Bringing Job Costing to the Field

April 16, 2020

In construction, we are often designing and constructing made-to-order assets, so there is immediately less certainty. We may be dealing with multiple projects for different people, with different schedules, and run by different project managers. Each will be in a different location, with different site footprints, different ground conditions, different access routes, etc. And, partly influenced by their locations, we are often dealing with different suppliers we might select local designers,
subcontractors, plant, materials, and product suppliers based on their proximity to the site.

Spotlight

Data Concepts

Data Concepts is a dynamic consulting boutique focused on client engagement, technological transformation, and the power of data. Offering deliverable-based, project solutions and specialist consultants, Data Concepts brings white-glove service to clients of all sizes, from Fortune 500 corporations to startups looking for experience that will give them an edge in their marketplace.

OTHER WHITEPAPERS
news image

TOP 5 REASONS TO PUT PRIVILEGE FIRST

whitePaper | July 20, 2020

Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach. Organizations must have a strategy in place to manage and monitor privileged access, as well as detect and respond to threats if they’d like to mitigate risk from today’s advanced attacks. Your application stack and infrastructure is likely quite complex and it can be hard to identify which assets are the most sensitive. And there is a never-ending supply of vendors knocking down your door competing for your time and attention. These two realities make it increasingly difficult to identify which security project to tackle next. When thinking about how to prioritize, it is advantageous to take a step back and think about your businesses goals, albeit in a slightly different way: try to envision what you would be looking for if you were an external attacker or malicious insider looking to steal sensitive data, commit Ransomware, or use your infrastructure for illicit cryptomining.

Read More
news image

AI Act: Risk Classification of AI Systems from a Practical Perspective

whitePaper | March 22, 2023

Artificial intelligence is increasingly becoming a part of our everyday lives, whether at home, in industry or in the public sector. The technology poses risks, but also opens up new opportunities. This presents the institutions in Brussels with the challenge of finding a balance between innovation and regulation for AI in the EU.

Read More
news image

Accelerate Digital Transformation with Low-Code/No-Code Automation

whitePaper | November 30, 2022

The first-generation low-code platforms required considerable adaptations and months of development in the late 1990s and early 2000s. Gartner expects that by 2024, low-code/no-code automation will account for 65% of all app development.

Read More
news image

Using Cloud-Driven Technology to Help Establish a New Normal

whitePaper | July 31, 2020

The current COVID pandemic has paralyzed large parts of our industry with significant movement limitations, occupancy restrictions, and in some cases complete shutdowns. Now, as the initial threat seems to be subsiding, governments and businesses must determine what is required to get back to some sense of normalcy. The biggest hurdles will be regulatory and/or safety-driven. Although the timelines and requirements for the easing of restrictions vary greatly, there are two common threads: limiting occupancy levels and contact tracing individuals who have tested positive for the virus.

Read More
news image

Microsoft Vulnerabilities Report 2022

whitePaper | August 22, 2022

Now in its ninth year, the Microsoft Vulnerabilities Report provides a unique analysis of the vulnerability landscape in Microsoft’s ecosystem. Historically, the report has delivered a holistic annual view of the vulnerabilities within Microsoft’s platforms and products, and has established an undeniable business case for the importance of removing admin rights to reduce risk.

Read More
news image

The Responsible AI Certification Program

whitePaper | June 29, 2022

The Responsible AI Institute (RAII) is developing one of the world’s first responsible AI certification programs. The RAII Certification Program is aligned with emerging global AI laws and regulations, internationally agreed-upon AI principles, research, emerging best practices, and human rights frameworks.

Read More

Spotlight

Data Concepts

Data Concepts is a dynamic consulting boutique focused on client engagement, technological transformation, and the power of data. Offering deliverable-based, project solutions and specialist consultants, Data Concepts brings white-glove service to clients of all sizes, from Fortune 500 corporations to startups looking for experience that will give them an edge in their marketplace.

Events