Overview

Our systems have been intensively developed for many years and are today productively used in very diverse environments on 4 continents.

Therefore our systems are robust, mature, stable and reliable, as they have been tested in all real-life situations over the last decade. On the other hand – since their inception, they have been permanently modernized using always the newest, state-of-the-art technologies and frameworks. In particular, the power of our systems stems from its blend of experience and reliability on one side, and continuous innovation and technological advances on the other side.

More details

Configurability

Exactly the same version of our system operates at all our clients, all with very different configurations of process workflows, rules, authorizations, local settings, language packs, data fields, etc. This is only possible if the system is highly robust, flexible and configurable. All changes and customizations are parametrized, and do not require changes in the source code.

Therefore, any client can configure all elements of the system (workflows, roles, language, fields…) entirely in accordance with its preferences and existing rules and regulations. The system is also fully multilingual and already translated to nearly 30 languages.

User Experience

The usability, ergonomics, aesthetics and intuitiveness make the COMET system very easy to use, learn and adopt – which is a key success factor for global scale deployments, and various levels of end-user IT literacy.

The UI follows the newest Web 2.0 standards set by the most-widely used applications (Facebook, Twitter, Google, Apple, Microsoft), and therefore meets the expectations and is familiar to most internet users. Furhermore, COMET is compatible with all mainstream browsers, and works on all types of devices, including all most widely used smartphones and tablet computers.

Security

Security and Data Integrity have a very high priority in our development process, and are always preserved by using the highest security standards.

Transaction logging

Each and every read/write transaction is logged and securely stored, including username, timestamp, IP address, and all relevant transaction data.

SSL protocol

SSL protocol (2048-bit) is used to encrypt all data transferred over the network.

Backups

Nightly database backups are executed and safely stored on two distinct locations.

More details

Interoperability

COMET is the official source of all football-related information, and it can easily export context-relevant data into other systems and websites (e.g. National Association’s website, National Leagues websites, Media …etc), both in a synchronous and asynchronous manner.

More details

Barcode / RFID Authentification

Competition accreditations and identification cards of Players, Coaches…etc can be printed directly out of COMET onto the PVC plastic format (standard dimensions of a credit card). These ID Cards may incorporate a Barcode/QR Code or even RFID for purpose of retrieving data, and authenticating the owner of the ID Card.

The most widely used is the QR Code, which can be read by any smartphone. This is a simple and accessible method for officials to scan the card of an individual, and check her/his statistics, whether she/he is correctly registered, has any active suspensions, etc.

Have any questions about our products?

Ask our experts

Contact us