Services

Services

Operation, Licensing, and Support Options

Operation, Licensing, and Support Options

 

The TLM solution has several components involved, deeply dependent on the specific processes of each client and associated to their activities, or applications. The final solution implemented thus has unique features, in spite of the individual components being treated, with the TLM integration methodology guaranteeing their joint operation and efficiency.

 

It is still necessary to consider the variables of each TLM product, which are constantly evolving, making the commercial proposition meet the best conditions for each application. However, there are standards set by IT best practices that must be incorporated and controlled. TLM is always aware of such changes, developing close business relationships with all partners and suppliers, taking the best option to each installation.

 

The alternatives, from the commercial point of view, are then adapted the possibilities and needs of the customers. Network equipment as well as some of the sensors and services can be marketed in the Infrastructure-as-a-Service alternative, or IaaS, as best known in the technology environment.

 

Consulting services can be hired on a regular basis (monthly basis) or depending on the number of technical hours allocated (time-sheet), and the level of the professional involved.

 

TLM has reference values, as well as the billing policy, readjustment and other associated characteristics. Similarly, Technical Support jobs, in the areas of their specialization, can be contracted and used on a monthly or occasional basis.

 

Use of IoT Data Network

 

The technology used by TLM is based on a specific IoT radio frequency band, which is independent of government agency regulations. This fact led us to create specific networks by regions, which may or may not be shared by other public and private users, thus maintaining access to services through TLM.

 

This network, notably handling bidirectional signaling, transports an incomparably smaller volume of data than conventional ones, which in addition to large text messages, also travel images and even videos.

 

Such networks, although dedicated and specific applications, do not neglect the security, integrity, recovery and contingency of the data. These features are ensured by proper communication protocols and highly reliable encryption procedures. Communications failures are handled, and recovery processes are performed to ensure the integrity of the data collected and processed by the application.