Skip to main content

Help us improve the Digital Marketplace - send your feedback

One Big Circle Ltd

Automated Intelligent Video Review

AIVR provides digital inspection capability across the rail network, for remote infrastructure monitoring, surveying, inspection and more. The web-based Platform hosts over 1,000,000 miles of national video data, enabling safe monitoring of the rail environment. The end-to-end solution feeds captured data from fleet installations into the Platform via the cloud.

Features

  • Instant video review and replay
  • Machine Learning model automation
  • Measure and markup video using in browser tools
  • Automatic video transmission and replay
  • Remote access for viewing video from assets
  • Accessible through web browser with secure login
  • In browser markup and annotation for building Machine Learning models
  • Collaboration within browser by marking up and communicating with team
  • Export reports and marked up video
  • Linked to standard and bespoke geographical systems

Benefits

  • Work remotely and remove the need for site based work
  • Complete planning works remotely from a browser
  • Inspect completed works remotely
  • Manage incidents with up to date footage, automatically transmitted
  • Build Machine Learning capability through simple annotation
  • Run AI and Machine Learning automatically to generate insight
  • Share work securely with colleagues through online collaboration
  • Train staff using easily available footage
  • Generate reports including video and data to be used offline
  • Integrated seamlessly with geographical data to ensure accurate response

Pricing

£100 to £100 a licence a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at barnaby@onebigcircle.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 9 8 7 6 5 2 5 6 7 6 7 9 3 8

Contact

One Big Circle Ltd Barnaby Kent
Telephone: 07888679198
Email: barnaby@onebigcircle.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Our standard deployment is to a secure public cloud with a SaaS based subscription. We are able to deploy to a public cloud as a separate bespoke task based on your requirements.
System requirements
Availability of browser listed in capabilities.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond to all queries within 1 working hour. Working hours are 9am - 5pm, Monday to Friday. We also have an out of hours escalation service for handling out of hours service.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
As standard we provide email and telephone support during business hours. We provide heightened support on request and also further technical consultancy and account management tasks.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Online training is available by booking a session. Online help guides and FAQs are available. In person training can be arranged if circumstances dictate necessity.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Users are able to download data and footage throughout the subscription period. Captured data can be transmitted over the course of the contract to a separately specified cloud location. If the client wishes to have all data exported at the end of a contract separately to the methods above this can be agreed during the contract.
End-of-contract process
Users are reminded 3 months before contract end and asked if they would like to renew. Regular meetings are generally held with customers to determine the procedures due at the end of the contract and the manner in which they can be handled.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
A limited version of the service will run on mobile browsers
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
An administrative user is able to login and view service status of their deployed devices and the manner in which they are being used.
Accessibility standards
None or don’t know
Description of accessibility
AIVR is centred around playing back, viewing insight and collaborating with video in the browser. This means it is an advanced website and without viewing the video it is not possible to get the full value from the product. We have endeavoured to ensure that if the user is able to view video the remainder of the interface is as simple and accessible to use as possible, including tool tips and text alternatives.
Accessibility testing
Testing has been completed when AIVR has been used as part of a wider application and a provided a set of material that can be used with signing partners. We plan to do further assistive technology testing on our roadmap.
API
Yes
What users can and can't do using the API
API is available for clients on request. We have a graded approach to the API to meet our clients needs rather than a public, one size fits all API.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The customisation of AIVR comes the configurations of the type, location and insight available based on the footage that is received from multiple moving locations. We also enable the following customisation:
- Ability to annotate on images to collaborate with other staff.
- Ability to share links to footage and provide different levels of access to different users.
- Ability to create a machine learning dataset with annotated labels that can be configured.
- Ability to configure and change icons that show for different incidents.
- Ability to view, review and interact with different types of insight determined by AIVR on the footage.

Scaling

Independence of resources
We use horizontally scaling elastic cloud technologies, dependent on load

Analytics

Service usage metrics
Yes
Metrics types
User required metric reports supplied at agreed intervals.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users are able to export their data by selecting a section of a route and having download links emailed to them.
We are able to work with a client to ensure that data can be automatically synchronised to their own private cloud setup depending on their requirements.
Data export formats
  • CSV
  • Other
Other data export formats
  • MP4 Video Files
  • JPEG Images
  • JSON Meta Data
Data import formats
Other
Other data import formats
  • GPX files from Garmin VIRB
  • GPX from GoPro
  • MP4 and GPX from Drones
  • Unencrypted video format from onboard video systems
  • Excel or CSV instrumented insight based data from other systems
  • JSON based data from other instrumentation systems
  • LIDAR based data formats
  • Mapping based formats for linear referencing systems

