Print this Page
1.1 Portfolio Director
08 Construction Supply Chain Service
Close this Page

11.08 Construction Supply Chain Service:
1. Construction timesheet, invoicing and billing application service for a cooperative supply chain of trades people, brokers and customer.
2. Trades people enter their daily job details using a very simple mobile phone application that should take less than one minute each day.   Daily job details is automatically accumulated into a weekly timesheet and invoice without any further manual actions.
3. Brokers share their trades people daily job sheets and weekly invoices that is automatically consolidated as a complete and correct ledger without any manual actions.   Consolidated invoices are automatically created and shared with the customer.
4. Customers share their brokers job sheets and weekly invoices as complete and correct ledgers that reflect actual jobs completed without any manual intervention.

2. Fiscal Plan:
1. A design criteria is that the Bespoke Application Service is provided with built in continual improvements with a cost as one-percent of the revenue billed.   As the number of trades people increase, the amount of date processed increases, the weekly revenue increases and the Bespoke Application Service fee increases in a predictable way.   As the number of trades people decreases, the number of daily transactions decrease, the weekly revenue decreases and the Bespoke Application Service fee decreases in accord.
2. The Bespoke Application Service is a complex supply chain of different businesses that cooperate in a specific construction project.   The most efficient and productive way to manage jobs, timesheets and invoicing is to share the same provably complete and correct information between all applicable parties.   No one party is in a position to build and operate their own unique application service in a more effective way or in a more cost effective way.

3. Security and Privacy:
1. Business data that is shared between a number of cooperating companies must be very secure and fully compliance with Data Protection regulations.   Shared data is private and confidential to each party and each party have their own unique view of the shared data.
2. Security is deployed with three policies that exceed the business requirement of each party as:-
(1) Encryption of all business data means that information cannot be stolen - what is stored is meaningless and worthless.
(2) Replication of all business data means that information cannot be lost - it is replicated to at least ten safe and secure data centers.
(3) Authentication of each approved person means that criminals are blocked from the private Bespoke Application Service that is not known to Google or any other search engine.
3. The Bespoke Application Service includes continual improvements and the expert services of the Data Privacy Officer who maintains the Data Protection Impact Assessment (DPIA) with the Information Commissioners Office (ICO).   The Information Security Manager deploys applicable security measures that exceed the business requirements defined in the strategic Data Protection Impact Assessment.
4. Each approved person have the right to view their own Personally Identifiable Information (PII), have the right to have their PII corrected and have the right to be forgotten.   Every request is validated and recorded in a shared evidence trail. Any criminal behaviour will be stopped, the person will be blacklisted and will no longer be able to access the Bespoke Application Service.

4. Bespoke Application Service:
1. Each approved person is provided with their own unique sign-in link that is not known to anybody else.   Every authentication request is monitored in real-time to prevent criminal attacks and to make sure that people act in a reasonable way.
2. An approved person may use any kind of desktop, laptop, tablet or smart phone with a secure browser and any edition of any operating system.   No application program is provided to be downloaded, installed and maintained.   No software is distributed to be patched and every person will only use the current release of the application.
3. Any number of trades people may be approved by one or more brokers.   Any number of brokers may be approved by the customer in any defined hierarchy.   Each broker may be represented by any number of approved people working from any number of approved locations.   The customer may be represented by any number of approved people working from any number of approved location.
4. The Bespoke Application Service does not stop and cannot be stopped - downtime has been eliminated.   If one data center is not available, other data centers continue to provide the Bespoke Application Service.

5. Business Data:
1. The construction project is identified by a defined list of sites and locations in a site where jobs are scheduled to be done.
2. The construction project has a single named customer. The customer may be represented by any number of approved customer people using approved networks who are granted the right to view customer data.
3. The customer has one or more named brokers. Each broker may be represented by any number of approved broker people using approved networks who are granted the right to view their brokerage data.   When applicable, a hierarchy of brokers may be defined where a broker may be responsible for any number of other brokers.
4. Each broker has one or more named trades people. Each trades person is assigned the right to select their daily job details and view their timesheets, invoices and payment history.

5. Billing Brokerage:
1. Broker-pays-Trade: Each trades person has a hourly rate that they invoice and are paid gross before applicable taxes.
2. Broker-pays-Broker: Each trade has a brokers hourly rate that the broker invoices and are paid by another broker.   Each broker-to-broker supply chain will have its own unique hourly rate.
3. Customer-pays-Broker: Each trade has a customer hourly rate that the broker invoices and are paid by the customer.

