Predictive Modelling Using Clinical Text, Images and Structured Data
Red Star have a suite of Machine Learning and AI tools which we can apply to your data. We create bespoke, high performance models with custom deployments and dashboards optimised for your requirements. We can predict user behaviour, risk stratify a population, automatically categorise documents and images, etc.
Features
- Machine Learning and AI models created on your data
- Integrating text, database and image data
- Explainable AI (xAI) to understand the model's predictions
- Custom visualisations and dashboards
- Serve your predictive models through API
- Latest AI architectures supported
- Highly scalable and flexible
Benefits
- Gain insights from your data and predict outcomes in advance
- Target resources at high risk groups
- Risk stratify your patients for preventative interventions
- Explain the reasons behind AI predictions to stay compliant
- Automate your document and image classification
- Standalone dashboard or integrate into your existing workflows
- Segment your users into different populations
Pricing
£5,000 an instance
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 9 5 1 4 9 0 9 6 0 6 4 7 4 0
Contact
RED STAR AI LIMITED
Andrew Conkie
Telephone: 07853 599317
Email: andrew.conkie@redstar.ai
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Predictive modelling and other downstream applications which use free text as input
- Cloud deployment model
- Private cloud
- Service constraints
- NA
- System requirements
- Internet access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response within 1 working day or as agreed with client.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat can be arranged using off the shelf tools (eg Slack, Teams)
- Web chat accessibility testing
- NA
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard support is response (phone, email or webchat) within 1 working day although likely sooner than this.
Specific terms and periods of increased support can be easily arranged on an ad hoc basis and contractually agreed if required. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Training and support will be provided over video conference (Zoom, etc).
Onsite visits can be arranged but unlikely to be required apart unless it is a particularly big project. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
By arrangement with the client, they can extract in own preferred format.
Red Star will destroy the data on our side. - End-of-contract process
- At the end of contract, we will provide the agreed deliverables to the client and dispose of any data as agreed with the client.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- NA
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Some features available via an interface (eg, file uploads/downloads, review of anonymisation)
- Accessibility standards
- None or don’t know
- Description of accessibility
- Browser based
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- Basic API available and under active development. Send data, run model inference, return a result
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Most of our models will be custom build but we have an growing and pre-existing suite for diagnosis of heart failure and fragility falls (both from text)
Scaling
- Independence of resources
- Cloud based approach and easily scalable.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Number of calls or any other metrics as agreed with client
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- As agreed with client
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- In client's preferred format.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- XML
- JSON
- Excel
- As agreed
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Xml
- Json
- As agreed
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- Can meet client's standards as required and option to deploy to client infrastructure
- Data protection within supplier network
- Other
- Other protection within supplier network
- Restricted access based on IP address
Availability and resilience
- Guaranteed availability
- 24/7 availability with downtime for servicing
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Access restricted to internal staff
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Currently working towards ISO compliance
- Information security policies and processes
- Available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Currently working towards ISO13485 compliance
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Can be agreed with clients on request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Available on request
- Incident management type
- Undisclosed
- Incident management approach
- Available on request
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Equal opportunity
-
Equal opportunity
Red Star is an equal opportunity employer who celebrates diversity and recognises each and every one of us as an individual. We welcome different beliefs and lifestyles and create an inclusive environment for all our employees.
Pricing
- Price
- £5,000 an instance
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Please get in contact for a demonstration.