<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Audrey Bedard &#8211; OUR GREAT MINDS</title>
	<atom:link href="https://ourgreatminds.com/author/bedardaamotus-ca/feed/" rel="self" type="application/rss+xml" />
	<link>https://ourgreatminds.com</link>
	<description>Visionary Thought Leaders</description>
	<lastBuildDate>Tue, 25 Apr 2017 16:56:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.10</generator>
	<item>
		<title>Is the cloud a good solution for Non-Destructive Testing?</title>
		<link>https://ourgreatminds.com/2017/04/25/is-the-cloud-a-good-solution-for-non-destructive-testing/</link>
		
		<dc:creator><![CDATA[Audrey Bedard]]></dc:creator>
		<pubDate>Tue, 25 Apr 2017 11:08:05 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Oil & Gas]]></category>
		<category><![CDATA[Specialty Service]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[U Publish It]]></category>
		<guid isPermaLink="false">https://theogm.com/?post_type=upi&#038;p=17033</guid>

					<description><![CDATA[Nondestructive testing or non-destructive testing (NDT) is a wide group of analysis techniques used in science and technology industry to evaluate the properties of a material, component or system without [&#8230;]]]></description>
										<content:encoded><![CDATA[<p class="MsoNormal">Nondestructive testing or non-destructive testing (NDT) is a wide group of analysis techniques used in science and technology industry to evaluate the properties of a material, component or system without causing damage. In the energy industry, NDT is an integral part of operations and understanding how it interrelates with the internet is a pressing question for this era.</p>
<p class="MsoNormal"><span lang="EN-CA">A recurring NDT/INTERNET question that comes up in business these days is:<br />
Are clouds adapted for Non-Destructive Testing?<br />
What is the best solution for our needs?<br />
To answer that, we need to understand that NDT has its specificity.</span></p>
<p>What could be quicker to manage files in the field than automating the process with Bluetooth and Wi­Fi technologies?</p>
<p style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"><span style="font-size: medium;"><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;">Nothing!</span></span></p>
<p style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">A lot of NDT professionals are reluctant</span></span> <span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">to opt for a connected solution, and it is understandable. Public cloud solutions or online services are often attacked; for example, in October 2016, LinkedIn has been hacked. This, for a company that has a contract to honour and schedule to respect, is an unacceptable situation.</span></span></p>
<p style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"><span style="font-size: medium;"><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;">When we analyse it, we discover that the biggest security failure in the technology and automated process is the same as traditional file management: the human. In both cases, the user is the source of file manipulation errors, and everyone will agree. The more manual operations in a process, the more chances to make a mistake.</span></span></p>
<h4 style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"></h4>
<h4 style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">The way people use technologies influences the security of a system.</span></span></h4>
<p style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><br />
<span style="background: white; margin: 0px;"><span style="font-size: medium;">Which connection are they using: a private one or a public one? Do they opt for solutions with encryption or not? What is the destination of the transferred files: a cloud or a secure private server? The answers to all those questions explain why and how a connected solution can be secure or not for a company.</span></span></span><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-family: Times New Roman; font-size: medium;"><br />
</span></span></p>
<p style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="background: white; margin: 0px;"><span style="font-size: medium;">Firstly, the type of connection used will definitely influence the security of the transferred data. In fact, free network access is, most of the time, unsafe because data is being spied. To keep your data safe, it is better to get a data plan. Usually, the price for this is $75 per month. Depending on the solution you are using, this amount will be quickly reimbursed with all the time saved by using a connected solution.</span><span style="margin: 0px;"><span style="font-size: medium;"> </span></span></span></span><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-family: Times New Roman; font-size: medium;"><br />
</span></span></p>
<p style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="background: white; margin: 0px;"><span style="font-size: medium;">Secondly, the encryption is an additional security for data transferring. In the case of file management, the file transfer is a peer-to-peer application with 2 private solutions at both ends. The communication between the 2 peers can be encrypted; this brings the risks to a minimum. The encryption protects the integrity of the transferred information and also makes the data uninteresting to anyone that would like to use it. </span></span></span><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">The</span> </span><span style="margin: 0px;"><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">Nubitus USB cloud key</span></span></span> <span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">offers you the possibility to use your own encryption method. When investing, it is always to change for a better solution.</span></span></p>
