| 15 OHS 40. Frequently Asked Questions | |
---|
40. Frequently Asked Questions: | 1. People ask ad-hoc questions that are logged in this repository until the topic can be elevated to its own unique section in the overall table of contents. The Request Fulfilment Manager is responsible for the management of this FAQ document. |
2. Glossary of Terms: | OHS means "Occupational Health and Safety". | HSE means "Health and Safety Executive" as the UK regulation authority. | Eliza is a name given to the artificial intelligent assistant that provides bespoke application services. |
What is it? | 1. The bespoke application service is a set of skills that are provided by an artificial intelligent assistant running on a large number of servers in a large number of secure data centers that is the broadband backbone. | 2. The bespoke application service is NOT a program, is NOT an "app" and is NOT a software package. | 3. The bespoke application service cannot be downloaded to a computer where it could be reverse engineered, cloned and sold by others. |
What are "spaces"? | 1. The term "space" is used by BIM to mean a very specific room, work area, location or zone in a building or site. | 2. A "space" will be on a specific floor in a specific place that can easilly be identified by people working in a site. | 3. Both inside space and outside space is named and uniquely identified so where work is undertaken is clearly understood by all concerned. |
What language is it written in? | 1. The bespoke application service is a service driven by a knowledgebase of business rules without programming. | 2. The bespoke application service provides web pages to people using international standard HTML in the same way as a billion other web pages. | 3. Business rules are known as "cause and consequence" and "when this then that" in the same way as Cortina, Siri, Alexa and Google Home use rules. | 4. Business rules are data that are continually learning and evolving without any downtime. |
Business Continuity? | 1. The bespoke application service is compliant with ISO 22301 Business Continuity Standard (BCS) by having no single point of failure - cannot stop and cannot be stopped. | 2. The bespoke application service operates from a large number of servers in a large number of the secure data centers that form the broadband backbone. | 3. In the event that a data center is not available, business continues to be provided by other data centers. | 4. Encrypted business data is replicated to all secure data centers in real-time so backup, recovery and restart issues has been eliminated. |
Security? | 1. The bespoke application service is compliant with ISO 27001 Information Security Standard (ISS) with regular security audits by external security consultants. | 2. All business data is encrypted when communicated and when at rest so it is not practical for a criminal to steal business data and to have a data breach. | 3. All business data is replicated to many secure data centers so it is not practical to loose business data - with ten or more copies, the threat fraudulent changes is also eliminated. |
Data Protection Officer (DPO)? | 1. In compliance with General Data Protection Regulations (GSPR), a Data Protection Officer has been appointed with strategic responsibility to the Board for data protection. | 2. The Data Protection Officer maintains the published Data Protection Impact Assessment (DPIA) that includes mandated security measures that are deployed by the Information Security Manager. | 3. The Information Security Manager has tactical responsibility to deploy whatever security measures are needed to: | (1) Encrypt all business data so it cannot be stolen and cannot have a data breach. | (2) Replicate all business data so nothing can be lost by accident or by fraud. | (3) Authenticate every sign in request to ensure that approved people are helped and unauthorised people are blocked and blacklisted. |
Authentication? | 1. The bespoke application service has evolved beyond the era of the humble password to an authentication service with multi-factors such as location, hardware, software and network. | 2. An approved person using a registered computing device in a known place cannot be impersonated by a hacker in Russia or an Agency in USA. | 3. The artificial intelligent assistant continually monitors all sign-in requests and uses bahaviour analysis to block impersonators and help approved people. | 4. You can watch me sign in and record my access codes, but you could never impersonate me beacuase your computing device will always be different to mine and the place where you try to impersonate me will be different from where I am. For authentication security purposes, the artificial intelligent assistant tracks your location at all time - hackers cannot impersonate where you are located. |
Continual Evolutionary Improvements? | 1. Every approved person has the right to submit a support request that may be a query or an improvement - this is not a fixed product. | 2. Most improvement requests are deployed within the hour where the scope and impact can be defined by business rules. | 3. Each site is unique and may have its own unique template documents and methods of working - programing is not involved. | 4. The company who pays the membership fee have the right to identify the person who has the right to enable or disable any improvement. | 5. Each approved person has the right to customize their application to match their local business requirements. | 6. Unlimited amount of support is included with unlimited improvements where the scope of the service is limited only by what is requested. Continual Evolutionary Improvements are only viable because programming has been replaced with a knowledgebase of dynamic business rules. |
