WDM Integrated Asset Management System (WDM IAMS)
The WDM IAMS is an advanced Highways and Environmental Asset Management System, drawing on over 30 years of experience with central and local government clients. It features fully integrated mapping and mobile working tools.
This system offers seamless functionality and robust support, perfectly suited for today's dynamic asset management landscape.
Features
- Fully integrated GIS mapping tools supporting external WMS maps
- Fully configurable asset definitions at parent/child/family and sub-data levels
- Works ordering and flexible work flows & financial/contract management
- Management of scheduled and reactive maintenance programmes
- Highly configurable Mobile Working Apps (on-line and off-line features)
- Public facing map based enquiry reporting and CRM enquiry management
- Flexible Document Management capability linked to assets, works, enquiries etc.
- Street Works Noticing/Permitting & NSG Maintenance functions
- Comprehensive reporting, dashboard, ad-hoc querying tools - various output formats
- Interfacing capability and API links to external corporate systems
Benefits
- Fully integrated and centred around flexible network referencing system
- Highly configurable-options to adapt workflow and logic from standard build
- User Groups and highway authority partnerships influence system development
- Fully integrated GIS mapping, ability to use Clients OS API
- Combinations of modules/functions can be added to the core system
- Modules: Streetworks, Public Enquiries/CRM, Drainage, Lighting, RMMS, Structures/Bridges
- UKPMS, Parks/Greenspace, NSG, Works Orders, Financial/Contracts, Accidents, Development Control
- Suitable for any asset management role (flooding, drainage, geotechnics etc.)
- Mobile working supports multiple operations (inspection, defect repair, asset editing)
- System kept up-to-date with national reporting requirements (e.g. TR22/GN22/BSCP520/Elexon)
Pricing
£230 to £460 a user a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 4 5 3 4 9 9 9 4 5 3 7 4 2 1
Contact
W.D.M.Limited
Graeme Paterson
Telephone: 01179567233
Email: info@wdm.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Updates and patching will be scheduled as required to ensure the system remains secure and reliable. This will generally be in out-of-hours periods. However, notice will be given where any planned maintenance may be necessary within the period from 8am to 6pm.
- System requirements
-
- Up to date Web Browser (supported versions supplied)
- Valid email address for named users
- Mobile Working App (operates both offline and online)
- All software, system and security is managed within hosted environment
- Active Directory single sign-on supported
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Our support service operates Monday to Friday, 8:00-18:00, excluding Bank Holidays. Emails received from the client populate the WDM support ticketing system with the addition of being supported by telephone for software or service guidance and error resolution.
Our dedicated Bristol based team ensures urgent queries are prioritised. Response times are categorised as follows:
Priority 1 within 4 hours
Priority 2 one working day
Priority 3 as per client agreement
Automatic updates are sent as your query progresses, from creation through completion. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
There is one level of support: Help-desk and secure support site are the primary vehicles to manage that. An Account Manager will be assigned to each client and they will manage if any additional prioritisation is required, if any requests are change/control requests and whether charges are required and also any escalation that may be required.
There is availability for providing dedicated support resources through the service and prices are provided via the G-Cloud14 Rate Card pricing document. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onboarding is facilitated through a structured Requirements Capture Process, conducted on-site with the client. This critical stage includes a demonstration of the standard system build, identification of any custom configuration needs beyond the standard offerings, and agreement on data migration strategies, training requirements, and procedures for User Acceptance Testing (UAT) and Go-live. This process is meticulously managed by the WDM Account Manager assigned to the project, who oversees the entire delivery.
The Account Manager collaborates closely with the Build Team, ensuring the service is tailored to meet client specifications while also coordinating with the client's Project Team to communicate progress and achieve key milestones. Post Go-live, routine support transitions to the Support Teams, although the Account Manager maintains overall control to ensure continuity and a unified approach throughout the project lifecycle.
Training resources are also a crucial part of onboarding and ongoing support. We manage this through the provision of training videos through the software management console, which has proven highly effective. All costs related to migration, bespoke configurations, and implementation are transparently discussed and agreed upon with the client beforehand to ensure clarity and alignment on expectations. - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Training Videos (mpeg4) deployed directly from the Software
- Some documentation not appropriate for Video will still be PDF
- End-of-contract data extraction
-
Client Administrators are granted comprehensive access and control over their data with the ability to publish any table or view using the ad-hoc query tool. This powerful feature enhances the adaptability and responsiveness of data management, allowing for the tailored extraction and analysis of data according to specific administrative needs.
