The development of vaccines, drugs and new diagnostic methods is the focus of biotech companies. The genome analysis is making rapid progress and individual cancer therapies are becoming increasingly common. Imaging experiments, gene libraries, protein & Biomolekülanalysen, and much more. are issues that are considered promising.
The Composition of products as well as chemical, mechanical and physical properties of the materials used must be tested, documented and archived. The relationships in the process chain from the initial idea, through the development process, from authoring to publication and verification required are an important prerequisite for the long-term success.
Basically, there where LIMS ceases WIAM® begins! Laboratory data and test results can WIAM® obtained by various interfaces, either directly from the testing machine or directly from existing LIM system. Often, however, these raw data have yet to be evaluated and for departments, management, customers and partners special analyzes, summaries and visualizations need to be compiled. Rather than go to the trouble in Excel and PowerPoint itself, appropriate masks can create directly and automatically pull together data in WIAM® evaluations to transfer the sample results.
By means of an internally or externally managed user management, specific areas for different user groups can be created. Thus, the laboratory personnel maintain their laboratory data and allow access once the outsourcer, for example, the R & D department, needs to view data. After verification by the R & D department, in turn, specific characteristics are passed on to purchase, calculation, product development, etc.
In case a company is also experimenting with fibre composites and plastics, the module Managing fibre composites & plastics may be a valuable module to meet the specific requirements.
Within innovative and research-intensive companies, data security plays a key role. To ensure the security of data within the software and also within the company, WIAM® offers the possibility to integrate the software into the company-specific IT security concepts and environment.