23.02.2017 Views

CC3001

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TECHNOLOGYfocus<br />

increasingly interested in ensuring their<br />

data is appropriately safeguarded<br />

physically and legally in accordance<br />

with their specific demands.<br />

With regard to companies operating a<br />

BYOD (Bring Your Own Device) policy,<br />

Steve said that the communication<br />

between these devices and Aconex<br />

servers is still encrypted to the same<br />

degree. Owners of such devices are<br />

still only able to see what they are<br />

authorised to see on Aconex, and there<br />

is a range of controls and measures in<br />

place to provide confidence to<br />

customers and users on project teams.<br />

One of their design principles, he<br />

said, is that every company on a<br />

project gets its own area - a private<br />

space in the multi-tenant cloud<br />

architecture - equivalent to having their<br />

own servers, where clients can be sure<br />

they have their own information<br />

protected from unauthorised access.<br />

WHAT DATA IS PROTECTED?<br />

Building Information Modelling (BIM) is<br />

one of the main drivers in construction<br />

today. The process is data driven with<br />

the potential to include massive<br />

amounts of detail in multidimensional<br />

models. Infrastructure projects are also<br />

jumping on the BIM bandwagon, where<br />

many of the public projects are of<br />

national importance.<br />

Without being unduly alarmist, there is<br />

a risk that people can acquire a<br />

considerable amount of information as<br />

to how a system works, the layout of a<br />

building or a transport hub, and from<br />

that, can deduce how to infiltrate such<br />

areas with criminal or terrorist<br />

intentions.<br />

Because of this, asset owners and<br />

their supply chains should be<br />

conscious of the level of detail they<br />

include in models themselves. Aconex<br />

recommends that project teams be<br />

selective about the information in their<br />

models, ensuring that virtual assets are<br />

less vulnerable to security breaches<br />

and unauthorised data access.<br />

The government is working closely<br />

with industry to help provide advice<br />

and guidance in this area. PAS1192-5<br />

is a set of recommendations for<br />

government and its suppliers which<br />

provide protection for critical<br />

information being shared within project<br />

and asset supply chains.<br />

THE INTERNET OF THINGS<br />

Our discussion naturally moved on to<br />

other areas where security risks are<br />

paramount - such as the Internet of<br />

Things (IoT), the all-embracing<br />

scenario which connects people,<br />

buildings and processes, covering<br />

everything from smart cities right down<br />

to personal effects.<br />

Absolutely everything that<br />

communicates with anything else - the<br />

Fitbit on your wrist, your central heating<br />

system or burglar alarm, the latest<br />

cars, remote sensors on buildings -<br />

has to have its own unique identifier,<br />

which needs password protection. You<br />

will have heard about cars being<br />

hacked in the US, with remote<br />

computers wresting control from the<br />

driver. Would you have thought to<br />

reconfigure the car's password after<br />

you bought it, or would you rely on the<br />

manufacturer's settings? Multiply that<br />

scenario many times with the massive<br />

increase in wireless connected<br />

devices.<br />

And IoT will appear in places you<br />

least expect it to. Steve described a<br />

particular French company, a glass<br />

manufacturer, that rents glass as a<br />

service, instead of selling it as a<br />

product. Each window comes with a<br />

digital chip in it that can communicate<br />

with other panes, and which senses<br />

and records ambient temperatures.<br />

BUILDING A SECURE<br />

ENVIRONMENT<br />

So are we building a smart<br />

environment, or a dumb one where<br />

every additional connected device<br />

becomes another weak link, and we<br />

become subservient to those who can<br />

exploit it? Steve expanded further on<br />

the Aconex philosophy. "Aconex", he<br />

said, "has the resources to look at the<br />

wider picture - and that includes the<br />

way cities are going to evolve to<br />

accommodate things like autonomous<br />

transport, higher density populations,<br />

environmental issues and, of course,<br />

increasingly vocal social groups and<br />

their demands."<br />

ACONEX<br />

And what of Aconex, after welcoming<br />

Conject under its brand? "When it<br />

comes down to project control," Steve<br />

said, "there are four areas that need to<br />

be addressed - time, money, scope<br />

and quality. That covers how much a<br />

project is going to cost, how long it will<br />

take to complete it, what is being built<br />

and whether it will achieve its intent.<br />

Project control is about how all of these<br />

areas interact."<br />

Aconex offers a full project controls<br />

platform, supported by Conject's<br />

domain expertise, effectively<br />

integrating files and PAS1192-5<br />

documents, communications,<br />

workflows, costs and now time<br />

(through integration to Primavera P6<br />

and other planning applications), and<br />

taking into account the effects of<br />

change on these integrated resources.<br />

A full project controls solution includes<br />

budgeting and forecasting, progress<br />

and performance measurement,<br />

change and contract management,<br />

programme management, and<br />

payment applications.<br />

All areas are covered by Aconex in a<br />

single platform, selling to broad<br />

communities. With the increasing<br />

technical complexity of building and<br />

infrastructure projects, Aconex now has<br />

more involvement with information<br />

technology managers within<br />

companies that manage projects.<br />

Smart building projects are<br />

increasingly having to conform to, and<br />

be certified against, security protocols.<br />

That takes them beyond the technical<br />

capabilities of traditional project<br />

managers, and requires the input of IT<br />

specialists.<br />

Wise companies, not wishing to<br />

attract the sort of headlines that could<br />

hit their share values hard, will take<br />

security issues on board, and in this<br />

risky climate could even quote their<br />

security credentials as a public<br />

relations exercise.<br />

www.aconex.com<br />

22<br />

January/February 2017

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!