<p style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">Thirdly, the destination! The choice of the server you are using will substantially affect the risk of failure of your system. When you opt for a cloud, it is as if you are sending your information to the computer of someone else. That is why it is always better to get a secure private server or a properly secured solution.</span></span><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-family: Times New Roman; font-size: medium;"><br />
</span><span style="background: white; margin: 0px;"><span style="font-size: medium;">What can be another source of security failure? An employee who loses his USB key. The connected solution is way more secure than a lost traditional USB key containing all your data. Because all data will be transferred to the server of the company even if the key has been lost. And with a well-connected solution, it is possible to get options to delete every file once they are transferred or 10 days after the acquisitions. Some solutions also have the option to use a unique ID for each file transfer.</span></span></span></p>
<h4 style="margin: 0px 0px 11px; text-align: justify; line-height: 150%;"><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-family: Times New Roman; font-size: medium;"><br />
</span><span style="background: white; margin: 0px;"><span style="font-size: medium;">The traditional file management workflow involves a lot of manipulation.</span></span></span></h4>
<p><span style="font-size: medium;"><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="background: white; margin: 0px;">When a file is manually transferred, it goes through a long process. Errors can happen at any step of it. </span></span></span><span style="font-size: medium;">With a connected solution, the file management is done in only one step. </span><span style="font-size: medium;"><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;">By automating this process, the risk of errors decreases considerably. </span></span><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">The most important thing to think of is to always use a private connection and preferably a private server. All other options are interesting but must still be evaluated considering a balance between price, benefits, and risks. </span></span><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="background: white; margin: 0px;"><span style="font-size: medium;">If you still are not sure, </span></span></span><span style="margin: 0px;"><span lang="EN-CA" style="margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">Amotus</span></span></span><span style="margin: 0px;"><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;"> </span></span></span><span lang="EN-CA" style="background: white; margin: 0px; color: black; font-family: 'Calibri Light',sans-serif;"><span style="font-size: medium;">can challenge your security system or help you improve it.</span></span></p>
<p>Techniques and technologies used to achieve operations are diverse; liquid penetrant<span lang="EN-CA">, ultrasound, magnetic particles, eddy currents, and more.</span><span lang="EN-CA"> No matter which technologies are used, inspection data will have to be transferred to a company server. </span><span lang="EN-CA">Regardless of the process used to transfer data on the server (automated or manual), data will end up on a private server or a cloud solution. </span></p>
<p>From there, a question might be asked: Can a cloud truly simplify file management and is any cloud solution adapted for the NDT?</p>
<p>There are three fundamental service models of cloud computing:<br />
IaaS (infrastructure as a software),<br />
PaaS (platform as a software) and<br />
SaaS (software as a service).</p>
<p><span lang="EN-CA">Remember that private and public servers are two possible avenues. NDT was an early user of the private server even before it was called a cloud. Overall, the main idea is to optimise the operation process to reduce OPEX (operation expenses) to increase productivity (up to 12%), availability, traceability, and accuracy of data.</span></p>
<p><span lang="EN-CA">The three principal cloud computing services are the IaaS, PaaS, and Sa</span><span lang="EN-CA">aS.</span></p>
<h4 class="MsoNormal"><span lang="EN-CA">IaaS</span></h4>
<p class="MsoNormal"><span lang="EN-CA">IaaS is a virtual hardware pool service for its users. With a virtual server space, a network connection, bandwidth, IP address, and load <span class="hiddenspellerror">balancer</span> the user can access the computing infrastructure from anywhere with only an internet connection.</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">This kind of solution is primarily used by networker architects. IaaS gives them the opportunity to control the operating system (OS) and give them more flexibility to scale it to their needs, without having to invest in a big infrastructure. IaaS is easily <span class="hiddenspellerror">scalable</span> and includes automation of administrative task, desktop virtualization, and policy-based services.</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">Users do not own the server so it might be difficult for the management and monitoring system to trace data, but it gives them data security because they are host by a physical data center. A positive point about the IaaS is that you will not have any single point failure due to its multitude of hardware resources.</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">IaaS is frequently used for business infrastructure, cloud hosting, or a virtual data centres.</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">Examples of IaaS:</span></p>