What is the scope? | 1. BIM is different to the traditional software products in that its scope is many times greater. | 2. BIM services are continually evolving and include: | (1) HRM Human Resource Management to manage all approved people working on a site, including time sheets, expenses, invoicing, statement, meetings and daily activities. | (2) QMS Quality Management Service in compliance with ISO 9001 to plan and monitor activities undertaken by people with the identification of non-conformance issues and corrective action plan. | (3) OHS Occupational Health and Safety Service in compliance with ISO 45001 to collate evidence of "when who did what where" with pre-start check lists, permits, inspections and related evidence. Toolbox talk library included. Accident book service included. | (4) RMS Risk Management Service in compliance with ISO 31000 to assess risks, hazards and what control measures must be deployed for each activity. RAMS generator with risk library included. | (5) AMS Asset Management Service in compliance with ISO 55001 to manage stock, tools, equipment and consumables, including the date of certification and inspection with responsible person or stored place. AMS includes PUWER and LOLER inspection schedules and reports. | (6) CHS Contract Hire Service to manage the cost and return of equipment on hire. | (7) FAS Financial Accounting Service for management accounts, customer billing, supplier payments and staff payments. | (8) DCM Document Content Managment Service for the creation, editing and versioning of documents with attachments such as photographs. Each company may provide samples of their own unique style of reports to be used as templates that can be generated as needed. | (8) IAM Identification and Access Managment Service to replace password login with a very secure authentication service with multiple-factor identification including GPS and computing device registration. | (9) DPO Data Protection Officer is included with a Data Protection Impact Assessment to show that all business data is encrypted to prevent theft and replicated to prevent loss. A reportable data breach cannot happen. | (10) CEI Continual Evolutionary Improvements without limit are included to your services so it can evolve at the same rate as you business requirements - say what you want and it will happen. | (11) RFI Request for Information is a shared business messaging service that is secure and maintains an evidence trail of progress. Nothing can be lost and nothing can be forgotten. | (12) SSS Self Service Support Service is included so any approved person can ask and if its possible, it will happen. | 3. The reason that no BIM monopoly company can exist for the next 20 years if because the scope of BIM is no significant and is still growing. | 4. Traditional software product companies will try to fill the market with a large number of simplistic and fragmented "apps" that fail to share digital information with all parties involved in a site. BIM is a large complex database driven application service that cannot be downloaded as a software product. Data is the new oil. Shared data is worth a lot more than private data. |
Next Release? | 1. The era of periodic new maintenance releases is over and a new era of continual evolutionary improvements has arrived. | 2. Because programming has been eliminated, program bugs and vulnerabilities have been eliminated. | 3. No software is downloaded so every person is always using the latest edition and that edition may evolve every hour with improvements and no downtime. | 3. New release charges do not exist - continual evolutionary improvements is built-in. |
History? | 1. The artificial intelligent assistant is one or many incarnations that began life in the 1980s when it was known as Eliza. | 2. The artificial intelligent assistant was moniterized by teaching it how to use business rules to provide web page skills with reports, lists and forms. | 3. By 2001, the artificial intelligent assistant had evolved from a software product to a web based service to eliminate downtime. | 4. The artificial intelligent assistant has never stopped (since 2001) and cannot be stopped, because it operates on a large number of servers in a large number of secure data centers. |
Future? | 1. The artificial intelligent assistant is learning how to listen and speak so keyboard interactions can be supplimented with voice commands. | 2. Management information can be requested by a voice command such as "tell me who is on-site today" or "tell me the contract hire costs for the last month". | 3. Artificial intelligent knowledge cannot be stolen and cannot be traded - your artificial intelligent assistant will flurish for the next 20 years because it cannot to acquired by a competitor. Long term financial stability is assured because the artificial intelligent assistant will always earn more than the cost of operations on solar power. |
Architecture? | 1. The artificial intelligent assistant is compliant with ISO 20001 Information Technology Infrastructure Library (ITIL) that governs how data centers are operated. | 2. The Three Tier Architecture of servers is used with web servers, application servers and database servers in each rack in each data center. Three Tier Architecture means that the application and database servers are not connected to the Internet and so cannot be hacked. A large number of redundant single purpose servers are used without virtualization - each server provides one very specialized service and cannot be made to provide any other service. | 3. Each server rack is powered by a 24 volt battery pack that is charged by solar energy or overnight low-cost mains power - the use of 240 volt equipment has been eliminated. |
What is COBIE? | 1. Construction Operations Building Information Exchange (COBIE) is an Internation Standard to publish and communicate building information between parties. | 2. COBIE information provides three answers as: | (1). What spaces as rooms, areas and zones exist in the building. | (2). Where does an operative go to work in a space. | (3). What equipment is operated in what space. | 3. COBIE publishes information in a tabular format with defined column headings so everybody can use the same field definition. | 4. COBIE enables export and import of BIM information between different Common Data Environments (CDE). |
What is billable? | 1. A construction company buys a membership fee for each site where the membership fee is a tiny percent of the labour cost. | 2. A site is a building within designated GPS coordinates that will identify and approve people working at that site. | 3. A person can only clock-in and clock-out when their registered computing device is physically at the site. When a person forgets their phone, they may sign-in using any other registered computing device that is phyically at the site. | 4. A site may also be identified by a specific WiFi network or IP address range - all computing devices sharing the same IP address are identified as being at the same site. | 5. Membership fees are billable in advance based on the agreed monthly cost. | 7. Membership is from the day of the first payment to the previus day in the following month, regardless of how many days are in the month. Membership begins on day 1 to 28 of any month or is assumed to begin on the following first day of the month. |
Document Control: | 1. Document Title: Frequently Asked Questions. | 2. Description: Frequently Asked Questions. | 3. Keywords: ITIL OHS, HSE, Frequently Asked Questions. | 4. Reference: 161540. | 5. Privacy: Public education service as a benefit to humanity. | 6. Issued: 13 Feb 2018. | 7. Edition: 2.2. |
|
|