The tool supports downloading in several formats to ensure compatibility and ease of use across different applications and purposes. Available formats include CSV for general data import/export, XML for structured data sharing, and, uniquely for spatial datasets, Shape Files, Tab/MapInfo, and KML, catering to the specialised needs of geographic information system (GIS) applications. Furthermore, in the event of contract termination,
WDM commits to supporting clients through a transition period by making their data available on an SFTP (Secure File Transfer Protocol) site. This service is provided for three months following the termination of the contract, offering clients sufficient time to migrate their data securely and efficiently. - End-of-contract process
- As explained above, the client will have access to download their own data free of charge. If WDM are extracting the data then only time will be charged at the hourly rates quoted in the G-Cloud14 Rate Card pricing document - This will vary depending on the extent of the system and can be agreed in advance of the Contract starting.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The back-office systems are web browser-based, enabling use on mobile devices wherever internet access is available. Some tools also offer tablet modes, enhancing usability by accommodating the device’s larger screen. The system is designed to be tablet-friendly, utilising easily navigable menus instead of small icons to improve user interaction.
Additionally, mobile working tools are specifically crafted for use on mobile devices. These tools are designed to function both online and offline, ensuring flexibility and continuous productivity, regardless of internet connectivity. - Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service is accessed via a Web Browser URL which opens a Management Console called "AppCentre" or "Portal" from which all Web Browser based application URLs are launched (dependent on user security and data access rights).
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Development in conjunction with central and local government clients to ensure assistive technology is appropriate for purpose.
- API
- Yes
- What users can and can't do using the API
-
WDM’s API technology utilises the .NET Framework and Windows Communication Foundation (WCF) with SOAP/WSDL interfacing, supporting XML, JSON, and GeoJSON formats. While SOAP continues to be supported, WDM is shifting its focus towards REST (Representational State Transfer) architecture for new developments.
WDM IAMS offers comprehensive APIs for key functions such as:
Enquiry, Defect, and Order Management: Creation, update, and queries.
Payment and Invoice Management: Requesting and processing of payments, managing invoice commitments.
Asset and Network Management: Creation, updates, and queries, including third-party network data consumption.
Mapping: Integration with third-party mapping services via WMS/WMTS or OS API.
IAMS supports “Time-Based Extracts” for both specific and full system API calls. The database structure of IAMS is explicitly designed to facilitate this, with all objects containing 'Start and End Date Fields' for precise time-point reporting. This setup enhances data management and extraction capabilities, allowing for detailed tracking of changes over time.
These features ensure IAMS remains adaptable and capable of meeting the varied data management needs of its users, streamlining operations and improving service delivery across multiple platforms. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The service is designed to be highly adaptable, facilitating a wide range of customisations directly through its user-friendly interface, without the need for complex software development. This capability ensures that clients can tailor the system to meet their specific operational needs by adjusting aspects such as workflow sequences, decision logic, and the layout and functionality of user interfaces. Additionally, clients can modify data attributes and control how information is displayed on maps, enhancing the utility and relevance of the system for their specific contexts.
While the primary responsibility for these customisations lies with client Administrators, comprehensive training is provided to ensure they are well-equipped to make these changes. However, recognising that some clients may require additional support, WDM offers expert assistance through its dedicated support team. This service is invaluable for intricate customisations or when clients lack the time or technical expertise to carry out changes independently. In cases where the scope of customisation requires significant effort on the part of WDM, additional charges may apply. These are detailed in the G-Cloud14 Rate Card Pricing document, and clients are encouraged to discuss potential costs and their implications with their appointed WDM Account Manager, ensuring clear communication and alignment of expectations.
