Ada Mode Atlas - Intelligent Asset Management for Decommissioning
Ada Mode support industrial asset operators/owners, OEMs and government bodies with the development, adoption and deployment of data science, AI and machine learning to drive industrial decarbonisation. We build bespoke AI and ML applications, served through our Atlas platform, to support efficient, safe and effective decommissioning of legacy assets .
Features
- Integrate within existing systems and technology stacks
- Fully serviced cloud hosting or on-premises deployment
- API and/or dashboards designed for specific users
- Automate the prioritisation of maintenance activity
- Optimise asset and system operation to reduce emissions
- Improve processes quality to reduce waste
- Monitor asset management to detect trends and patterns
- Simulate processes to support operational decision making
- Manage workforce activity to increase system uptime
- Aggregate data sets across the organisation
Benefits
- Increase asset, process and plant availability
- Understand why failures are happening and how to resolve them
- Reduce the cost of operation
- Reduce waste
- Increase workforce safety
- Facilitate remote monitoring and diagnostics
- Scale quickly across the organisation
- Reduce levelised cost of energy
- Reduce emissions
- Increase accessibility to system data
Pricing
£0 to £2,000,000 a transaction
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 2 4 3 8 1 6 5 5 3 2 4 7 4 1
Contact
Ada Mode
Jack Lewis
Telephone: 07792712856
Email: jacklewis@ada-mode.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Ada Mode develop other intelligent asset management solutions that are supported by cloud computing service suppliers.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Maintenance arrangements will be discussed and agreed with the customer at the start of the project.
- System requirements
- None
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Ada Mode provide 24/5 support through email with a target response time of <12hours. Ada Mode can provide additional support if required at extra cost.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
- Standard support is provided through email, phone or web chat with a target response time of <12hours Mon-Fri. Faster support can be provided if required on a case-by-case basis, at extra cost. Each project is assigned a technical account manager as standard.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Ada Mode work have an established on-boarding process that enables secure and reliable data connectivity, reliable and performant application deployment and robust training. Documentation is provided through Ada Mode's Atlas interface. Training can be provided remotely or on-site, depending on user preferences.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Ada Mode Atlas Documentation Interface
- End-of-contract data extraction
- Data can be extracted through the Atlas interface or through a request to Ada Mode. Upon end of contract, if held in the public cloud, data will be extracted and sent to the customer and deleted within 30 days.
- End-of-contract process
- The contract will include all training and support needed to operate the solution independently of Ada Mode. Upon end of contract, we have a formal process contained within our Business Management System to ensure all documentation, training, data, permissions and accounts are handled appropriately.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Optimised for use on the particular device
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Browser based interface
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- API requirements are specified and agreed at the beginning of the project
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Ada Mode develop fully customisable applications as standard, using our Atlas platform. Specific requirements are defined during the on-boarding process. Customisation is carried out by Ada Mode.
Scaling
- Independence of resources
-
In cloud-based applications we typically make use of intrinsically scalable serverless infrastructure which provides high reliability, availability, and scalability while moderating costs. This approach ensures we can handle heavy traffic without compromising user experience. We also use customer-specific infrastructure, ensuring that one customer's usage cannot impact on another's.
In on premises deployments, local compute availability may impost a constraint here and a serverless approach will not be adopted. In such cases, we design infrastructure to meet expected customer requirements, ensuring availability always meets demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Service usage metrics are defined on a case-by-case basis and are specified during on-boarding.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users are able to export data directly from the Atlas interface or request it from Ada Mode.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
99% uptime.
SLAs are agreed in the contract upon project commencement. - Approach to resilience
- As standard, our service is provided through public cloud services (AWS, Azure) and makes significant use of serverless infrastructure. Public cloud is highly resilient, with multiple data centres within a client-specified region to handle geo-redundant data storage, backup and compute. This operates on a shared responsibility model, where the cloud infrastructure provider commits to providing highly resilient infrastructure access. As the application developer and manager, Ada Mode ensure all services are configured and maintained to maximise resilience and availability in line with our standards and any additional client requirements. This includes best-practice configuration, designing for resiliency, and employing continuous monitoring.
