Building Information Model (BIM): | 1. Building Information Modeling is a process involving the generation and management of digital information by construction companies. | 2. Building Information Modeling is a digital representation of a building as a shared knowledge resource used as a basis for reliable decisions about the building. | 3. A construction site is fragmented into virtual "spaces" as floors and zones where activities can be scheduled by contractors and sub-contractors in an efficient way. BIM helps to identify and mitigate collisions of different trades scheduled to operate in the same space at the same time. | 4. Selected construction companies are invited to become members to gain access to the foremost BIM digitial information application service in the world. Membership grants the company rights for up to 100 employees and contractors to collaborate with BIM information at a specific construction site. |
2. Glossary of Terms: | BIM means Building Information Modeling as British Standard 1192 for digital information in the construction industry. | 123BIM means membership of the bespoke application service providing BIM collaborative digital information services to projects in the construction industry. | QMS means Quality Management Standard as ISO 9001 and associated family of standards. | OHS means Occupational Health and Safety Standard as ISO 45001 to manage risks and hazards with control measures. | RMS means Risk Management Standard as ISO 31000 as part of OHS. | AMS means Asset Management Standard as ISO 55001 and associated family of standards. | Asset is an entity (thing) that has potential or actual value to the business. | Asset Management is the coordinated activity of the business to realise value from assets which involve balancing costs, opportunities and risks against the desired performance of assets to achieve an objective. | HRM means Human Resouce Management dealing with staff and contrators. | PUWER means Provision and use of work equipment regulations as an inspection schedule for asset management. | LOLER means Lifting Operations and lifting equipment regulations as an inspection schedule for asset management. | DPO means Data Protection Officer as mandated by General Data protection Regulations (GDPR) and Informaton Commissioners Office (ICO). | CEI means Continual Evolutionary Improvements to ensure that Bespoke Application Service is always aligned with current business requirements. |
Introduction: | 1. Governments and construction companies around the world have regulated that BIM must be adopted to reduce the cost of construction. | 2. Digital information must be shared between companies working on a site in compliance with the consistant BS 1192 standard. | 3. The scope of digital information to be shared in a collaborate way can be considerable and may include: | (1) QMS daily activity briefings (DAB). | (1) QMS daily work in prograss. | (1) QMS Corrective Action Plan. | (1) H&S daily check sheets. | (1) H&S toolbox talks. | (1) H&S risk assessments and method statements (RAMS). | (1) H&S Task specific risk assessments. | (1) H&S Activity, hazard, risk and control measure library. | (1) H&S Provision and use of work equipment regulations (PUWER) inspections. | (1) H&S Lifting Operations and lifting equipment regulations (LOLER) inspections. | (1) H&S Fire extingisher regulations (FIRER) inspections. | (1) H&S Permit for working at height. | (1) H&S Permit for working with hot materials. | (1) H&S Permit to dug and excavate. | (1) HRM Time sheets, expenses, invoicing and statements. | (1) AMS Asset management of stock, tools, equipment, plant and consumables. | (1) CHM Contract Hire management equipment on hire and return. | 4. The scope of the service is continually expanding to accomodate more business requirements and will grow to encompase most construction company digital information requirements - 3D data is currently excluded because its not good on a smart phone. |
123BIM: | 1. 123BIM is a monthly site membership service for a few invited companies to process building and accounting digital information in compliance with all relevant ISO standards. | 2. The 123BIM business model is similar to a mobile phone subscription account - pay for a months service and get a months service. | 3. By avoiding complex legal contracts, by eliminating a minimum contract term and by having no termination fees, costs have been minimised. | 4. Any number of people working at a site using any kind of smart phone, tablet, laptop or desktop may be registered for a site with a GPS location. |
The Service: | 1. 123BIM is a service, it is not a program and no software exists to be downloaded. | 2. No programming is involved so all programming vulnerabilities have been eliminated, maintenance downtime has been eliminated and patching has been eliminated. | 3. Programming has evolved to a dynamic knowledgebase of business rules that are used by the artificial intelligent assistant to provide site specific services. | 4. The service has a built-in collaboration export-import and email facilities to communicate digital information between parties using BIM protocols. | 5. The service includes a Data Protection Officer (DPO) in compliance with GDPR article 37 who liases with the Information Commissioners Office and manages the Data Protection Impact Assessment (DPIA) in compliance wih GDPR article 35. | 6. The service includes Continual Evolutionary Improvement (CEI) and support facilities without limit. Membership grants the member the right to request improvements and customisation to match their local site requirements. |