Scaling
- Independence of resources
- The WDM IAMS cloud hosting service is designed to handle more users than specified, even when all are active concurrently. We have incorporated ample redundancy into the initial scaling of the system to ensure reliability and responsiveness. Continual monitoring of the hosted system guarantees that both capacity and performance are maintained at optimal levels. If needed, additional resources can be swiftly allocated to keep the service running efficiently and effectively. This proactive approach ensures the system remains fit for purpose, meeting the high demands of our users at all times.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Scheduled reporting enables the automatic delivery of metrics directly to the reporting dashboard, streamlining the monitoring and analysis process. Additionally, the charting application offers real-time insights into user metrics, providing a dynamic tool for visualising and understanding complex data. This combination enhances decision-making and operational efficiency by offering timely and actionable data.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
The service offers a range of tools for enhanced data accessibility. Formatted reports are accessible online and downloadable via browsers, with support for auto-emailing scheduled reports.
The Web Query Builder enables users to filter and download data in various formats, including CSV, Excel, Shapefile (.shp), Tab (.tab), Google Earth (.kml), and schedule exports to repositories like SharePoint.
These exports can be accessed via URLs for integration with external analytical tools. Additionally, the service includes configurable XML import/export capabilities. Please note, support for XML configurations may incur additional charges based on the level of assistance required. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Excel (.xlsx)
- Shape File (.shp), if using spatial data
- MapInfo format (.tab), if using spatial data
- Keyhole Markup Language (.kml), if using spatial data
- Comma-separated values (.csv)
- PDF (formatted reports)
- Word (formatted reports)
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- XML (using XML Importer) - configurable to suit data type
- HMDIF for UKPMS datasets
- Mid/Mif for spatial data sets where appropriate
- Shape File (.shp) for spatial data sets where appropriate
- GeoJSON (.json, .geojson) for spatial data sets where appropriate
- Keyhole Markup Language (.kml) for spatial data sets where appropriate
- Comma-separated values (.csv), Open Document Format (.odf)
- Geodatabase (.gdb, .geodatabase)
- Document system to store main office formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Our service commitment, as part of our ISO 27001 Information Security Management System (ISMS), ensures high standards of system access and availability, alongside responsive customer support. We guarantee system access and availability at a minimum of 98% annually, though our records show we consistently surpass this with a 99.9% achievement rate to date. This translates to a maximum downtime of just 8.76 hours per year.
Customer support is available from 08:00 to 18:00, Monday through Friday, excluding Bank Holidays, with a commitment to maintain accessibility at least 98% of the time. Should there be any deviation from these service level agreements (SLAs), the issue is immediately escalated to our Management Team. This ensures not only swift resolution in partnership with our clients but also underscores our dedication to maintaining and exceeding these service levels for optimal client satisfaction. - Approach to resilience
- Our primary cloud hosting environment is hosted on Amazon Cloud Services in the UK, known for its robust and well-documented resilience features. To ensure the highest level of system reliability and data integrity, we conduct annual disaster recovery tests. These tests are crucial for validating our preparedness and ability to rapidly restore services in the event of an unforeseen disruption. For those interested in a deeper understanding of our disaster recovery protocols or any specific aspects of our cloud hosting resilience, we are more than willing to provide further details upon request. This openness reflects our commitment to transparency and trustworthiness in all aspects of our service delivery.
- Outage reporting
-
Our hosted system features an authenticated monitoring dashboard designed to offer real-time insights into the service health. This dashboard is a crucial tool for administrators, enabling them to have a comprehensive view of the system's performance and any potential issues at a glance. Its authenticated nature ensures that sensitive information remains secure, accessible only to those with the appropriate permissions.
In addition to the dashboard, the system supports the configuration of email alerts for specific predefined conditions. This functionality allows for proactive monitoring, as administrators can be immediately notified of any incidents that may affect the system's performance or security.
