGE location
  • Access and analyse the logs in the respective EDGE systems
  • Facilitate remote operation of equipment at the respective EDGE location
  • Conduct software updating automatically across the entire network as required
  • Facilitate automatic commissioning of the entire EDGE system, modules, and sub modules in the respective EDGE system
  • Maintain the communication with all the EDGE locations
  • Ensure system security and data communication security
  • Configure access to the system and implement multifactor authentication
  • And many more functionalities ….

[/expand]

RMS are the installations from where the entire network is monitored and managed. It provides the human interface for the operators to view the predefined monitoring screens as per authorisations. It is also the location where the system admin can get access to the CMS. The various other activities that are carried out through RMS are commissioning the system, assist in adding devices at a location, Trouble ticketing, report generation, user authorisation management etc.

[expand]

Typical CMS and RMS architecture is shown below

Typical CMS and RMS Architecture
Typical CMS and RMS Architecture
Typical Functionalities of a Centralized Monitoring Station.png
Typical Functionalities of a Centralized Monitoring Station.png

The following are the typical interfaces generated for the operator for different applications. Each application shall have its own interfaces as per the need of the customer.

Human Interface
Human Interface
Map based interface
Map based interface
Map based interface
Map based interface
Video Wall
Video Wall
Individual Location - Detailed Interface
Individual Location - Detailed Interface
Report Correlation, Dash Board and Time Line
Report Correlation, Dash Board and Time Line
Indicative Dash Board
Indicative Dash Board
Automatic Site Commissioning System
Automatic Site Commissioning System

[/expand]

REACH has a very robust Rule engine. These Rules depend on values from multiple sensors or are derived from inputs from video, audio etc. The rules can also be altered according to manual interventions from authorized operators.

[expand]

Rules are defined and executed for a specific location or in every location or a group of locations or for a specific operation in a specific location. Rules can drive operation or set off warnings or initiate communication or send a set of data to a specific location or alter display or interface etc.

Examples of Rule Operation Monitoring and Alerts
Monitoring Diesel Generator SetsMonitoring Multi Point TemeratureMonitoring Electrical Power Availability1 And 3 Phase Current SensingOil Level And Temperature Monitoring Boundary conditions while the working of a DG set like excessive jacket water temperature, low oil pressure, high oil temperature, excessive running even if power is restored, non-automatic starting, Power output, voltage stability shall render an effective operation
Ups And Battery Pack Health MonitoringMonitoring Electrical Power AvailabilityDc Current SensingDc Voltage Sensing1 And 3 Phase Voltage Sensing The health of a UPS and its battery bank can be continuously monitored through rules based on main power availability, UPS output voltage, Battery terminal voltage at different conditions like charging, discharging and floating, charging current etc.
Monitoring Electrical Control PanelMonitoring Multi Point Temerature1 And 3 Phase Current SensingVibration SensorWater Seepage Detection The secure operation of an electrical panel board can be monitored with appropriate rules based on temperature of the bus bars at multiple points, vibration levels, power output to different circuits etc
Operation Of Water Pumping SystemHigh Low Water Level SensorMonitoring Electrical Power AvailabilitySchedule Of OperationMachine Vibration Sensing The water pump can be operated based on rules formulated by the time of day, schedule, peak power tariff duration, water level in the recipient tank, water level in the sump, etc. Appropriate alerts can be generated
Monitoring Solar Power SystemDc Current SensingDc Voltage SensingVandalism Detection And WarningAlerts On Deviations And Maintenance The effectiveness of Solar panel and its maintenance point can be arrived at from the DC voltage and current it generates at the time of day. Vandalism can also be detected using a vibration sensor employing 3D accelerometer.
Detect Intrusion And Unauthorized EntryShutter Down SensingPerson Movement Sensor PirAccess Control And Attendance MarkingSchedule Of Operation Rules to detect Intrusion shall need the inputs from PIR or other types sensors, IP cameras which detect presence, personnel authentication modules to ascertain the person, Door or shutter opening sensors and the working and holiday schedule.

[/expand]

REACH has an independent report generation module. Any kind of report can be generated as all the data and the operations are logged. It has been observed that the report requirements are quite varied and hence the reports are created ONLY at the end the system installation.

