Article Explorer
The Article Explorer provides a search engine to find scientific articles and information about their quality.
Features
- remove access
- big data analytics
Benefits
- flexible search engine
- big data
Pricing
£1.99 to £2,000 a unit a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at overtchouk.pavel@gmail.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
2 4 2 0 7 0 0 6 2 4 4 2 2 6 4
Contact
ALVISS.AI
Pavel Overtchouk
Telephone: +33629746156
Email: overtchouk.pavel@gmail.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
- Commonly used navigators with recent versions will work
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Users can chat.
- Web chat accessibility testing
- None.
- Onsite support
- No
- Support levels
- We provide support when needed, i.e contacted by chat, email or phone.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- A guiding tour is provided and can be followed anytime.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- They ask our support team.
- End-of-contract process
- Subscription ends. Access to the application ends.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- It is a responsible web application. The design will automatically adapt to the screen size.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Responsive web applicaiton.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Users can type and click inside the application.
- Accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
- Users can access the API only if they ask for this type of feature.
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Users can fine tune the analysis to get more results corresponding to their needs.
Scaling
- Independence of resources
- Access to the information is separated between the different users and based on user settings.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users ask for the export to the support team.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
24/7 with >99% availability
Refunds on case by case basis based on the time of unavailability - Approach to resilience
- Our host if AWS.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Session tokens.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Security watch, regular updating and upgrading, proactive testing and patching,
- Information security policies and processes
- Keeping the records of potential security failures and patches.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Mostly handled by the host, AWS.
Regular security updates and upgrades to the latest versions available. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Proactive search of possible security breaches.
Patches are deployed immediately after a possible breach has been identified.
Potential threats are sought in the documentation provided by the supplier as well as cybersecurity newsletters. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Connections are logged and history of accesses are kept.
Potential compromises are investigated.
Incidents are responded to immediately after identification, - Incident management type
- Supplier-defined controls
- Incident management approach
-
Information brought to the concerned people.
Reporting is possible by the Contact us form or through Report modals present in the application.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
We are using a commercial cloud for our hardware.
We provide information about scientific progress in climate change and ways to find experts in climate change. - Covid-19 recovery
-
Covid-19 recovery
We provide services to help COVID-19 recovery. - Tackling economic inequality
-
Tackling economic inequality
We are working towards economic equality. - Equal opportunity
-
Equal opportunity
We are in favour of equal opportunity. - Wellbeing
-
Wellbeing
We help achieving wellbeing.
Pricing
- Price
- £1.99 to £2,000 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Part of the services are available for a free trial online with restricted access after multiple searched.
- Link to free trial
- https://www.welcome.alviss.ai/alboard/#/dashboard
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at overtchouk.pavel@gmail.com.
Tell them what format you need. It will help if you say what assistive technology you use.