data lens static file lens
The Static File Lens allows for fully automated translation from semi structured files, such as CSV, JSON, and XML, into fully compatible RDF1.1 data (all RDF formats). With provenance as standard, this lightweight, highly-scalable, platform-agnostic tool has support for all the common Knowledge Graphs and generic SPARQL if needed
Features
- provenance of data transformation provided
- data transformation controlled by simple configuration
- supports kafka for exactly once reading
- horizontally and vertically scalable
Benefits
- quickly migrate data from file sources to graph databases
- save development time of building transformation pipelines
- save on development costs of building transformation pipelines
- can transform data faster than bespoke pipelines
Pricing
£1.73 a unit an hour
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 7 8 3 6 9 9 9 0 5 5 7 2 1 2
Contact
DATA LENS LABS LTD
Richard Loveday
Telephone: 07956849625
Email: richard@graph.build
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No
- System requirements
- Software license required if not running on aws
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 2nd line and 3rd line support provided for free. initial response given within 2 hours. solution will be started within 24 hours. response times at weekends is within 24 hours. solution will be started on immediately on monday. Higher levels of support and first line support can be provided with a price on application
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide 2nd and 3rd level support for free. 1st level support can be provided and we with POA. technical account managers and cloud supports engineers can be provided for higher value contracts
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide user documentation as the standard method to help users start using our service but can provide onsite and online training if required for a separate cost or FOC for large contracts
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- The users data is never in our system. Our software is designed to be run in the users own cloud environment.
- End-of-contract process
- Different purchase models are available. If using the software on a pay by the hour basis through Amazon Web Services Markeplace then the contract only ends when the user unsubscribes to the software and the sofware cannot be used anymore. If on a yearly license basis, once the contract ends the license expires and the software cannot be used any more. The data transformation software is used only within the users environment and with the users own data completely separate to us so there is no data for us to delete/return.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
- Other
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The users can trigger the transformation process and also change any of the configuration environment variables used by the service through a rest call
- API documentation
- Yes
- API documentation formats
-
- HTML
- ODF
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- The software we provide is scalable horizontally and vertically. it is generally not used by several users but as many instances as required of the software can be spun up.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide metrics on per hour usage per month
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- We don't. All data used is in the users private cloud where our software can be run.
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The service doesn't store any data outside of the users private environment. Data transformed by the service is configured to be stored in a folder of the users choosing
- Data export formats
- Other
- Other data export formats
- Rdf
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- JSON
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- We don't user our own network. the software is run within the users own private network
- Data protection within supplier network
- Other
- Other protection within supplier network
- The data is only used within the users own private network
Availability and resilience
- Guaranteed availability
- Our product is charged on a per hour usage metering on aws marketplace. If it doesn't work you won't be charged. if you have a yearly license we will refund you for the period the software isn't working on a pro rata basis
- Approach to resilience
- We don't have a data centre
- Outage reporting
- Outages would be shown using the cloud providers own reporting systems
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- We don't have management interfaces. Support is restricted only to named individuals
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Other
- Description of management access authentication
- We don't authenticate management access to our service. This is left to the user to implement within their private cloud infrastructure
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- The software runs on the users private cloud so it is up to the user to control security levels themselves
- Information security policies and processes
- Security is handled by the user
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes to the images used to distribute the software are run past aws marketplaces security vulnerability scanning software and any vulnerabilities are highlighted and need to be changed before the software can be released for use
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Information about potential threats and vulnerabilites to our software are assessed and raised by aws marketplaces security processes. Where necessary we deploy patches generally within 48hrs of a vulnerability being highlighted
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- The software is run within the users private environment so we don't monitor for compromises only scan the software for potential security vulnerabilites within the libraries used in the software
- Incident management type
- Supplier-defined controls
- Incident management approach
- We do not have a predefined process for common events. users report incidents by email , we provide incident reports by email to our customers. As we provide software to be used in the users private cloud the only incidents we have are potential security vulnerabilites being found in the software and general bugs being reported. This is dealt with by our support process for general bugs and reporting all potentialy security vulnerabilities to customer on their discovery while we create a patch
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
we provide data transformation software which can be used to help find solutions to climate change - Covid-19 recovery
-
Covid-19 recovery
our software can be use by life sciences companies to help find solutions to covid recovery - Tackling economic inequality
-
Tackling economic inequality
our software can be used to help analyse data to tackle economic equality - Equal opportunity
-
Equal opportunity
our software can help in the process of analysing data to ensure equality of opportunity - Wellbeing
-
Wellbeing
our software can be used to help analyse data to lead to helping wellbeing
Pricing
- Price
- £1.73 a unit an hour
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Trail version licenses can be provided on request for a month