<p class="MsoListParagraphCxSpFirst" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">VMware</span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">OpenStack</span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">Chef</span></p>
<p class="MsoListParagraphCxSpLast" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">Windows Azure</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">Cost model: Utility style cost mode, license payment</span></p>
<h4 class="ListBullet1nonum"><span lang="EN-CA">PaaS</span></h4>
<p class="ListBullet1"><span lang="EN-CA">The PaaS is easier to manage and modify than IaaS, but it is less flexible because users do not have any control on the OS. PaaS allows users to develop application and services over the internet. The expertise of a network developer will not be necessary to develop PaaS but an application developer will be needed.</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">PaaS features include an Operating system, server-side scripting environment, database management system, server software, support, storage, network access, tools for design and development, and hosting.</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">Valuable advantages of PaaS are that the customer does not have to invest in infrastructure. It is easy to manage and develop; even for non-expert developers. Usually, you just have to go through the wanted features. It is flexible and it can be easily adapted. It requires only an internet connection and a browser. People from anywhere can work together on the same application. It also includes data security, backup, and a recovery system.</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">Examples of PaaS:</span></p>
<p class="MsoListParagraphCxSpFirst" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">Heroku</span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">Windows Azure</span></p>
<p class="MsoListParagraphCxSpLast" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">Cloud Foundry</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">Cost model: Initial base subscription fee, license payment</span></p>
<h4 class="ListBullet1nonum"><span lang="EN-CA">SaaS</span></h4>
<p class="ListBullet1"><span lang="EN-CA">SaaS is generally used to manage staff or run a CRM (customer relationship management). It works on any enabled devices and there is no license payment. The pricing system is based on subscription.</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">SaaS is developed for the end user for whom everything is managed by the vendor. The major problem with SaaS, for NDT, is that you must make an agreement with the providers to protect confidential data. Once you are using a SaaS, <span class="hiddenspellerror">informatics</span> migration might be complicated. Often businesses have to stay with their supplier.</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">Examples of SaaS:</span></p>
<p class="MsoListParagraphCxSpFirst" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">Workday</span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">Office</span></p>
<p class="MsoListParagraphCxSpLast" style="margin-left: 54.0pt; text-indent: -18.0pt;"><!-- [if !supportLists]--><span lang="EN-CA">&#8211;<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">          </span></span><!--[endif]--><span lang="EN-CA">Gmail</span></p>
<p class="ListBullet1nonum"><span lang="EN-CA">Cost model: Subscription fee, no licenses payment</span></p>
<h4 class="MsoNormal">Implementation</h4>
<p class="MsoNormal"><span lang="EN-CA">IaaS is generally used by networker architects, PaaS by an application developer, and SaaS by the end user.</span></p>
<p class="ListBullet1"><!-- [if !supportLists]--><span lang="EN-CA" style="font-family: Symbol;">·<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">       </span></span><!--[endif]--><span lang="EN-CA">With an IaaS, the user will have to manage the application, data, and the OS. The supplier will take care of virtualization, server, storage, and networking.</span></p>
<p class="ListBullet1"><!-- [if !supportLists]--><span lang="EN-CA" style="font-family: Symbol;">·<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">       </span></span><!--[endif]--><span lang="EN-CA">With a PaaS, the OS will be taken in charge by the supplier.</span></p>
<p class="ListBullet1"><!-- [if !supportLists]--><span lang="EN-CA" style="font-family: Symbol;">·<span style="font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">       </span></span><!--[endif]--><span lang="EN-CA">With a SaaS, the user will not have to manage anything. The supplier will take charge of all the components. The less control you have on your OS, the less control you have on your data security.</span></p>
<p class="MsoNormal"><span lang="EN-CA">Regardless of which kind of cloud you want to implement IaaS, PaaS, or a SaaS; private and public servers are two possible avenues.</span></p>
