RED STAR AI LIMITED

Predictive Modelling Using Clinical Text, Images and Structured Data

Red Star have a suite of Machine Learning and AI tools which we can apply to your data. We create bespoke, high performance models with custom deployments and dashboards optimised for your requirements. We can predict user behaviour, risk stratify a population, automatically categorise documents and images, etc.

Features

  • Machine Learning and AI models created on your data
  • Integrating text, database and image data
  • Explainable AI (xAI) to understand the model's predictions
  • Custom visualisations and dashboards
  • Serve your predictive models through API
  • Latest AI architectures supported
  • Highly scalable and flexible

Benefits

  • Gain insights from your data and predict outcomes in advance
  • Target resources at high risk groups
  • Risk stratify your patients for preventative interventions
  • Explain the reasons behind AI predictions to stay compliant
  • Automate your document and image classification
  • Standalone dashboard or integrate into your existing workflows
  • Segment your users into different populations

Pricing

£5,000 an instance

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andrew.conkie@redstar.ai. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

9 9 5 1 4 9 0 9 6 0 6 4 7 4 0

Contact

RED STAR AI LIMITED Andrew Conkie
Telephone: 07853 599317
Email: andrew.conkie@redstar.ai

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Predictive modelling and other downstream applications which use free text as input
Cloud deployment model
Private cloud
Service constraints
NA
System requirements
Internet access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response within 1 working day or as agreed with client.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat can be arranged using off the shelf tools (eg Slack, Teams)
Web chat accessibility testing
NA
Onsite support
Yes, at extra cost
Support levels
Standard support is response (phone, email or webchat) within 1 working day although likely sooner than this.

Specific terms and periods of increased support can be easily arranged on an ad hoc basis and contractually agreed if required.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training and support will be provided over video conference (Zoom, etc).

Onsite visits can be arranged but unlikely to be required apart unless it is a particularly big project.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
By arrangement with the client, they can extract in own preferred format.

Red Star will destroy the data on our side.
End-of-contract process
At the end of contract, we will provide the agreed deliverables to the client and dispose of any data as agreed with the client.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
NA
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Some features available via an interface (eg, file uploads/downloads, review of anonymisation)
Accessibility standards
None or don’t know
Description of accessibility
Browser based
Accessibility testing
None
API
Yes
What users can and can't do using the API
Basic API available and under active development. Send data, run model inference, return a result
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Most of our models will be custom build but we have an growing and pre-existing suite for diagnosis of heart failure and fragility falls (both from text)

Scaling

Independence of resources
Cloud based approach and easily scalable.

Analytics

Service usage metrics
Yes
Metrics types
Number of calls or any other metrics as agreed with client
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
As agreed with client
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
In client's preferred format.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • XML
  • JSON
  • Excel
  • As agreed
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Xml
  • Json
  • As agreed

Data-in-transit protection

Data protection between buyer and supplier networks
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
Can meet client's standards as required and option to deploy to client infrastructure
Data protection within supplier network
Other
Other protection within supplier network
Restricted access based on IP address

Availability and resilience

Guaranteed availability
24/7 availability with downtime for servicing
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Access restricted to internal staff
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Currently working towards ISO compliance
Information security policies and processes
Available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Currently working towards ISO13485 compliance
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Can be agreed with clients on request
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available on request
Incident management type
Undisclosed
Incident management approach
Available on request

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Equal opportunity

Equal opportunity

Red Star is an equal opportunity employer who celebrates diversity and recognises each and every one of us as an individual. We welcome different beliefs and lifestyles and create an inclusive environment for all our employees.

Pricing

Price
£5,000 an instance
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Please get in contact for a demonstration.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andrew.conkie@redstar.ai. Tell them what format you need. It will help if you say what assistive technology you use.