Fuel Cap Reinvented Fueloyal Presents Smart Fuelcap

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Networks By the end of this session, you will:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Improving productivity with online collaboration © 2015 albert-learning.com Improving productivity with online collaboration.
Storage & Connectivity Devices. Internal / External Hard Drive Also known as hard disks Internal drive stores the operating system software, application.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Module 7: Fundamentals of Administering Windows Server 2008.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Introduction + Route Me GPS Tracking System Route Me offers a full range of software for commercial fleet.
Presents High operating costs and keen competition demand that you… -Optimize your deliveries -Have better information on the performance of your drivers.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Firewall Security.
John Hendrix Arjun Rallapalli Andrea Huber Ajay Rao Satya Gunnam Georgia Institute of Technology Electrical and Computer Engineering.
Presents.. Fuel management. Fuel usage A light motor vehicle uses around 10 litres per 100km. (10km to the litre) Heavy Goods vehicles can use up to 50.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer Security By Duncan Hall.
The European Gateway to TANKSAT The Ultimate Service for LPG Tank Telemetry MCS Europe Group Solutions.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Physical security By Ola Abd el-latif Abbass Hassan.
Physical Security Concerns for LAN Management By: Derek McQuillen.
partizancloud.com2 Partizan – UK brand established in 2008! We manufacture equipment and develop software for modern security systems. Our solutions are.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
The products of this company are quite reasonable as well as durable. One such is used by me these days and it has a long lasting battery, clear picture.
Network and hardware revision
Use of CAPI for agricultural surveys
Chapter 5 Electronic Commerce | Security Threats - Solution
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Malware and Computer Maintenance
Section II Terms Emily Stepp.
Software for GLONASS/GPS fleet management systems
Networks 1 Key Revision Points.
Common Methods Used to Commit Computer Crimes
People used to install software on their computers
Cloud Computing.
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Electronic/Online Banking & Bill Pay
Rights and Responsibilities
UNIT 19 Data Security 2.
Chapter 5 Electronic Commerce | Security Threats - Solution
GCSE ICT Revision Topic 2: Connectivity.
Introduction to Computers
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Affordable, fast and simple to use mobile payments
Security software for today’s enterprise marketplace
What are the Different Types of Anti-theft Devices Used in your Car?
FUEL MONITORING SYSTEM. WHAT IS FUEL MONITORING SYSTEM?FUEL MONITORING SYSTEM  Fuel-management systems are used to maintain and monitor fuel consumption.
Chapter 6 Purchasing and Maintaining a Computer
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Grid Computing Done by: Shamsa Amur Al-Matani.
Elecbits.
A FLEET SOLUTION OFFERING FOR
Online software and backups
How to keep the bad guys out and your data safe
Networks By the end of this session, you will:
Ones Technology Products & Solutions
Principles of Information Technology
Presentation transcript:

Fuel Cap Reinvented Fueloyal Presents Smart Fuelcap That Prevents Fuel Theft in Transportation Industry.

Executive Summary The biggest expense in every trucking company is fuel (35%). Every minute $150.000 of fuel is being stolen by company drivers. Class A Trucks in the Europe, US and Canada, on average leave the company for up to 50 days. Drivers paying fuel with company credit cards and spend over 15.000$ during that period. Owners and management currently have no control over this process, and cannot determine if all the fuel really entered the fuel tank and after that did it really stayed there. The owners we talked estimated potential abuse even at 15-20% of the total amount spent. Fueloyal product called iCAP1000 is smart fuelcap that measures, stores and transmits the amount of fuel poured and sends a report to the company's headquarters, and in addition due to anti siphoning system will prevent fuel taken out. Management of the company will be sure that all the money was really used for their company. Fueloyal is entirely stand alone device and doesn't require any tank modifications or connection to the truck

Problem The biggest expense in every trucking company is fuel (35%). Every minute $150.000 of fuel is being stolen by company drivers. Class A Trucks in the US and Canada, on average leave the company for up to 50 days. Drivers paying fuel with company credit cards and spend over $ 15.000 during that period. Owners and management currently have no control over this process, and cannot determine if all the fuel really entered the fuel tank and after that did it really stayed there. The owners we talked estimated potential abuse even at 15-20% of the total amount spent. Annually total damage is estimated at $84 billion.

Fueloyal Solution Fueloyal product called iCAP1000 is smart fuelcap that records the amount of fuel added to the tank and prevents siphoning of the fuel from a fuel tank. All the information collected from the sensors are stored in the memory and is sending to the server on the cloud. The owner of the tracking company is receiving the information as a report or on demand via the web application. Once installed instead of existing on a fuel tank of a truck it will measure the amount of added fuel to make sure purchased fuel really entered fuel tank and once it enters in due to double layer of anti-siphoning protection it will make sure nobody can take it out. In case somebody tries to remove it without authorization it will alarm the company HQ.

Fueloyal iCap 1000 Smartest Fuel Cap Ever One design fits all trucks All in One Integrated Software and Hardware Unauthorized Removal Alarm Sensor Completely Stand Alone Device No Connection to the Vehicle power or Vehicle Computer System No Installation Costs – Do it yourself in 30 seconds Battery operated – 2 Years lifetime 99% Measurement precision Operating temperature -40C/-40F to 85C/122F Encrypted Communication Protocol Protects Company Data True Virtual Computing Environment - Cloud Based Technology

How it Works Simply Install iCap 1000 Instead of existing Fuel Cap Secured Lock will prevent unauthorized removal and sensor will alarm if that occurs iCap 1000 will measure the amount of fuel added in order to make sure that the fuel paid really entered the fuel tank iCap 1000 will prevent paid fuel going out due to anti siphoning protection With built in 3G modem it will send real time data informing you about amount of added fuel Powered by built in battery doesn’t require any connection to the vehicle

Competitor Analysis Even though we have a lot of competition in the area none of them approach the solution like we did. All of the competitors are requiring expensive installation, fuel tank modifications or connection to the truck cabin or can bus in order to have power or for communication. That’s what makes them vulnerable and easy to disable and bypass. On the other hand that is what makes us strong. Our device needs just 30 seconds DIY installation process and powered by battery it is completely standalone device. It doesn’t require any fuel tank modification or connection to the truck. Just put it instead of the existing, secure it with lock and start saving. Fueloyal is entirely stand alone device and doesn’t require any tank modifications or connection to the truck via power or trough OBD port.

Join the most profitable drive! contact@fueloyal.com