<p class="MsoNormal"><span lang="EN-CA"> </span><span lang="EN-CA">Overall the main idea is to optimise the operation process to reduce OPEX and to increase availability and accuracy of data.</span></p>
<p class="MsoNormal"><span lang="EN-CA"> </span><span lang="EN-CA">The objective is to help you choose a cloud solution that will help you easily access your data, simplify your file management and, even better, automate it. There are secure solutions to simplify your work and some are compatible with any kind of clouds or private servers.</span></p>
<p class="MsoNormal"><span lang="EN-CA">When you opt for a cloud you should go for a solution that will simplify the work of your team and that will be easy to adapt, access and respect your security engagement. So, in consideration of these criteria, there is not only one good solution; the good solution for you is the one that you will choose. Each company has its own reality. Before choosing or developing a solution that will be your server, you must keenly analyse your needs and, if possible, work with an expert team to help you get the greatest solution. In NDT, we often see companies use Dropbox, box, or Workpad (that can manage your asset, and inspectors, show your data on a map and show you data as in a viewer.</span></p>
<p class="MsoNormal"><span lang="EN-CA">It is important to be conscious of their advantages and limitations. The clouds or private solutions that you will choose will impact your team, their work, and the efficiency of your company and security around the data. This article should help you to investigate your options and choose a cloud that will facilitate your work.</span></p>
<p class="MsoNormal"><span lang="EN-CA">To select the right solutions, consider the options:</span></p>
<p class="MsoNormal"><span lang="EN-CA">Private or Public?</span></p>
<p class="MsoNormal"><span lang="EN-CA">Iaas, PaaS or Saas?</span></p>
<p class="MsoNormal">Generic or dedicated to NDT?</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NDT: Criteria to select the right file management tool</title>
		<link>https://ourgreatminds.com/2016/10/26/ndt-criteria-to-select-the-right-file-management-tool/</link>
		
		<dc:creator><![CDATA[Audrey Bedard]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 11:27:22 +0000</pubDate>
				<category><![CDATA[Best in Class]]></category>
		<category><![CDATA[Business]]></category>
		<guid isPermaLink="false">https://theogm.com/?post_type=upi&#038;p=16668</guid>

					<description><![CDATA[What is NDT? Nondestructive testing  or (NDT) consists of a variety of analysis techniques used in science and technology industry to evaluate the properties of a material, component or system [&#8230;]]]></description>
										<content:encoded><![CDATA[<h4>What is NDT?</h4>
<p><b>Nondestructive testing</b>  or (<b>NDT</b>) consists of a variety of analysis techniques used in science and technology industry to evaluate the properties of a material, component or system and does not permanently alter the article being inspected. It is a technique that can save both money and time in product evaluation, troubleshooting, and research. Common NDT methods include <a title="Ultrasonic testing" href="https://en.wikipedia.org/wiki/Ultrasonic_testing">ultrasonic</a>, <a class="mw-redirect" title="Magnetic-particle inspection" href="https://en.wikipedia.org/wiki/Magnetic-particle_inspection">magnetic-particle</a>, <a class="mw-redirect" title="Liquid penetrant testing" href="https://en.wikipedia.org/wiki/Liquid_penetrant_testing">liquid penetrant</a>, <a class="mw-redirect" title="Radiographic testing" href="https://en.wikipedia.org/wiki/Radiographic_testing">radiographic</a>, remote visual inspection (RVI), <a title="Eddy-current testing" href="https://en.wikipedia.org/wiki/Eddy-current_testing">eddy-current testing</a>, and <a class="mw-redirect" title="Optical interferometry" href="https://en.wikipedia.org/wiki/Optical_interferometry">low coherence interferometry</a>.</p>
<p>NDT is commonly used in <a title="Mechanical engineering" href="https://en.wikipedia.org/wiki/Mechanical_engineering">mechanical engineering</a>, <a title="Petroleum engineering" href="https://en.wikipedia.org/wiki/Petroleum_engineering">petroleum engineering</a>, <a title="Electrical engineering" href="https://en.wikipedia.org/wiki/Electrical_engineering">electrical engineering</a>, <a title="Civil engineering" href="https://en.wikipedia.org/wiki/Civil_engineering">civil engineering</a>, <a title="Systems engineering" href="https://en.wikipedia.org/wiki/Systems_engineering">systems engineering</a>, <a class="mw-redirect" title="Aeronautical engineering" href="https://en.wikipedia.org/wiki/Aeronautical_engineering">aeronautical engineering</a>, <a title="Medicine" href="https://en.wikipedia.org/wiki/Medicine">medicine</a>, and <a title="Art" href="https://en.wikipedia.org/wiki/Art">art</a>.</p>
<h4>Selecting the right file management tool</h4>
<p>In the last article,<span class="Apple-converted-space"> </span>“<em>The unsuspected recurring cost is hidden in inspection companies’ OPEX (operation expense)</em>,”<span class="Apple-converted-space"> </span>the cost of file management for NDT companies was covered. In that article, the time-consuming process of file management is explained, as well as the significant cost related to NDT activities.</p>