This combination of a real-time dashboard and customisable email notifications provides a robust framework for maintaining optimal service health.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- MFA - Multi-factor authentication
- Access restrictions in management interfaces and support channels
- The hosted system implements ISO 27001 controls and is certified by BSI. The hosted system is a discrete and separate system from the WDM corporate system. Administration of the hosted system is segregated from corporate accounts allowing for task specific authorisation and monitoring to be implemented. Logs are collected and protected within an intrusion detection system, providing monitoring and alerting for system changes and resource usage.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
- MFA - Multi-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- Effective Date 05-07-2023, Expiry Date 31-10-2025
- What the ISO/IEC 27001 doesn’t cover
- Certification does NOT cover ICT equipment, hardware and software on the premises of the ICT System User. Nor does it cover ICT infrastructure such as internet or network connectivity or the third party suppliers of the ICT System User and its agents. Scope is limited to; The Information Security Management System in relation to the provision of Software as a Service and Ancillary Hosted Services. This is in accordance with the Statement of Applicability (SOA) version 24.00 (May 2023). View only access to the SOA is available upon request.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
The management system is designed to support the company in achieving its business goals while adhering to the standards required for operations both in the UK and internationally. It encompasses several key standards:
ISO 9001, focusing on quality management, ensuring that our products and services consistently meet customer and regulatory requirements.
ISO 14001, dedicated to environmental management, ensuring our operations minimise their impact on the environment.
ISO 27001, which addresses information security management to secure company and customer information.
ISO 45001, covering occupational health and safety to protect employees from work-related injuries and health problems.
Cyber Essentials, reinforcing our commitment to cyber security.
Our Managing Director mandates adherence to these management systems, underscoring their importance in delivering products and services that meet customer expectations and comply with regulatory requirements. This initiative is led from the top, requiring engagement and commitment across all levels of the company, including directors, managers, supervisors, and employees.
The management system manual outlines the structure for leadership, responsibility, competence, and management of documented information, providing a comprehensive framework to guide our efforts in maintaining high standards of quality, environmental stewardship, information security, occupational health and safety, and cyber security.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
The hosted system is managed using WDM's ISO9001 and 27001 certified CRUMPET management system. All change management is booked, scheduled, and authorised via this system.
All WDM software updates are deployed using WDM's Hosting Hub platform to ensure an immutable installation process to guard against unintentional security properties being changed.
Hosting hub and Crumpet are integrated systems which provide full visibility of the change management process. Changes can be tracked and reviewed back to customer requirements and authorisations. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Software patching for security fixes are on an automated schedule which are deployed through the change management process. (Release candidate followed by A/B group releases).
WDM Operate an application security assurance programme and regularly scan and test the infrastructure for vulnerabilities. Vulnerabilities are risk assessed and prioritised for remediation. Remediation can be immediate, overnight, or next available maintenance window dependent on the risk assessment.
We subscribe to vendor alerts and are members of the NCSC Information Sharing partnership. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The web applications are protected by a Web application firewall which scans the requests for malicious activity, blocking and alerting upon suspicious requests.
WDM Operate an intrusion detection suite which receives heterogeneous logs from across the infrastructure and provides insights, reporting and alerting to inform the security status of the system.
WDM Participate in the NCSC CiSP information sharing partnership and receive alerts and indicators of compromises which are loaded into the intrusion detection system. - Incident management type
- Supplier-defined controls
- Incident management approach
- WDM, as part of the ISO 27001 certified ISMS, operate a security Incident and Investigation Process. This can be made available upon separate request to your account manager.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
W.D.M. Limited is deeply committed to combating climate change through proactive environmental initiatives aimed at enhancing sustainability across our operations. One key measure is the decommissioning of one of our server rooms as we transition more data storage and processing capabilities to cloud technology. This strategic move not only reduces our energy consumption significantly but also enhances our business continuity planning, ensuring resilient and sustainable operations.
Additionally, we are transitioning our fleet of company cars to Electric Vehicles (EVs) or Hybrids, with a firm deadline to decommission all diesel vehicles by 2035. This initiative will significantly reduce our reliance on fossil fuels and lower our emissions.
In tandem with these measures, W.D.M. Limited has set an ambitious target to reduce our CO2 emissions by 14% by 2035, underscoring our commitment to environmental stewardship and our active role in tackling global climate change.
To further enhance our environmental impact, W.D.M. Limited assists clients in reducing their carbon footprints through data-driven decisions that optimise operations for efficiency and sustainability. This approach not only minimises energy usage but also reduces wasteful practices, contributing to significant carbon emission reductions.
We have also implemented features that reduce duplication of site inspections, allowing multiple users to receive real-time updates about the same report. This streamlines processes, reduces unnecessary travel, and cuts down on carbon emissions associated with these trips.