Limits: | 1. Continual Evolutionary Improvement support requests: | (1) must comply with all legal and regulatory obligations; | (2) must comply with all relevant International standards (such as HTML); | (3) must comply with the mission to operate on any kind of smart phone, tablet, laptop or desktop; | (4) must not involve programming; | (5) must not conflict with any patented software; and | (6) must not cause the need to download any special software. | 2. Data can be added, but data cannot be deleted, lost or corrupted. Encrypted data is replicated to a large number of secure data centers to ensure that nothing can be lost. |
Unit of Billing: | 1. A construction company may be invited to buy a months membership for a specific site with a GPS or postcode location. | 2. The construction company may renew their monthly subscription for as long as they choose - no exit fees apply. | 3. Membership enables the company to register up to 100 staff and contractors to share digital information about the same site. A bespoke membership plan is provided when more than 100 people need to be registered for the same site. | 4. Membership give the right of the company to share site information with other members. | 5. Access rights may be approved as: | (1) Management rights to access, process, change and download all digital information for their site or sites. | (2) Trade rights to process their own information and to view documents as defined by management. | (3) Client rights to view digital information about the site as defined by management. | 6. A free head office site is provided while membership to more than one construction site is active. |
Authentication: | 1. The era of the password is evolving into a more effective multiple-factor sign in authentication service that includes GPS location to foil the hacker. | 2. Self-Registration grants people the right to register themselves and their computing device at a specific site. When a person self-registers, they are assigned and shown their unique PIN and formula where the formula may be used like a traditional password. | 3a. Sign In uses a PIN entered into an access pad using their registered computing device at a specific site. | 3b. Sign In can use the formula entered into a calculator to act as a password when using a computing device that has not been registered to use the PIN. | 4. Access rights grants each person the right to view, process, change and download their own information. A person with site membership rights is able to share site information with up to 100 other registered people. The effect is that all the people working at a site may have the right to view or process specific site information. | 5. When PIN and Formula is Forgotten the person may self register so they are assigned a new PIN and formula. Site access rights have to be reassigned by the person with site membership rights. | 6. Privacy is ensured because nobody other than the person self-registering will ever be able to see the PIN and formula. The PIN and formula are derived and not stored so they cannot be stolen. |
Risk Assessment: | 1. Hackers will try to impersonate a person that they guess may be an approved person. | 2. The hacker will use self-registration to be given a PIN and formula in the name of an approved person. | 3. The hacker has the same rights as any person who self-registers in that they can process their own data and do not have access to any other data. | 4. A person with site membership rights must manually assign rights to process site information and rights must not be granted to a hacker impersonating an approved person. | 5. Assigning site access rights will compare the approved persons and hackers registration details that include: | (1) Date and Time when self registration took place. | (2) Location where self registration took place. | (3) Hardware profile (type and size of device). | (4) Software profile (operating system and browser). | (5) Network profile (internet service provider. | 6. Experience has shown that a hacker will not be able to fake the above information to the degree where they will be granted access rights to site information. |
Company with many sites: | 1. A company that is a member with more than one construction site is granted access to an extra free head office site that may be used to consolidate information from all constructions sites. | 2. The asset register may manage plant for all contruction sites at the head office level and invoicing may be done by the free head office site. While the asset register may be consolidated at head office site, PUWER and LOLER inspections are carried out at the construction site level. |
Template Technology: | 1. The era of digital information being managed by smart phone devices demands a style of documents that is compatible with smart phones. | 2. It is understood that each construction site may have a unique client who demands information presented using unique forms, sheets and documents. Even where the same basic data is being presented, sites may demand unique forms with local logos. | 3. Each site may provide a set of template documents that will be engineered to be used as the way that digitial information will be presented at that site. A short review task is undertaken to cross reference unique site terminology with the published BIM glossary of terms. | 4. Where practical, data entry forms will be similar in style to reports, however normal web page lists and forms will always be available as a second access method. | 5. All BIM digital information can be presented in tabluar form that can be exported and imported between different parties. |
Asset Management Service (AMS) - Chapters: | 1. Introduction to identify the nature roles of the parties involved. | 2. Executive Summary as a summary of the key provisions deployed. | 3. Glossary of the terms used to manage the AMS. | 4. Context of the Organisation to identify the parties and responsibilities. | 5. Leadership as how qualified experts working with external auditors build and maintain compliance. | 6. Planning to identify what can go wrong at the infrastructure and personal level. | 7. Support to ensure that lines of communication are adequate when faced with physical disasters. | 8. Operation to ensure that bespoke application services do not stop and cannot be stopped. | 9. Performance Evaluation to audit with the help of the best industry experts in the world to identify areas for improvement. | 10. Improvement to relentlessly and continually improve business continuity. |
