
BUILDVIEW™
IoT Optimised Building Performance Solutions Discover • Integrate • Optimise • Maintain

FEATURES
- Interoperable, open architecture
- Preserve existing BMS infrastructure
- Single-pane view of spatial sensing, lighting, HVAC & energy subsystems
- Operational efficiency, costs savings & dynamic, event driven actions
- TÜV’s ‘Protected Privacy IoT Service’ certification
- Interoperability across connected devices via IP, API & Bluetooth SmartMesh
- Generate insights from aggregated data
- Command and control, optimisation strategy
- Edge-based rules & cloud-centric analytics
- Efficient data capture; instantaneous, on demand retrieval, analytics and actions
- Remote, cloud-centric accessibility to data and systems

BENEFITS
• Dynamically optimise your BMS as your building’s use and layout changes without expensive recommissioning
• An interoperable solution to replace closed, siloed software, designed to share information with other systems
LIVE MONITORING & CONTROL OF ASSETS
Real-time data values and parameters from the BMS are available for remote analysis, providing insights into how the assets are currently performing against the optimal strategy. Ultimately improving or maintaining the performance of assets through Gooee’s automated rules engine
VISUALISATION CAPABILITIES
Data on the Connected Platform is captured at all levels & areas of the building down to the granular level of the asset. Asset level data is derived from the equipment itself. This data is time-stamped & made available for visualisation.
ANALYTICS DASHBOARD BUILDING VIEW
Top level view of the building stats. Gives a quick overview of building performance, running costs and potential inefficiencies, Drill down by building, floor, area, system or individual asset.
SECURITY, CREDIBILITY & SCALABILITY
Where data resides and how it is managed is of critical importance to any business. Gooee has become the first platform to achieve TÜV’s ‘Protected Privacy IoT Service’ certification.
The certification covers a wide area of topics to ensure all aspects of a system are protected; including data encryption and cryptography standards, secure data handling, infrastructure access, and management.