- Outage reporting
- We issue email alerts relating to service outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- We provide clients with customisable user roles which control access to attributes of Atlas applications, including management interfaces and support services. Typically, we provide a client Administrator role which has powers to adjust the roles of all users within the client's organisation. The specific capabilities and level of information access associated with each user role can be defined by the client.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 23/10/23
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- List N
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Ada Mode have a robust information security policy managed by our ISO27001 accredited business management system. Specific processes and policies can be provided upon request.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We have an ISO27001 accredited ISMS and ISO9001 accredited quality management system. This business management system enforces a range of policies and processes, including coverage of change and configuration management. Our information security change management process is enacted during initial deployment or update of software or associated systems / supporting infrastructure. This process includes a formal review of information security risks, with actions being set to ensure appropriate mitigation if required. For lifecycle configuration management, we make use of infrastructure as code services, build CI/CD pipelines to automate deployments, services like AWS cloud watch for continuous monitoring and more.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- As standard, Atlas applications are protected by automated vulnerability scanning services such as AWS Inspector or the Azure Security Centre, which automatically scan for vulnerabilities and provide prioritised recommendations for remediation and patching. These services gain information on potential threats from a range of sources, including CVE databases, security benchmarks, threat intelligence feeds and behavioural analysis methods. Our Cyber Vulnerability Management Policy and Vulnerability Patching Procedure provide governance over this area. AWS Inspector and Security Hub are configured to issue notifications to us when vulnerabilities are detected, enabling us to perform a risk review, and design/implement timely mitigation in response.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We provide continuous automated monitoring as standard. We make use of services such as AWS CloudWatch, Inspector, and Web Application Firewall to provide a range of protective monitoring services tailored to application needs. Notifications issued by these services are reviewed to identify potential compromises which are assessed by the application owners. When a potential compromise is identified, we invoke our Cyber Incident Management Procedure, which provides guidance on how to respond, including assessing impact, defining a response plan, understanding root cause, defining remedial actions and communicating to relevant stakeholders. We commit to assessing impact within 24 hours of notification.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We have an established Cyber Incident Management Procedure as part of our ISO27001 accredited ISMS. This procedure provides a guideline for how we respond to cyber incidents, including assessment of event impact, drafting a response plan, root cause investigation, remediation and communication. Incident response timelines are determined following impact assessment outcomes. Data breaches will be communicated to affected parties and ICO within 72 hours. Users are able to report incidents to us via email to their account manager, or (if applicable) using the built-in chat function in the application itself. We provide incident reports via email using a standard template.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Ada Mode exist to accelerate industrial decarbonisation through the application of data science and AI. Our work increases the efficiency and cost-effectiveness of low and zero carbon power generation and industrial operations. We ensure that new staff are aligned to this core value and can demonstrate a clear commitment to fighting climate change during the recruitment process. Ada Mode are ISO14001 accredited. Ada Mode developed a wind turbine health monitoring platform, Windscope, which has now spun out into it's own business.Tackling economic inequality
As a small, growing company we strive to create jobs in engineering and data science and specifically target recruitment from in and around our two office hubs - Bristol and Southampton, where there is significant deprivation. We are also growing our operational activity in the North West of England where are targeting recruitment activity in an area where there is a significant demand for jobs in STEM subjects. Ada Mode commits to offering staff salaries above the national Real Living Wage.Equal opportunity
Ada Mode operates a regular review of pay, benchmarked against against industry. Ada Mode operates against specific KPIs addressing gender and ethnic diversity of our teams. When onboarding new suppliers, we ensure their modern slavery policy is robust and in alignment with our own.Wellbeing
Ada Mode promote a healthy work-life balance through operating flexible hours, regular social activities, city centre office locations for easy, low cost travel and high quality serviced office spaces. We are looking to improve our parental leave policy as soon is viable for a business of our size. We encourage our team to support activities to provide coaching on coding, renewable technology and entrepreneurship across our two office hubs - Bristol and Southampton.
Pricing
- Price
- £0 to £2,000,000 a transaction
- Discount for educational organisations
- No
- Free trial available
- No