[expand]

Report generation uses a rule driven engine which consolidates data from multiple sources and generates reports for a period. The report engine also has a dispatch system which sends the reports to authorized persons through email of other means as per schedule. The reports are automatically generated and is in CSV formats for easy downstream manipulation. Decision Support System is two-fold – real time system is enabled through an extensive alert and warming system which can use complex rules. The operator gets real time messages and he either acts on it or escalates as per the matrix. The other mode of DSS is enabled through appropriate reports sent to authorised users as per schedule or predefined rules.

[/expand]

REACH has the hardware and software modules which can carry out GPS Tracking. The standard GPS module is used for this purpose. Various country specific GPS tracking can be implemented by using appropriate modules. There are various modules based on size and feature stipulations.

[expand]

REACH systems can work on 12 V Dc supply and can have integrated solar panels. This enables all the previously mentioned system to be installed on a moving system like an earth mover, JCB, heavy transportation vehicles or other light vehicles. This can also be use for tracking vehicles and people. The features are configurable and the rule engine manages the operational process of the system.
REACH has built in modules for the following functionalities

Gps Based Tracking REACH can track a vehicle or an asset fitted with GPS module in real time. This Can be displayed on a map-based interface. It can use any map service provider.
Geo Fencing And Tracking Geo fencing can be implemented for restricting the movement within a predefined geographical area. Appropriate warnings will be issued as per rules.
Tracking Multiple Assets No restriction on the number of concurrent assets tracked.
Geo Data Storage And Management Geo data is stored and the route of the tracked asset can be replayed. This data can also be used for further processing.
Geo Location Based Alerts Rules can be defined to generate alerts as per the tracked data.
Gps Tracking Voice Communication REACH supports voice communication with GPS device installed in a tracked asset. Auto pick up feature enables the listening to the sounds at the tracked asset. This voice also can be recorded.
Vehicle With Video And Audio Survailence In addition to GPS tracking of the vehicle, Video surveillance system can be installed on a vehicle and monitored from a Remote Monitoring Station.
Asset Tracking The GPS module is considerably small in size and can be attached to an asset. The movement and any deviation from its route or movement from a predefined position can be tracked. It can also detect if an asset is stationary beyond a predefined period at a location
Other features In addition to the above, REACH has built in functions for low battery alarm, disconnection of power supply, monitor battery voltage, detect engine running, sudden acceleration, detect shock or free fall, asset being stationary, facilitate action like cutting of fuel supply or battery supply, monitor fuel level, provide an SOS button on the asset etc

[/expand]

Functionalities are either built into REACH for easy implementation or can be derived using it. The following list is NOT exhaustive and there are scores more….

[expand]

