Skip to main content

Help us improve the Digital Marketplace - send your feedback

PROSPECTIVE LABS LTD

FlowOS Timings

FlowOS Timings determines the best transit, dwell, recovery and dead running times to improve service punctuality and reliability. The software combines sensor, schedule, ticketing and mapping data with machine learning and predictive modelling to calculate time needed to travel, board and alight at throughout the day, week and year.

Features

  • Generate achievable transit, dwell, recovery and dead running times
  • Edit your network service patterns geometry from TXC files
  • Set control and timing points
  • Set Excess Wait Time and On time Performance targets
  • Analyse achievable deadrun times
  • Machine learning generated achievable running times

Benefits

  • Increase in On Time Performance
  • Increase in peak hour on time performance
  • Reduction in cost per mile
  • Increase in service miles per hour
  • Deliver faster passenger journeys
  • Decrease passenger wait times

Pricing

£1.75 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@prospective.io. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 2 7 8 1 0 1 9 9 7 6 4 9 5 0

Contact

PROSPECTIVE LABS LTD Pete Ferguson
Telephone: 07809840944
Email: contact@prospective.io

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
N/A
System requirements
Data Requirements (To be finalised with Customer)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 1 working day
No response at weekends unless negotiated separately at an additional cost.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
We provide a customer success lead, technical account manager supported by engineering team to support:
-Deployment of FlowOS to new Operating Companies or Regions.
-Assistance with troubleshooting, including the resolution of issues related to user
authentication
-Deployment of new Software functionality including user setup and support for new
releases and migration/compatibility of projects to new software releases.
-User management including onboarding and offboarding, team management and
administration of user privileges and access to baseline data by depot.
-Resolution of Software defects for the duration of the licensing contract according to defect priority definitions:
Priority 1 (P1) – Software not functioning / cannot be utilised. The Customer is
unable to generate any outputs from the software.
Priority 2 (P2) – A major component of the software is affected. Some aspects of the
software can be used but it is preventing critical functions from being utilised.
Priority 3 (P3) – The software’s core functionality is unaffected but the issue is
affecting the performance of the software.
Priority 4 (P4) – The issue is a background or planned task and will be addressed
when time permits or as part of a planned version release.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Prospective will provide two group in person on boarding training sessions per group of staff as defined by the customer.
The training sessions are designed to:
1. Ensure familiarity with the key features of the software.
2. Provide an opportunity for hands-on coaching using the software to aid the
learning process and get schedulers used to more detailed software features.

In addition to the two training sessions, schedulers will be left with self-serve tutorial documentation, Top-Tips and troubleshooting guides, optional scheduling exercises to complete between the two group sessions.

Additional virtual Q&A sessions can be provided as required by the customer.

We also provide annual in person training refresher sessions and monthly user forums.

A 9-5pm 5 days a week Helpdesk is available for users to receive 121 feedback or user support on specific requirements.

Additional training support can be provided at a rate of £750/day.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
When a contract terminates or otherwise expires in accordance with its terms, we shall on the request of Customer, either return the Data in the format requested by Customer (and destroy all remaining copies) or destroy all of the Data (including all copies of it), save to the extent (and for the limited period) that such information needs to be retained for the purposes of providing termination services or for statutory compliance purposes. We will undertake appropriate data return and deletion immediately on notification of termination and will immediately confirm in writing that we have complied with this obligation.
End-of-contract process
At no additional charge, we will provide to the Customer all reasonable assistance requested by the Customer to facilitate the orderly transfer of all or part of the services back to the customer or to enable a Future Service Provider to take over the provision of all or part of the Services in respect of the agreement, until the end of the notice period.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Dynamic UI elements for viewing core performance metrics in graph, charts, maps and more. Examples of the software interface can be viewed at prospective.io/planner
Accessibility standards
WCAG 2.1 A
Accessibility testing
None with users of assistive technology. Testing is conducted by UI/UX specialists and the engineering QA team.
API
No
Customisation available
Yes
Description of customisation
Users can customise views to display user priority metrics, set up preferred dashboard views and specify input criteria such as dates, time periods and data aggregations.