2. Plan Do Check Act (PDCA): | 1. Plan is covered by Context of the Organisation (4), Leadership (5), Scope of the AMS, Internal and External Issues, Needs and Expectations of Interested Parties to establish objectives and processes needed to deliver results in accordance with the Asset policy. | 2. Do is covered by Support (7) and Operation (8) as the implementation of the processes as planned. | 3. Check is covered by Performance Evaluation (9) to monitor and measure processes against the Asset policy, including its commitments, objective and operating criteria, and report the results. | 4. Act is covered by Improvement (10) to take actions to continually improve. |
3. Asset Policy: | 1. The business is the provision of bespoke application services with continual improvements to companies in all parts of the world. The application Service Provider (ASP) is a supply chain of independent companies working in partnership who may act like and can be treated as a single company, however no one company could expect to recruit and retain the large spectrum of qualified skills and experienced knowledge that is needed to provide the bespoke application services to many companies in many countries. The business is an internet-based service to any kind of computing device without the provision of any hardware or software. Asset factors apply to the multitude of data centers that provide the service and to the people who manage the service. | 2. The Asset Policy is to provide bespoke application services that do not stop and cannot be stopped. The primary asset principle is the use of a large number of replicated data centers (as assets) where each data center houses a large number of redundant servers (as assets). In the event of a server failure, business continutes to be provided by other server - no single point of failure is permitted. In the event of a data center failure, business continutes to be provided by other data centers - no single data centre is permitted. | 3. It is expected that customers demand that the business has an Asset Policy is supported with a working Asset Management Service with collaborative shared information. | 4. Asset management must not focus on the value of the asset itself, but on the value that the asset can provide to the business. A server costing less than one thousand pounds can earn more than one thousand pounds per month when properly configured and providing operational benefits to a large number of customers. | 5. Forget the top-down organisational context, leadership, planning and just focus on performance evaluation with (bottom-up) continual improvements. Senior management buy-in happens after the Asset Management Service delivers real benefits and assets have their own revenue stream. Be wary of asking senior management what they want because the majority of senior management will have very little experience of an Asset Management Service. |
4. Strategic Asset Management Planning: | 1. Asset management objectives are derived from business objectives by planning how best to make the assets earn a revenue stream. Asset planning is about processes and procedures that use assets with risks, activities and responsibilities to deliver a benefit. | 2. Assets may have a life cycle much greater than one project so strategic planning must have a long term scenario to match the assets life cycle including maintenance. Assets that are written off at the end of each short term project may be considered as a commodoty that does not earn revenue. |
4. Asset Audit: | 1. The quality audit to ISO 55001 standard shall only be conducted on chapters 4 to 10 of the AMS. Chapters 1 to 3 are not audited and do not need to comply with any standard. |
5. Roles: | 1. Each bespoke application service owner is responsible for their own Internet connections and all local infrastructure that may include any kind of desktop, laptop, tablet or smart phone. An owner may choose to have multiple Internet connections via different Internet Service Providers and may choose to backup using wireless mobil devices. If the ISP has a failure or power is lost, business may continue to be provided via any smart phone using the mobile network. | 2. The application service provider is using ten distributed data centers in 2016 and expect to be using twenty replicated data centers by the end of 2017. The number of secure data centers that house racks of redundant servers will grow to one hundred before 2020. | 3. In the event of a failure of one data center, business continues to be provided using replicated data from another data center. It is considered to be very unlikely that all distributed data centers in many countries could fail at the same time. | 4. Business data is encrypted and replicated to each data center where the encryption means it is plausable to say that the business data does not exist on any specific place. It is considered to be very unlikely that any specific data could be lost from all data centers at the same time. | 5. It is understood that some agencies may be able to gain access and copy any encrypted business data from any data center. It is a policy to ensure that all excessively encrypted data is always unreadable, meaningless and worthless to a criminal. It is a policy that no one person has access to the keys, methods and knowledge needed to decrypt any business data. |
Document Control. | 1. Document Title: BS 1192 BIM Standard. | 2. Description: BS 1192 BIM Standard. | 3. Keywords: BS 1192 BIM Standard. | 4. Privacy: Shared with approved people for the benefit of humanity. | 5. Edition: 1.1. | 6. Issued: 2 Jan 2018. |
|
|