Multiple types and makes of cameras
REACH supports multiple makes and types of IP cameras in a single installation. ONVIF supported DVRs and NVRs can also be integrated. Indoor Ip CameraOutdoor Ip CameraPan Tilt Zoom Ip CameraHidden Ip Camera
IP camera alerts and video analytics
The system captures IP camera-based alerts and process video & use them as inputs to the rules or display in the interface or to raise alerts Video Analytics Based AlertVideo Camera Based AlertCounting Vehicle TrafficLicense Number Plate Recognition
Play Video and Audio Advertisements
REACH provides the facility to play audio or video advertisements in a specific location. The schedule and language of the advertisement can be configured. Play Video AdvertisementPlay Audio AdvertisementsLive Streaming Of VideoTwo Way Video Communication
Video Wall, Alerts, and Remote Camera Operation
The video wall shows all the video feeds on a screen. Remotely control pan/tilt/zoom camera. Record & retrieve videos and get camera-based alerts. Intelligent Rule Based Video WallCamera Pan Tilt And Zoom ControlVideo Recording And Play BackVideo Camera Based Alert
Two-way audio communication
Two-way audio communication between an authorized user at a specific location, listen-in, automatic rule-based or manual announcement Two Way Audio CommunicationAutomatic AnnouncementsRemote Operator AnnouncementsListern In
Support multiple type of sensors
REACH has the capability to integrate any type of industry-standard sensors or actuators. Custom made sensors can also be integrated. Glass Break-sensorWater Seepage DetectionDoor OpeningPower Available Sensor
Voltage and Current sensors
The performance of equipment can be understood by the current it takes. The voltage and current variations can be used for protection. 1 Phase Ac Current1 Phase Ac Voltage3 Phase Ac Current3 Phase Ac Voltage
UPS and Battery Monitoring
The status of UPS in indicated by measuring input and output voltages. Battery health is shown by terminal voltage, charging current and its duration. Ups I O Voltage MeasurementDc Voltage MeasurementDc Current MeasurementBattery Pack
Energy Management
Energy meter modules measure electrical energy consumption. It measures active and reactive power, power factor, frequency voltage, and current. 1 And 3 Phase Energy MeteringMultiple Enegy Meter InterfacesQuality Of Electrical PowerManagement Of Energy Usage
Illumination Control
Automatic switching of lights as per rules like time of day/schedule, illumination level, intrusion, etc. There is a provision for manual override. Lighting ControlLighting Circuit Energy ManagementIntrusion Based Switching Of LightsSchedule Based Switching Of Light
Simple Movement sensing
The simple sensors which detect motion and movement like PIR sensor, Reed switch, can be used to detect a variety of movements Person Movement Sensor PirIntrusionDetect Equipment MovementUnauthorized Opening
Movement sensing
Complex sensors like 3D accelerometer are used for sensing rotation, vibration, degree of tilt. Specific sensors for each of these can also be used. Rotation Sensor3d AccelerometerVibration SensorTilt Sensor
Panic switch and alarms at a location
Visual alarm, auditable alarm, and announcements in case of an emergency situation like pressing the panic button, or based on Operator action Panic SwitchWarning Beacon LightAlarmOperator Action
Fire and smoke detection and warning
REACH supports multiple fire & smoke sensors and fire switches, installed with tamper-proof detection. Automatically raise alerts and intimate concerned. Smoke SensorFire SensorFire Emergency SwitchFire Alarm
Irrigation control
REACH can be very effectively used for irrigation control. Intelligence can be built-in using soil moisture, weather condition, water availability, etc. Motor StarterHigh Low Water Level SensorFlow MeasurementsSoil Moisture Sensor
Control of Air-conditioning
Air-conditioning systems can be monitored. Current consumption, room temperature, and humidity. The system can be operated intelligently. Temperature Humidity SensorTemperature ControllerAir Conditioner Hvac SensingIntelligent Start And Stop Machine
Monitoring of Machines
Performance of machines is deducted by measuring the temperature at multiple points, vibration levels, fuel consumption, energy consumption pattern, etc. Energy Metering Multiple CircuitsMonitoring Multi Point TemeratureMachine Vibration SensingOil Level And Temperature Monitoring
Authenticated Access Control at a location
Multiple modes of access control like Numeric key, fingerprint scanner, RFID, face recognition, eye iris scanner etc. Access code can be altered dynamically Numeric Key AuthorizationFinger Print AuthorizationRfid AuthorizationFace Recognition
Operator and Authorized User Interface
A specific site interface provides the user the status, facilitates remote operations and dashboards and reports. Map-based interface indicates all locations. Centralized Remote Monitoring StationMap Based IndicationPerformance DashboardUniform Interface Across All Device
Operator Actions
The authorized user can switch on and off equipment, monitor the status of the operation, control the functioning of installations at a remote EDGE location. Remote Switching Of EuipmentRemote Machine Operation ControlRemote Edge Status MonitoringIndividual Location Control And Monitoring Panel
Alerts and Alarms
Based on multiple predefined rules, alerts are generated for a specific location and displayed. Audio and visual alarms can indicate alerts. Intelligent Multi Node Rule EngineDynamic Rule ExecutionAlarm WarningAudio Visual Operator Alert
Access and Control using Mobile Device
Access EDGE location using a mobile or any internet-connected device. Get alerts, operate devices, view videos and have two-way audio communication. Mobile Based Secure AccessMobile Based AlertsMobile Based Control AccessVoice With A Specific Location
Configurable Reports
REACH has a configurable report generation engine that creates multitudes of reports and sends them via email or link via SMS as per schedule. Intelligent Configurable ReportSchedule Report GenerationThough Console Sms MessagingThough Console Email Messaging
Location detection using GPS and associated functions
REACH has GPS modules which detects location and motion of an asset and calculates several functions like heading , speed, acceleration, geo fencing… Geo Fencing And TrackingGeo Location Based AlertsGeo Data Storage And ManagementTracking Multiple Assets
Support multiple internode communication protocols
In a local (EDGE) system sensors & actuators may be spread over a large area. Multiple modes of local communication to EDGE processor are provided. Ble Data Node TransmissionLora Data Node TransmissionWifi Data Node TransmissionZigbee Data Node Transmission
Multiple, redundant of Internet connectivity
REACH communicates securely using multiple modes of communication. Switches automatically to secondary mode as primary becomes unavailable. Single Or Dual 4g CommunicationBroadband CommunicationFire To Home ConnectionLeased Line Connection
Secure communication
The entire system is within a VPN cloud. The software router can enforce blacklisting and white listing of IP addresses and provide dynamic encryption. Secure Encrypted VpnIp Address Black White ListingDynamic EncryptionSecure Mobile Communication
Multi Factor Authentication
REACH has built-in multi factor authentication system configured to the needs of the application. OTP by email/SMS, finger print, USB key etc. Multi Factor AuthenticationMobile Based Secure AccessMulti Factor AuthenticationVoice Signature
Automatic, Intelligent Commissioning System
Automatic and intelligent commissioning system requires little technical expertise. The same system can also be used for diagnostic purposes. Commissioning SystemDiagnostic InformationIntegration And Data Exchange With Onsite SystemsIntelligent Configurable Report
Trouble Ticketing and Escalation
REACH has a separate module for trouble ticketing which records issues. They are assigned and escalated as per definition. Trouble Ticketing And EscalationIssue Escalation MatrixLog Activities For Creating Audit TrialEmail And Sms Communication

