Large Language Models (LLMs) and Generative AI
We have a deep experience with working on multiple LLM systems to help public sector organisations unlock the potential of LLM and generative AI safely and in a responsible way. The outcome of adoption of our service results in costs savings and enhancing service creation within your organisation.
Features
- Rapid PoC development to quickly show value of GenerativeAI/LLMs
- Product development to enhance website chatbots
- Clear and proven methodology to deliver and upskill
- Machine Vision based product development to enhance specific applications
- Document understanding and processing to streamline identification services
- Methodology and Frameworks for supporting LLM technologies
- Product delivery and egineering expertise to maximise value of LLMs
- Textual, Audio and Video AI product development
- Expertise of integrating with multiple solutions
- Customisable solution and training offered to train developers
Benefits
- Achieve service improvements and efficiencies in delivery through LLMs/Generative AI
- Build using Agile, Iterative, DevOps, Open Standards and User-Centred Methods
- Deep expertise of artificial intelligence engagements across industries
- Solutions built in a scalable way to support continued development
- Build generative AI capability in your technical teams
- Expertise in discovery and finding optimisations to deliver value
- Skills Transfer to Internal Staff Including Training and Project Management
- Ensure Compliance: GDS Service Standard and Technology Code of Practice
- Reduce Running and Maintenance Costs, Business Intelligence and Business Insight
- Full Support, Discovery, User Research, Design, Develop, Delivery, Build, Live
Pricing
£500 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 6 7 3 1 0 4 3 7 5 0 7 6 0 9
Contact
WISER TRIBES LTD
Founders at WiserTribes
Telephone: 07505001804
Email: founders@wisertribes.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
-
Azure
AWS - Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
-
- Use of AWS platform
- Use of Azure platform
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support Incidents are classified under one of four levels depending on severity:
Level 1: Critical,
Level 2: Major,
Level 3: Significant,
Level 4: Minor.
The levels have the following response and resolve times:
Level 1: 1 hour respond, 4 hours resolve;
Level 2: 4 hours respond, 8 hours resolve;
Level 3: 1 day respond, 3 days resolve;
Level 4: 2 days respond, 5 days resolve. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We can tailor support levels and costs to an organisation depending on requirements. We assign a named Service Delivery Manager for each customer.
By default, incidents are assigned one of four levels depending on severity:
Level 1: Critical - The reported problem causes a halt to core business processes and no work-around is available.
Level 2: Major - The reported problem causes degradation to core business processes and no reasonable work-around exists
Level 3: Significant - The reported problem impacts operational environment but does not affect core business processes. A work-around is available.
Level 4: Minor - A non-critical problem is causing some disruption but with little or no impact to our business operations.
The levels have the following response and resolve times:
Level 1: 1 hour respond, 4 hours resolve;
Level 2: 4 hours respond, 8 hours resolve;
Level 3: 1 day respond, 3 days resolve;
Level 4: 2 days respond, 5 days resolve. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The level of onboarding and offboarding support provided depends on the customer's requirements. We can provide full support for organisations who want to rollout the service to their whole organisation. We can also support small pilot trials if desired. At the end of the engagement, we can tailor the level of offboarding support required. We also provides a number of training options including: train the trainer, training for key individuals, classroom training for all users and floor walking support.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Video documentation
- End-of-contract data extraction
- Customers can export their data at any time using the standard export services
- End-of-contract process
- The amount of notification required to end the contract depends on the length of contract taken out and will be included in the call-off contract. At the end of the contract process
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Windows bespoke application
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- LambdaTest Accessibility testing
- API
- No
- Customisation available
- Yes
- Description of customisation
- There is an interface for developers to customise using Python
Scaling
- Independence of resources
- Our solution is scaleable and optimsed
Analytics
- Service usage metrics
- Yes
- Metrics types
- Metrics are agreed with the customer upfront as well as the visualisation of metrics.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- The approach for data export is discussed with the client and agreed at the beginning of the contract.
- Data export formats
- Other
- Other data export formats
- Formats as agreed with the client CSV, ODF, XML, JSON
- Data import formats
- Other
- Other data import formats
- Discussed with customer and agreed
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- The level of availability guaranteed by AWS/Azure is 99.9% availability (based on 24x7).
- Approach to resilience
- Available upon request.
- Outage reporting
- PageDuty alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- The service comes with a set of administrator roles that you can assign to users in your organisation. Each admin role maps to common business functions, and gives those people permissions to do specific tasks
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Available upon request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We use configuration and change management procedures produced inline with ISO9001 and ISO27001. These are based on the ITIL framework and make use of DevOps tooling where possible.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We identify potential threats to our systems through a combination of external penetration testing, weekly patching of servers, and following best practices relating to data security. We subscribe to information security mailing lists for security updates and use external providers to keep us informed.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We have automated tools that monitor and alert on user and application behaviour. All alerts get escalated to the engineering support team.
