Skip to main content

Help us improve the Digital Marketplace - send your feedback

Ada Mode

Ada Mode Atlas - Intelligent Asset Management for Decommissioning

Ada Mode support industrial asset operators/owners, OEMs and government bodies with the development, adoption and deployment of data science, AI and machine learning to drive industrial decarbonisation. We build bespoke AI and ML applications, served through our Atlas platform, to support efficient, safe and effective decommissioning of legacy assets .

Features

  • Integrate within existing systems and technology stacks
  • Fully serviced cloud hosting or on-premises deployment
  • API and/or dashboards designed for specific users
  • Automate the prioritisation of maintenance activity
  • Optimise asset and system operation to reduce emissions
  • Improve processes quality to reduce waste
  • Monitor asset management to detect trends and patterns
  • Simulate processes to support operational decision making
  • Manage workforce activity to increase system uptime
  • Aggregate data sets across the organisation

Benefits

  • Increase asset, process and plant availability
  • Understand why failures are happening and how to resolve them
  • Reduce the cost of operation
  • Reduce waste
  • Increase workforce safety
  • Facilitate remote monitoring and diagnostics
  • Scale quickly across the organisation
  • Reduce levelised cost of energy
  • Reduce emissions
  • Increase accessibility to system data

Pricing

£0 to £2,000,000 a transaction

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jacklewis@ada-mode.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 2 4 3 8 1 6 5 5 3 2 4 7 4 1

Contact

Ada Mode Jack Lewis
Telephone: 07792712856
Email: jacklewis@ada-mode.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Ada Mode develop other intelligent asset management solutions that are supported by cloud computing service suppliers.
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Maintenance arrangements will be discussed and agreed with the customer at the start of the project.
System requirements
None

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Ada Mode provide 24/5 support through email with a target response time of <12hours. Ada Mode can provide additional support if required at extra cost.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
Standard support is provided through email, phone or web chat with a target response time of <12hours Mon-Fri. Faster support can be provided if required on a case-by-case basis, at extra cost. Each project is assigned a technical account manager as standard.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Ada Mode work have an established on-boarding process that enables secure and reliable data connectivity, reliable and performant application deployment and robust training. Documentation is provided through Ada Mode's Atlas interface. Training can be provided remotely or on-site, depending on user preferences.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Ada Mode Atlas Documentation Interface
End-of-contract data extraction
Data can be extracted through the Atlas interface or through a request to Ada Mode. Upon end of contract, if held in the public cloud, data will be extracted and sent to the customer and deleted within 30 days.
End-of-contract process
The contract will include all training and support needed to operate the solution independently of Ada Mode. Upon end of contract, we have a formal process contained within our Business Management System to ensure all documentation, training, data, permissions and accounts are handled appropriately.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Optimised for use on the particular device
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
Browser based interface
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
None
API
Yes
What users can and can't do using the API
API requirements are specified and agreed at the beginning of the project
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Ada Mode develop fully customisable applications as standard, using our Atlas platform. Specific requirements are defined during the on-boarding process. Customisation is carried out by Ada Mode.

Scaling

Independence of resources
In cloud-based applications we typically make use of intrinsically scalable serverless infrastructure which provides high reliability, availability, and scalability while moderating costs. This approach ensures we can handle heavy traffic without compromising user experience. We also use customer-specific infrastructure, ensuring that one customer's usage cannot impact on another's.

In on premises deployments, local compute availability may impost a constraint here and a serverless approach will not be adopted. In such cases, we design infrastructure to meet expected customer requirements, ensuring availability always meets demand.

Analytics

Service usage metrics
Yes
Metrics types
Service usage metrics are defined on a case-by-case basis and are specified during on-boarding.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users are able to export data directly from the Atlas interface or request it from Ada Mode.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99% uptime.
SLAs are agreed in the contract upon project commencement.
Approach to resilience
As standard, our service is provided through public cloud services (AWS, Azure) and makes significant use of serverless infrastructure. Public cloud is highly resilient, with multiple data centres within a client-specified region to handle geo-redundant data storage, backup and compute. This operates on a shared responsibility model, where the cloud infrastructure provider commits to providing highly resilient infrastructure access. As the application developer and manager, Ada Mode ensure all services are configured and maintained to maximise resilience and availability in line with our standards and any additional client requirements. This includes best-practice configuration, designing for resiliency, and employing continuous monitoring.
Outage reporting
We issue email alerts relating to service outages.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
We provide clients with customisable user roles which control access to attributes of Atlas applications, including management interfaces and support services. Typically, we provide a client Administrator role which has powers to adjust the roles of all users within the client's organisation. The specific capabilities and level of information access associated with each user role can be defined by the client.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
23/10/23
What the ISO/IEC 27001 doesn’t cover
NA
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
List N