[/expand]

The uniqueness of REACH is its capability to create solution almost instantly through its configuration and rule engine without any additional programming or hardware development effort. It is designed to accept any industry standard device in case the appropriate hardware is not available in Webyfy’s module basket.

[expand]

It is IIoT and AIoT ready without any modifications.

  • Very high scalability for simultaneous management of thousands of systems
  • Completely independent, location-based monitoring and control system which can continue its efficient operation even if connectivity to Central Monitoring Station (CMS) is lost
  • The embedded software works on RTOS which facilitates appropriate priority settings and processes execution.
  • Location based and Distributed processing eliminating need for centralized processing infrastructure
  • Distributed data storage eliminating the need for expensive centralized data centers or NOCs
  • Highly optimized and compressed data communication minimizing bandwidth requirement
  • Executes intelligent rule-based operations with multiple inputs from varied sources.
  • Real time data acquisition and processing.
  • Intelligence to escalate to a human intimation / assistance mode when rules are exceeded.
  • Automatic switch over when primary means of communication fails and revert when restores. Can have as many fail-safe communication levels.
  • Secure Map based Interface with facility to switch map service providers in real time.
  • Data not represented with APIs of map service provider to safe guard data being sent to the server of the service provider
  • Automatic switch over of assets to another RMS when communication is lost to the designated one.
  • Can change sensors or output devices or configurations without affecting the system
  • Highly fault tolerant system
  • With GPS module, it has location specific Rule configuration for movable Assets.
  • Centralized software updating
  • Two-Way Audio / Video communication
  • Rule Based Video wall with unlimited videos.
  • Automatic trouble ticketing system with multiple modes of Escalation
  • Automatic IVR, SMS and Email integration at local asset and central control room levels
  • Through system voice calling facility of operator And many more

Why one should adopt REACH over competition?

The key features that bring in significant befits to customers are:

  • Once the process is defined the solution can be configured almost instantly. So, the cycle time from idea to application is very little.
  • Designed to enable rapid prototyping and quick alterations to arrive at the final requirement
  • Highly scalable with no limits to the number of devices it can handle.
  • Webyfy has designed and developed most of the modules and hence it is backward compatible.
  • The system is designed to have modifications while in operation – One can add on modules or remove them or change behavior and interface by changing the rules
  • The interface is uniform across the devices to minimize the learning time
  • Very cost effective compared any of the competition
  • Assured and designed in quality to operate without failures
  • Fault isolation and very high fault tolerance so that the system will continue to function in the most unlikely event of failure of individual module.
  • Built in diagnostics to identify deviations and rectify them
  • Supports any industry standard device to be integrated and hence not married to specific make or model.
  • Supports multiple makes of devices to work seamlessly in a single system.

[/expand]