<p>A lot of NDT companies do not realize how much they spend each year just to go through the process of properly archiving files. The reality of inspection sites has changed in the last years. New technologies ease the archiving task; however, that brings a lot of new responsibilities for site inspectors. No matter the quality of the inspection, the job is not completed until inspection data is properly stored in the company’s official repository. Even though they benefit from a lot of new technologies, it is still time-consuming which proves costly to companies.</p>
<p>This is without paying attention to all possible errors that may occur from the moment of the acquisition until the files are securely stored on the server. Those errors may not often happen, but their sources are multiple. A broken or lost USB key, a file incorrectly named, a subcontractor who forgets to give back his keys at the end of a contract, or an employee who forgets to transfer his files caused by a bad connection… Fortunately, those kinds of mistakes do not happen too often. However, it is expensive for a company to resolve them. Most of the time the error is only realized once everyone is back at the office. So a professional has to be sent back to the site to reanalyze the missing portion. This results in more expenses in salary, travel, accommodation… and this is not considering delays in the work schedule.</p>
<p>Imagine being able to automatically receive all data acquired on your server. All those errors would not exist.</p>
<p>To develop this solution, you would have to consider multiple components. First, create a connection between all your inspection devices and your server. Second, secure your connection. Third, your solution must transfer all your files to the right location on your server. Also, the solution must be compatible with all your devices and your IT infrastructure. Once all those conditions are met, you would benefit from the best file management tool possible.</p>
<p>Let us begin with the first component: Connecting all your inspection devices. The easiest way is to buy a USB key which acts as a bridge between your products and a cellphone or a “hot spot”. This is the most efficient way to bring together all your devices. Not all connected keys will transfer your data. Most of those solutions only use the Wi-Fi. That will help you to get your product connected, but nothing more. Those solutions allow you to connect your devices, but they do not transfer file. Your device will not be able to access a local connection. Therefore, you will not be able to transfer any data from your device. An ideal solution would use the Bluetooth and the Wi­Fi technologies. That kind of solution will allow your devices to be connected and transfer data automatically in real time.</p>
<p>Once the first component is completed, you are now equipped with a reliable connection. However, no one can assure you that you will always get an efficient connection. Inspection sites are often located in remote areas. It is important to find an alternative to this reality. The solution is not to find a 3G connection; it would be too expensive and complicated. It is better to find a solution with sufficient storage space to acquire all data of one entire inspection day.</p>
<p>But what is the interest of being connected, if the solution that compiles all data of a workday without being connected? This is only an additional security, a plan B. A good solution will transfer automatically all your data to your server as soon as you get a new connection. It is impossible to know in advance how long you will not have access to a connection. That is why it is better to get more storage capacity than not enough.</p>
<p>For example, if an inspector is not able to get a connection for a complete day in the field. All data acquired during the day will be saved to the new solution. Once he gets back to his home base, the solution will use the connection to automatically transfer all data acquired without the inspector having to setup anything.</p>
<p>In the end, a good solution must be able to correctly save data on your server. You are now presented with many options. The inspector can program the solution each morning. The solution can be programmed days in advance. If you opt for a more intelligent solution, you may get a geolocation association. All data acquired will be associated to the GPS and data can be sorted based on location.</p>
<p>If you want to develop it yourself, you will have to invest a lot of time and money to make it happen. Nevertheless, that would be worth it. Those types of solutions bring more security to your company. They will not only help you avoid some expensive mistakes, but also allow you to remotely follow any inspection and in real time. Even if manipulation errors are not happening too often, their consequences have important impacts on your work schedules, your benefits, and your company brand.</p>
<h4>Time is money!</h4>
<p>As the NDT market becomes more and more competitive, NDT companies find themselves under constant pressure to find ways to reduce costs and help preserve their companies’ profit margins. A very difficult task considering that inspection sites are often located in remote areas, meaning that inspection companies have to pay for salary, travel, accommodation, food, equipment, and much more.</p>