Scaling

Independence of resources
We provide cloud hosted services with a compute architecture that dynamically scales compute resources as needed to ensure all user activity is accommodated.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach
https://cloud.google.com/docs/security/encryption/default-encryption
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export all key outputs using the software's export functionality. Key outputs include Service Timetables, Vehicle Running Schedules and associated Schedule and Timetable KPIs.
Data export formats
  • CSV
  • Other
Other data export formats
  • TXC
  • PDF
  • PNG
Data import formats
  • CSV
  • Other
Other data import formats
  • TXC
  • XML
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We guarantee 99% uptime per month (measured for the full 24 hour period) with discounts provided in the event of this uptime level not being met. The discount is applied to all affected services in proportion to the number of units affected. The percentage uptime discounts are:
98.5 – < 99.0; 5% refund
95% – < 98.49%; 10% refund
< 94.99%; 17% refund
System maintenance and updates that requires the service to be temporarily unavailable will occur outside of core business hours (9-5pm Monday to Friday), will be planned in advance and agreed with the Customer in writing. In such planned cases, the refund structure will not apply.
Approach to resilience
Available on request
Outage reporting
Internal monitoring tools generate email alerts in the event of any outages.
Customers will be contacted by Customer Success staff by email and phone where available / requested.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels
Restrictions across user roles and permissions groups are managed via backend controls that can be configured for each user organisation with information stored in a backend database and regularly reviewed.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
No
Security governance approach
Security governance aligns with ISO 27001: 2013 Information Security standards
Information security policies and processes
Prospective sets and adheres to information security policies and processes that align with industry standards such as ISO 27001. We conduct information security risk assessments and reviews at regular intervals in line with this compliance programme.
Our policies are communicated to staff during onboarding with policies made accessible to all staff via a company wiki. Staff are made aware of reporting procedures where reports related to information security are logged, reviewed by the members of staff responsible for setting and maintaining adherence to policies and are escalated as necessary. If policies are not adhered to then relevant training and disciplinary /grievance procedures are followed.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We maintain a documented audit trail of service component changes including change request documentation, change authorisation and the outcome of the change. No single person is able to effect changes to production information systems without the approval of other authorised personnel and implementation will changes only be undertaken after appropriate testing and approval. Where feasible, changes are tested in an isolated, controlled, and representative environment prior to implementation to assess potential impact on security and to ensure that only intended and approved changes are made. All users are notified of such changes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
How we assess potential threats to our services?
We continuously monitor and evaluate security threats and record any new threats and our response in a quarterly risk assessment. We use Google’s Cloud Security Scanner to detect common vulnerabilities in our applications.

How quickly do we deploy patches to our services?
We aim to deploy patches immediately after a vulnerability is identified. Regular scheduled and continuous assessments are undertaken to reduce vulnerability exposure time.

Where we get our information about potential threats from?
Google’s Cloud Security Scanner, continuous contact with external qualified security consultants / pentest suppliers and through industry publications.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
How we identify potential compromises
We deploy Event Threat Detection using Google’s Cloud Security Command Centre to detect high-risk and costly threats including brute force SSH, malware, phishing and outgoing DDoS port-scanning. Threat detection results are logged and monitored.

How we respond when we find a potential compromise
The Information Security Officer is notified immediately and the appropriate checks and communication are carried out. Where deemed necessary, usernames, passwords, account information, keys, pass-phrases are updated.

How quickly we respond to incidents
We aim to respond to incidents on the day of detection
Incident management type
Supplier-defined controls
Incident management approach
Users report incidents via help-desk, phone or email. Information related to security incidents is treated as confidential until the incident is fully contained.

Incident response actions:
1.Log and categorise the incident. If applicable, notify the ISO.
2.Run relevant provisioned procedures to resolve the incident and mitigate its impact. If required, change usernames, passwords, etc.
3.Restore affected services and corrupt data from backup. Replace lost hardware. Prioritise actions as per our BC/DR policies/procedures and customer SLAs.
4.Notify relevant authorities and clients (in writing); follow disclosure guidelines in accordance with ICOs best practice.
5.Review policies/protocols/security solutions to mitigate risk of future incidents.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity

Fighting climate change

Prospective's technology enables transport operators and agencies to predict demand for new and adjusted public transport services, to deploy timetables that maximise service punctuality and reliability and to design integrated, multi-modal transport systems that encourage citizens to switch to greener modes of transport. The software supports local, city and regional authorities to fight climate change by helping them to plan more popular and more efficient public transport networks that are well integrated with walking and cycling infrastructure. This encourages modal shift to less carbon emission intensive modes of transportation and supports the development of higher density, liveable urban communities associated with lower carbon emissions lifestyles.

Equal opportunity

Prospective's technology enables transport operators and agencies to predict demand for new and adjusted public transport services, to deploy timetables that maximise service punctuality and reliability and to design integrated, multi-modal transport systems. This enables local, city and regional authorities to design and implement transport network strategies with knowledge about the accessibility to goods and services available to different demographic groups and local communities under different transport investment scenarios. This insight can be used to ensure that access to goods and services by public transport is more equitable and that evidence based strategies can be developed and implemented to increase equality of access to employment and educational opportunities.

Pricing

Price
£1.75 a unit a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@prospective.io. Tell them what format you need. It will help if you say what assistive technology you use.