We classify alerts into 3 severity categories.
- Severity 1: Direct impact to the reputation of Faculty or its clients. 1 hour response time.
- Severity 2: Potential downtime for a subset of users. 24 hour response time.
- Severity 3: No direct impact on users. 2 business day response time. - Incident management type
- Supplier-defined controls
- Incident management approach
- We run an incident management process based upon ITIL's Service Operation practices. These include detailed processes for handling security incidents.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Wiser Tribes is a small, very adaptable and flexible business without the commercial overheads of larger businesses, such as fixed office premises. This helps us target a net zero carbon footprint for Wiser Tribes.
We adapt to our clients priorities and change our working approach to our clients needs, such as working on-site, working remotely, or at an offsite short-term rental office if needed. We don't have plans to invest in long-term office premises that could potentially be under utilised. This gives us the flexibility to rent office space close to our clients.
We use public transport wherever possible. Should consultants need to work some distance from home, we encourage them to find accommodation for the duration of the project close to where they’ll be working, which reduces the carbon impact of a daily commute and also benefiting the local economy.
We are aware of the growing interest around the carbon footprint that can be generated by digital technology and encourage people we work with to consider a green approach in how digital services are procured and used when supporting high volumes of users. This could be something as straightforward as reducing unnecessary email communication.
We have worked on many high volume services where consideration has been given to analysing the positive impact of, seemingly small, changes to the environment.Covid-19 recovery
The Covid-19 pandemic has hit communities and impacted the fabric of society and working environment. We have paid particular attention to the mental well-being of our remote teams and made changes as needed to ensure each individual has the best working pattern and environment to continue to be part of the team, feel productive and deliver successfully.
This involves us focusing on recruitment and retraining associates. We also provide work opportunities for those left unemployed by the Covid-19 pandemic. Mentoring is key to our social values. We are keen to work with organisations and individuals and are keen on looking for opportunities to support people and communities recover from the impact of Covid-19. We recognise that some governmental departments have a return to work policy so we work with clients to understand their preferred working environment to ensure each Wiser Tribe associate is placed on a contract most suited to their personal circumstances.Tackling economic inequality
We recognise that some of the best candidates may come from environments where they have been economically challenged. Equal pay, fairness and providing opportunities is a foundation principle of Wiser Tribes, regardless of gender, age, orientation, disability or race. Our pay structure is fair and based on the individual skills set, ambition and ability. Our ethos is to continually develop all of our associates through coaching, training and mentoring. We have created a supportive environment where we lead by example and we build confidence to perform and succeed regardless of background.
We are also keen to ensure we place our candidates as close to the place of work as possible or we ensure we compensate them through expenses if they have to travel far distances due to work commitments.Equal opportunity
As a diverse group of people, we value cultural differences and approaches in the workplace and recruit people into our network in an inclusive way.
We actively promote inclusion in our resourcing including the following considerations:
● Women in IT
● Minority representation
● Disadvantaged backgrounds
● Returning to work
● Local economy
We also aspire to retraining or transferring skills. We’re keen to spot existing talent from other disciplines and offer retraining where we think a candidate shows the right attitude and aptitude. This adds value not just for the individual but also for the organisation that will reap the benefits of their work.
We are proud of our mentor-led approach, working directly with our clients, supported by our extended network of consultants, delivering human-centred solutions to business problems. We can work with your staff at any level of experience and help them improve and learn the skills needed to deliver the services that we build together.
We understand the skills needed for digital transformation, but more importantly, we understand the kind of mindset required for an agile project to be delivered successfully and work with our clients to help them foster this approach.
We have an in-depth understanding of GDS at all stages of assessment, and we leave our clients with the knowledge and skills they need to continue to deliver long after we’ve left their projects.Wellbeing
We work with our clients and consultants to encourage a flexible working environment which allows everyone to attain a good work-life balance, especially in challenging circumstances, such as the current Covid-19 pandemic. We’ve paid particular attention to the mental well-being of our remote teams and made changes as needed to ensure each individual has the best working pattern and environment to continue to be part of the team, feel productive and deliver successfully.
We always work with individuals to understand and appreciate any personal challenges they may have, both hidden and visible, and agree how we can cater for specific needs, without prejudice or detriment to any individual or to the work we deliver.
We ensure we share and agree best practices and we encourage debate, intellectual curiosity and building of trust both with internal and external team members. Online collaboration, blog articles and community wiki pages are key to our well being of staff members.
We have therefore committed between 5% to 10% of our teams time to be focused on non-delivery activities including personal wellbeing and development.
Pricing
- Price
- £500 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Discussed on a one to one basis with client