By integrating these strategies into the core of our business operations, W.D.M. Limited is not just contributing to a greener planet but also setting a standard for corporate responsibility in environmental conservation. Our comprehensive approach ensures we remain at the forefront of sustainability practices, providing innovative solutions and leadership in environmental stewardship.Covid-19 recovery
W.D.M. Limited's COVID-19 recovery strategy rigorously prioritises the health, safety, and well-being of our employees, while also ensuring uninterrupted business operations. A key component of this strategy is our Work from Home (WFH) policy, which has been instrumental in allowing employees to perform their duties safely and effectively throughout the pandemic.
Central to our approach are comprehensive COVID-19 risk assessments. These assessments play a pivotal role in our operations, ensuring that all necessary precautions are in place to protect our employees’ health during this challenging period.
Additionally, our robust business continuity plans, supported by our extensive use of cloud technology, have significantly enhanced our operational resilience and adaptability. Leveraging cloud-based solutions has enabled W.D.M. Limited to maintain the continuity of critical business functions, minimise disruptions, and guard against future uncertainties. This strategic use of technology supports our operational requirements and is crucial in maintaining a safe working environment for all our staff.
Throughout this period, we have actively supported our clients, particularly SMEs, by communicating effectively and aiding them through tough times. Our assistance has been instrumental in helping them implement similar health, safety, and operational strategies, ensuring that their businesses continue to function efficiently while prioritising the well-being of their employees. This supportive approach exemplifies our commitment to our clients and our ability to adapt swiftly to changing circumstances, reinforcing the resilience of both W.D.M. Limited and our valued clients.Tackling economic inequality
W.D.M. Limited’s flexible working arrangements allow employees to tailor their work schedules to better manage childcare responsibilities, eldercare needs, or other personal commitments. This level of flexibility not only alleviates the financial burden associated with childcare but also ensures that individuals can remain active in the workforce, thereby supporting economic stability and fostering opportunities for all.
Additionally, through our apprenticeships and work experience programmes, we offer valuable pathways to employment and career advancement for individuals from various backgrounds. These initiatives are designed to cultivate a diverse and inclusive workforce, equipping participants with the skills and experience needed to thrive in their chosen fields.
Our firm commitment to ethical business practices is further demonstrated by our strict adherence to the Modern Slavery Act. We categorically prohibit any form of engagement with organisations involved in slavery or forced labour. Moreover, we empower our employees to report any suspicions of such activities, ensuring they can do so without fear of retaliation. This commitment not only reflects our dedication to maintaining high ethical standards but also reinforces our position as a responsible and principled business leader.Equal opportunity
W.D.M. Limited's Equality and Diversity Policy underscores our commitment to fostering a workplace environment that embraces inclusivity and fairness. We strictly prohibit any form of discrimination against employees or applicants based on characteristics that are not pertinent to their job responsibilities. This policy ensures that no form of unequal treatment based on race, gender, age, sexual orientation, disability, or any other irrelevant characteristic is tolerated within the company.
All employees are expected to uphold these principles as detailed in the policy. Non-compliance or violation of these standards is taken seriously and will result in disciplinary action, adhering to the company’s established procedures. This approach not only reinforces our commitment to maintaining a respectful and inclusive workplace but also demonstrates our dedication to promoting equality at all levels of our organisation.Wellbeing
W.D.M. Limited's Occupational Health, Safety, and Well-being Policy is fundamental in maintaining a secure and supportive workplace environment. This policy encompasses various provisions, including the presence of a trained mental health first aid team dedicated to supporting employee well-being. Additionally, the policy emphasises the importance of implementing safe work systems designed to minimise risks and enhance safety throughout the organisation.
Furthermore, the policy mandates reasonable adjustments to accommodate individual needs, ensuring that all employees have the necessary support to succeed in their roles. By prioritising the health, safety, and well-being of its employees, W.D.M. Limited strives to create a workplace that is not only safe but also conducive to the overall success and well-being of every team member.
Pricing
- Price
- £230 to £460 a user a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- WDM offers a trial version of the "off-the-shelf" IAMS platform, limited to one asset management solution. Tailored with the client’s core network data, provided they supply the National Street Gazetteer, this trial is available for a limited time, enabling clients to evaluate the system's functionality.