6. Trades Person:
1. Each approved trades person is assigned a unique link for them to access the Bespoke Application Service.   The link is sent by email where it can be clicked and may be saved as a favourite in their browser.   The link includes the persons password so they do not need to enter their password.
2. Each day, the trade person will view their Bespoke Application Service and select the job they did at a site location with the number of hours.   The design of this form is using drop down lists to avoid data entry errors.   This daily task should take less than one minute to record what jobs have been done.
3. The trade person may select their weekly timesheet, invoice and payment history for the entire duration of the project.   At the end of each week, their day job details becomes a weekly timesheet and an invoice without any intervention.   When payment is made, this is recorded and shown in a statement that the applicable invoice has been paid.
4. All the financial information needed by a trade person is available to be downloaded or copied.   That financial information cannot be stolen, cannot be lost and may be viewed at any time.

7. Broker:
1. Each day, the broker can see what jobs have been done in site locations by their trades people.   If a trades person forgot to enter their job details, they can be reminded that they get paid based on the jobs that they do.   The broker has an accurate daily view of jobs done in site locations and consolidated situation report.
2. Each week, each trades person invoice is available and consolidated into the outgoing ledger.   When payment is made to a trades person, the trades person invoice is marked off as "paid".
3. Each week, a consolidated invoice is available using the brokers hourly rate to be sent to the customer or another broker.   When payment is made to a broker, the brokers invoice is marked off as "paid".
4. An outgoing statement is automatically maintained to show the history of trades person invoices and associated payments.
5. An income statement is automatically maintained to show the history of broker invoices and associated payments.   VAT accounting and accrual may be included as needed. Multi-currency may be included as needed.
6. All the financial information needed by a broker is complete, correct and available to be downloaded or copied.   That financial information cannot be stolen, cannot be lost and may be viewed by approved people at any time.

8. Customer or Client:
1. Each day, the customer can see what jobs have been done in site locations by all trades people.   The customer has an accurate daily view of all jobs done in site locations and consolidated situation report.
2. Each week, each broker invoice is available and consolidated into the outgoing ledger.   When payment is made to a broker, the brokers invoice is marked off as "paid".
3. An outgoing statement is automatically maintained to show the history of brokers invoices and associated payments.   VAT accounting and accrual may be included as needed. Multi-currency may be included as needed.
4. All the financial construction information needed by a customer is complete, correct and available to be downloaded or copied.   That financial information cannot be stolen, cannot be lost and may be viewed by approved people using approved networks at any time.

9. Approval Mechanism:
1. A system of signing paper timesheets to approve payment was expensive, time consuming and simplified now that all such data is shared.
2. The person responsible for signing jobs as completed will process the trades persons daily job records and mark them as accepted or rejected.
3. Trades people invoices will only reflect those jobs that have been marked as "accepted".   Trades people may follow up on jobs that have been rejected.
4. All approved people share the same daily job details so paper has been eliminated, lost data has been eliminated and alternate facts have been avoided.   No data can be deleted. Once data has been used for invoicing, that data cannot be changed.

10. What Did I Do:
1. The Bespoke Application Service includes a shared evidence trail that shows every request and action that every approved person does.
2. All data entry has been simplified to a select-from-list method that has eliminated language spelling errors.   A degree of multiple language support is available for trades people who choose to select their native language - only European left-to-right languages.
3. Who did what and when information is retained as replicated encrypted data that cannot be deleted and cannot be changed.

To Do:
1. Sample invoices are needed for all three layers of the supply chain.   This should define all the contractual information that is needed to fully automate the weekly billing cycle.   Phase 1 may include VAT accounting as and where applicable.

Phase 2:
1. Evidence management with photographs of completed jobs and checklists are pending to backup the timesheets and to simplify the approval mechanism.   Photos taken with one smart phone may not be viewable using a different computer - some standards may be needed.
2. Data entry of messages has yet to be justified - language may be an issue.
3. Phase 1 does not include payrole because payrole liability insurance is more expensive and better subcontracted to an insured and proven expert.

Document Control:
1. Document Title: Construction Supply Chain Service.
2. Reference: 161108.
3. Keywords: ITIL, Construction Supply Chain Service, Eliza Artificial Intelligent Assistant.
4. Description: Construction Supply Chain service using AI benefits without software.
5. Privacy: Public education service as a benefit to humanity.
6. Issued: 2 Apr 2017.
7. Edition: 1.0.

JILL.C2
Job Invoice Ledger List, Construction Commissioning.
Each Bespoke Application Service project is private without any brand publicity to keep it safe and secure.
The Bespoke Application Service is hidden from Google and all search engines to minimise criminal attacks.
https://www-computer-management.co.uk/Job-Invoice-Ledger-List_trade.c2/c2012345678901234567890123456789
https://www-computer-management.co.uk/Job-Invoice-Ledger-List_broker.c2/b2012345678901234567890123456789
https://www-computer-management.co.uk/Job-Invoice-Ledger-List_client.c2/a2012345678901234567890123456789
----+----1----+----2----+----3----+----4----+----5----+----6----+----7----+----8----+----9----+----0----+----1
The general style of the URL may be of sufficient complexity to minimise criminal behaviour.