Talk to us
- Test the platform in your company and workflows to identify the value of AUCTA
- Unlimited users, devices and data assets
- Including workshops, content creation and onboarding*
- Creation of 1-2 Use Cases
- Export of all content into GLTF standard files
- Content creation tools to create content internally
"Cost effective" content creation
to give you flexibility and independence
We can provide full-service, or you can use your own content
You give us CAD/3D data which we enhance and compress.
We convert the data to meaningful instructions.
Automatic delivery into your AUCTA Manager. Happy training!
Frequently Asked Questions
How long does it take to build a first pilot?
A first instruction can typically be released within 2-4 weeks.
How can we embed an AUCTA instruction?
AUCTA seamlessly integrates into your existing systems such as an LMS or PLM infrastructure. The content is always uploaded into your personal “Manager” Account and the short links can be connected to a password or login as well.
Once we have released content via AUCTA, how do we measure the impact?
We can provide Performance Insights via the Manager if requested. This can help build transparency and creates insight to optimize performance.
Does the AUCTA team create the content for me?
We are happy to build content via our own processes. However we can always onboard your preferred team (internal or agency) to the creation process to internalize.
Can we use existing CAD files to create AUCTA content?
Yes, you can! AUCTA can work with all standard data formats and file sizes. There may be manual work involved to make the asset available on all devices, but the basis is typically data that already exists.
Is AUCTA secure?
All servers are under the Amazon AWS S3 and Cloudfront infrastructure, hosted on German servers and jurisdictions using banking grade security.
Can AUCTA be hosted on-premise?
Yes, we are happy to help you install and maintain AUCTA on-premise.
How do you handle data security?
Any 3D-geometric files are neutralized from sensitive IP and production information through a data refinement process and compression algorithms.