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Ada Mode have a robust information security policy managed by our ISO27001 accredited business management system. Specific processes and policies can be provided upon request.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We have an ISO27001 accredited ISMS and ISO9001 accredited quality management system. This business management system enforces a range of policies and processes, including coverage of change and configuration management. Our information security change management process is enacted during initial deployment or update of software or associated systems / supporting infrastructure. This process includes a formal review of information security risks, with actions being set to ensure appropriate mitigation if required. For lifecycle configuration management, we make use of infrastructure as code services, build CI/CD pipelines to automate deployments, services like AWS cloud watch for continuous monitoring and more.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
As standard, Atlas applications are protected by automated vulnerability scanning services such as AWS Inspector or the Azure Security Centre, which automatically scan for vulnerabilities and provide prioritised recommendations for remediation and patching. These services gain information on potential threats from a range of sources, including CVE databases, security benchmarks, threat intelligence feeds and behavioural analysis methods. Our Cyber Vulnerability Management Policy and Vulnerability Patching Procedure provide governance over this area. AWS Inspector and Security Hub are configured to issue notifications to us when vulnerabilities are detected, enabling us to perform a risk review, and design/implement timely mitigation in response.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We provide continuous automated monitoring as standard. We make use of services such as AWS CloudWatch, Inspector, and Web Application Firewall to provide a range of protective monitoring services tailored to application needs. Notifications issued by these services are reviewed to identify potential compromises which are assessed by the application owners. When a potential compromise is identified, we invoke our Cyber Incident Management Procedure, which provides guidance on how to respond, including assessing impact, defining a response plan, understanding root cause, defining remedial actions and communicating to relevant stakeholders. We commit to assessing impact within 24 hours of notification.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have an established Cyber Incident Management Procedure as part of our ISO27001 accredited ISMS. This procedure provides a guideline for how we respond to cyber incidents, including assessment of event impact, drafting a response plan, root cause investigation, remediation and communication. Incident response timelines are determined following impact assessment outcomes. Data breaches will be communicated to affected parties and ICO within 72 hours. Users are able to report incidents to us via email to their account manager, or (if applicable) using the built-in chat function in the application itself. We provide incident reports via email using a standard template.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Ada Mode exist to accelerate industrial decarbonisation through the application of data science and AI. Our work increases the efficiency and cost-effectiveness of low and zero carbon power generation and industrial operations. We ensure that new staff are aligned to this core value and can demonstrate a clear commitment to fighting climate change during the recruitment process. Ada Mode are ISO14001 accredited. Ada Mode developed a wind turbine health monitoring platform, Windscope, which has now spun out into it's own business.

Tackling economic inequality

As a small, growing company we strive to create jobs in engineering and data science and specifically target recruitment from in and around our two office hubs - Bristol and Southampton, where there is significant deprivation. We are also growing our operational activity in the North West of England where are targeting recruitment activity in an area where there is a significant demand for jobs in STEM subjects. Ada Mode commits to offering staff salaries above the national Real Living Wage.

Equal opportunity

Ada Mode operates a regular review of pay, benchmarked against against industry. Ada Mode operates against specific KPIs addressing gender and ethnic diversity of our teams. When onboarding new suppliers, we ensure their modern slavery policy is robust and in alignment with our own.

Wellbeing

Ada Mode promote a healthy work-life balance through operating flexible hours, regular social activities, city centre office locations for easy, low cost travel and high quality serviced office spaces. We are looking to improve our parental leave policy as soon is viable for a business of our size. We encourage our team to support activities to provide coaching on coding, renewable technology and entrepreneurship across our two office hubs - Bristol and Southampton.

Pricing

Price
£0 to £2,000,000 a transaction
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jacklewis@ada-mode.com. Tell them what format you need. It will help if you say what assistive technology you use.