CC3001
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
TECHNOLOGYfocus<br />
increasingly interested in ensuring their<br />
data is appropriately safeguarded<br />
physically and legally in accordance<br />
with their specific demands.<br />
With regard to companies operating a<br />
BYOD (Bring Your Own Device) policy,<br />
Steve said that the communication<br />
between these devices and Aconex<br />
servers is still encrypted to the same<br />
degree. Owners of such devices are<br />
still only able to see what they are<br />
authorised to see on Aconex, and there<br />
is a range of controls and measures in<br />
place to provide confidence to<br />
customers and users on project teams.<br />
One of their design principles, he<br />
said, is that every company on a<br />
project gets its own area - a private<br />
space in the multi-tenant cloud<br />
architecture - equivalent to having their<br />
own servers, where clients can be sure<br />
they have their own information<br />
protected from unauthorised access.<br />
WHAT DATA IS PROTECTED?<br />
Building Information Modelling (BIM) is<br />
one of the main drivers in construction<br />
today. The process is data driven with<br />
the potential to include massive<br />
amounts of detail in multidimensional<br />
models. Infrastructure projects are also<br />
jumping on the BIM bandwagon, where<br />
many of the public projects are of<br />
national importance.<br />
Without being unduly alarmist, there is<br />
a risk that people can acquire a<br />
considerable amount of information as<br />
to how a system works, the layout of a<br />
building or a transport hub, and from<br />
that, can deduce how to infiltrate such<br />
areas with criminal or terrorist<br />
intentions.<br />
Because of this, asset owners and<br />
their supply chains should be<br />
conscious of the level of detail they<br />
include in models themselves. Aconex<br />
recommends that project teams be<br />
selective about the information in their<br />
models, ensuring that virtual assets are<br />
less vulnerable to security breaches<br />
and unauthorised data access.<br />
The government is working closely<br />
with industry to help provide advice<br />
and guidance in this area. PAS1192-5<br />
is a set of recommendations for<br />
government and its suppliers which<br />
provide protection for critical<br />
information being shared within project<br />
and asset supply chains.<br />
THE INTERNET OF THINGS<br />
Our discussion naturally moved on to<br />
other areas where security risks are<br />
paramount - such as the Internet of<br />
Things (IoT), the all-embracing<br />
scenario which connects people,<br />
buildings and processes, covering<br />
everything from smart cities right down<br />
to personal effects.<br />
Absolutely everything that<br />
communicates with anything else - the<br />
Fitbit on your wrist, your central heating<br />
system or burglar alarm, the latest<br />
cars, remote sensors on buildings -<br />
has to have its own unique identifier,<br />
which needs password protection. You<br />
will have heard about cars being<br />
hacked in the US, with remote<br />
computers wresting control from the<br />
driver. Would you have thought to<br />
reconfigure the car's password after<br />
you bought it, or would you rely on the<br />
manufacturer's settings? Multiply that<br />
scenario many times with the massive<br />
increase in wireless connected<br />
devices.<br />
And IoT will appear in places you<br />
least expect it to. Steve described a<br />
particular French company, a glass<br />
manufacturer, that rents glass as a<br />
service, instead of selling it as a<br />
product. Each window comes with a<br />
digital chip in it that can communicate<br />
with other panes, and which senses<br />
and records ambient temperatures.<br />
BUILDING A SECURE<br />
ENVIRONMENT<br />
So are we building a smart<br />
environment, or a dumb one where<br />
every additional connected device<br />
becomes another weak link, and we<br />
become subservient to those who can<br />
exploit it? Steve expanded further on<br />
the Aconex philosophy. "Aconex", he<br />
said, "has the resources to look at the<br />
wider picture - and that includes the<br />
way cities are going to evolve to<br />
accommodate things like autonomous<br />
transport, higher density populations,<br />
environmental issues and, of course,<br />
increasingly vocal social groups and<br />
their demands."<br />
ACONEX<br />
And what of Aconex, after welcoming<br />
Conject under its brand? "When it<br />
comes down to project control," Steve<br />
said, "there are four areas that need to<br />
be addressed - time, money, scope<br />
and quality. That covers how much a<br />
project is going to cost, how long it will<br />
take to complete it, what is being built<br />
and whether it will achieve its intent.<br />
Project control is about how all of these<br />
areas interact."<br />
Aconex offers a full project controls<br />
platform, supported by Conject's<br />
domain expertise, effectively<br />
integrating files and PAS1192-5<br />
documents, communications,<br />
workflows, costs and now time<br />
(through integration to Primavera P6<br />
and other planning applications), and<br />
taking into account the effects of<br />
change on these integrated resources.<br />
A full project controls solution includes<br />
budgeting and forecasting, progress<br />
and performance measurement,<br />
change and contract management,<br />
programme management, and<br />
payment applications.<br />
All areas are covered by Aconex in a<br />
single platform, selling to broad<br />
communities. With the increasing<br />
technical complexity of building and<br />
infrastructure projects, Aconex now has<br />
more involvement with information<br />
technology managers within<br />
companies that manage projects.<br />
Smart building projects are<br />
increasingly having to conform to, and<br />
be certified against, security protocols.<br />
That takes them beyond the technical<br />
capabilities of traditional project<br />
managers, and requires the input of IT<br />
specialists.<br />
Wise companies, not wishing to<br />
attract the sort of headlines that could<br />
hit their share values hard, will take<br />
security issues on board, and in this<br />
risky climate could even quote their<br />
security credentials as a public<br />
relations exercise.<br />
www.aconex.com<br />
22<br />
January/February 2017