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We run a full service desk that operates 7 days a week. We provide SLA's as following:
- Response to first line support query - 2 hours in office hours, 12 hours out of office hours.
- Response to security patches or bugs - 48 hours.
- Response to critical service affecting incident - 30 mins in office hours. Up to 6 hours out of office hours.
Our platform as currently not experienced any service affecting issues after 12 months of continual operation. We are able to provide a bespoke service agreement for clients if they require additional capability or refunds for not meeting certain SLAs.
Approach to resilience
Our service utilises one of the large cloud providers and takes advantage of a number of the resilience services provided including:
- Data automatically backed up and sharded across nodes.
- Horizontally scalable services and applications that dynamically respond to load.
- Secure and resilient authentication and access control.
In addition to these services we also utilise industry standard software development and deployment techniques for ensuring resilience and quality in an evolving product.
Further information on system architecture and security policy is available on request.
Outage reporting
A dashboard is provided to show usage of platform and also any outages. We also provide messaging systems utilising an API and email alerts to inform of any outages.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Contact management principles are applied to verify identity in support channels. Management interface is restricted by user type (and the user requires login credentials)
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
We are a Cyber Essentials Plus organisation and have been working on our ISO27001 ISMS since Jan 2024 which we aim to complete by August 2024.
Information security policies and processes
Each employee signs an agreement which contains information around confidentiality and security. We hold regular training sessions to ensure that any security issue can be identified and then raised immediately with the Chief Technology Officer or designated person in their absence. The CTO has full authority to take any steps necessary if the issue reported needs immediate investigation and remediation.
Our automated systems trigger in our messaging tools and dashboards to ensure that any issues are flagged and need to be identified and resolved. If they are not they are automatically escalated to a more senior manager.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change management is completed through our software development and configuration control tools. Changes are discussed during bi-weekly sprint planning and estimation sessions. Work is then tracked and tested during sprints. We deploy any chances to our staging environment where it is tested before being deployed to our production environment.
All changes to software and configuration are able to be rolled back if any issues are identified.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerabilities are identified by the following techniques:
- Automated internal tools alerting an engineer.
- Externally relevant security alert from relevant mailing lists or industry publications.
- User generated alerts.
Any potential issues will be raised on a daily meeting aside from urgent issues which will be raised immediately on internal messaging tools. Staff are encouraged to raise any concerns immediately and a more senior member will assess the threat level. Ultimately the CTO will decide the threat level. Patches can be deployed immediately if the threat level is sufficiently high.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring systems detect any unusual behaviour and these are made available to our service team. We also run a routine manual check to ensure integrity of the system.
Our team are also trained to identify whether any user reported problems maybe a potential compromise.
All staff are trained to immediately raise any concerns that there has been a compromise and alert other team members to implement a resolution plan. The CTO will be notified of any compromise and manage the resolution.
Incident management type
Supplier-defined controls
Incident management approach
Common events are handled using our service management tool. This ensures that common events can be handled via pre-approved canned replies that are sent to users. Cases are kept open and managed until completion.
Users are able to report incidents via a dedicated support email, telephone line or instance message tool available on the website.
Monthly reports of incidents and their resolution are made available to the management team and ultimately CTO.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Equal opportunity
  • Wellbeing

Fighting climate change

AIVR reduces the need for site visits, eliminating the associated road travel to site, which has a large impact on reducing carbon emissions. Using AIVR to detect faults and plan proactive maintenance improves the reliability of the rail network, encouraging the use of rail transport by the public. Uptake of sustainable mass transit is key to hitting net zero carbon targets. Additionally, the benefits also apply for use in rail freight - which produces 76% less CO2 per ton than road freight.

Covid-19 recovery

The pandemic restricted rail workers from visiting site, highlighting the need for remote imagery. AIVR allows for the rail network to be efficiently and remotely navigated - this ability to work remotely provides health and safety benefits to rail workers. Partners of One Big Circle have predicted that using AIVR can reduce overall site visits by 40%, in addition to the necessary road travel, which can be a high-risk activity for shift workers.

Equal opportunity

One Big Circle is an equal opportunities employer and ensures all suppliers are reviewed against the company's modern slavery policy. One Big Circle also sponsors awards and organisations that promote equal opportunity such as the Rugby Black List promoting the celebration of Black Rugby players achievements.

Wellbeing

The contract workforce for the AIVR product has their mental and physical health supported in various ways by One Big Circle. Policies include flexible working hours, one day of working from home per week (or more for those with children, or other caring or personal needs), and health and life assurance. There is also a cycle to work scheme in place to encourage healthy, carbon free commuting. Staff are also encouraged to participate in fundraising activities - previous examples of company wide efforts include Dragon Boat racing and tag rugby.

Pricing

Price
£100 to £100 a licence a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
For new companies, we provide full Access and Support for 2 Weeks (10 working days)

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at barnaby@onebigcircle.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.