<p>Solutions recently performed a study to shed some light on a potentially significant source of recurring cost (and potential savings) for inspection companies: the file management process. To help you quickly understand an inefficient part of the NDT field process and to find out about possible solutions and savings, the study focuses on 3 scenarios, each representing a different company size (10, 15, and 25 inspectors). <a style="color: #2baadf;" href="http://www.amotus.ca/?page_id=391" target="_blank">Click here</a> to access the free study on Amotus.</p>
<p>If you are interested to know how much this solution can help your company, look up your free study: info@amotus.ca</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Inspection Companies Hidden Costs in Operational Expense</title>
		<link>https://ourgreatminds.com/2016/08/29/the-hidden-costs-in-inspection-companies-operation-expense/</link>
		
		<dc:creator><![CDATA[Audrey Bedard]]></dc:creator>
		<pubDate>Mon, 29 Aug 2016 13:45:51 +0000</pubDate>
				<category><![CDATA[Inspection Services]]></category>
		<guid isPermaLink="false">https://theogm.com/?post_type=upi&#038;p=16609</guid>

					<description><![CDATA[Inspection companies are now forced to use a two-step “acquire and archive” inspection process. As we have seen, this means the inspector may perform up to 1 hour of data [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Inspection companies are now forced to use a two-step “acquire and archive” inspection process. As we have seen, this means the inspector may perform up to 1 hour of data archiving and the logistic around it for each day of acquisition. Unfortunately, the operational expense losses for inspection companies do not end there. An additional component that comes into play in this new process is the media used to store the data itself, namely, the USB key.</p>
<p>This post explains how the use of seemingly low-cost USB keys ends up significantly impacting inspection companies’ operating expenses (OPEX).</p>
<h4>File management process review</h4>
<p>Granted, USB keys have gotten extremely cheap over the years. This makes it hard to believe that they may have any significant impact on the overall business. However, the problem resides in the collateral damage they cause. To better understand this, let’s review a typical inspection and file management process.<br />
Step 1) Inspectors use NDT equipment to acquire the data, which they store on USB keys.<br />
Step 2) Each file gets indexed properly, using tags such as client name, asset, site section, component, and contract number.<br />
Step 3) Unconnect properly the key.<br />
Step 4) Each USB key is stored in a secured location (inspectors may use up to a dozen USB keys per day).<br />
Step 5) At the end of each day, inspectors leave the site and go to where they can access a PC (a trailer, most frequently).<br />
Step 6) They then copy all of the inspection files from each USB key onto the PC.<br />
Step 7) Once the PC is connected to a secure data server or cloud solution, they take every file they have recorded and archive all of them.<br />
This last step might be done at the end of each day or once a week when data has been sorted and analysed.</p>
<p>Circling back to the point about collateral damage, we can see that almost each step in the process brings its own element of risk. For example, the inspector may miss a weld on a pipeline (Step 1), get the file indexing wrong (Step 2), use the same USB key twice and overwrite the existing data (Step 6), forget to copy the content of a key (Step 7), or he may even lose a key altogether.</p>
<p>In all of these cases, a common consequence is that inspectors must return to the inspection site and perform an acquisition for the second time. This means the inspection company has to cover wages and travel expenses twice for the same component.</p>
<p>From an operational standpoint, extra time will also be required to rework the schedule and ensure that sending an inspector back to a previous site does not put another project’s schedule at risk. This is not an easy task, especially considering the shortage of qualified and reliable inspectors available on the market.</p>
<p>Combined, all of these factors quickly eat up profit margins and, in the worst situation, can even lead to a contract breach.</p>
<p>Disrupting the legacy file management process<br />
Thanks to the rapid evolution of mobile infrastructure and cloud technologies, inspection companies that are willing to explore solutions to this file management problem now have a few solutions available to them. The core idea behind all of these solutions is to automate the legacy, manipulation-intensive process described above and reduce the number of steps in order to proportionally reduce risk.</p>
<p>Since each solution has its pros and cons, Amotus Solutions is currently putting together a comparison chart to help guide the decision-making process.<br />
If you would like to receive a copy, please send us an email at info@amotus.ca with the subject line “Comparison Chart”, and we will make sure to send you a copy when it becomes available.<br />
To know more about this news process come see us at the ASNT annual conference booth 828. Long beach, 24 to 27 October.<br />
Follow us on “twitter@ LinkedIn” to get your “Free ROI study”</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk
Database Caching 38/82 queries in 0.852 seconds using Disk (Request-wide modification query)

Served from: ourgreatminds.com @ 2026-05-23 23:49:21 by W3 Total Cache
-->