SlideShare ist ein Scribd-Unternehmen logo
1 von 55
managing a community building ,[object Object]
the day ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],break lunch break
introduction ,[object Object],[object Object]
good buildings are... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
bad buildings have... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
common problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
accessibility  (h) things to consider when developing a disability access audit
accessibility  (h) things to consider when developing a disability access audit publicity (different formats / web design) signs (high visibility, wayfinder, braille, lowercase)  entrance (tactile paving, doorbells, ramp gradients, automatic doors / door width, handrails, lighting, seating, contrasting colours, reception desk height) hearing loops (test them / consider overspilling) toilets (alarms, peninsula access, handrails, floor space, taps) lifts  fire safety (visual alarms, refuge areas, phone links evac chairs) parking for blue badge holders (marked out) adjustable equipment (flip charts etc) assistive technology support dogs governance, recruitment and employment staff training
 
legal matters ,[object Object],[object Object],[object Object],[object Object]
key areas of law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],health and safety
health and safety health and safety  at work act working at heights regulations coshh  control of substances hazardous to health gas safety electrical safety regulations (periodic/pat tests) regulatory reform act (fire safety) puwer  provision and use of work equipment regulations   first aid provision / first aid kits / accident books riddor  reporting of incidents, diseases and dangerous occurrences regulations hse/cqc - powers to close buildings down health and safety
health and safety   health and safety  should be principled  rather than pragmatic  duty of care
risk assessments general risk assessments looking at all aspects of safety vdu risk assessments  h lone working risk assessments (need to consider cleaners or maintenance staff) fire risk assessments / fire evacuation procedures  h (prevention, evacuation, fire suppression and need to include risks to fire fighters and other property nearby) fire refuge points are deemed as places of relative safety individual risk assessments should be conducted for disabled people, younger people and pregnant women
risk assessments hazard:  anything with potential to cause harm risk:  the likelihood of the hazard causing harm a) identify hazards that could affect anyone b) assess the risk of occurrence c) evaluate the severity of the outcome d) eliminate the hazard if possible or  reduce them to the lowest level of risk possible step by step look for the hazard > decide who might be harmed and how > evaluate the risk arising from the hazard and decide if existing measures are adequate or should more be done >  record your findings and inform people  > review and update
risk assessments risk assessments should enable one size does not fit all - be adaptable it can be hard to be objective about something you use every day develop an organisational workplan in relation to  h &s  have a plan ‘b’ (business continuity measures and insurance)
business continuity disaster recovery usually relates to IT systems and buildings business continuity plan focuses on being able to provide services (human resources - financial management) disasters fall into three categories   value of data: can you operate without email for a day (or week) what if all your accounting data is lost what if your entire client list is lost
business continuity disaster recovery usually relates to IT systems and buildings business continuity plan focuses on being able to provide services (human resources - financial management) disasters fall into three categories   natural disasters -  hurricanes, earthquakes, etc technical disasters -  hardware failure, power cuts human disasters -  disgruntled employee, virus etc fire can fall into any of the three   value of data: can you operate without email for a day (or week) what if all your accounting data is lost what if your entire client list is lost
plans should consider  physical destruction (fire, flood damage, earthquake) data destruction (system failures, hackers) where to start... prevention - fire fighting equipment, structural surveys, backing up data, secure networks, using anti virus. create a contact list covering... staff, tenants, it professionals, emergency services, utility companies, plumbers, electricians, glaziers and other contractors  business continuity
decide what is critical to the organisation what order to restore back up systems or make repairs keep an assets register include serial numbers and activation codes keep all this information off site (ideally with two people)  test your plan - data etc make sure contacts are updated  business continuity
let’s do lunch
one of the biggest issues buildings encounter  unless you know who is responsible for doing a repair then it generally doesn’t get done who’s job is it to report repairs  don’t assume you can maintain a building ‘on the cheap’ broken windows develop a maintenance plan (include time scale and anticipated costs)  painting and decorating/carpet replacement/window cleaning   building maintenance
use maintenance as an opportunity to make improvements  should consider environment / access (lighting/decorating/taps) as you repair and replace undertake regular maintenance checks  ‘walkrounds’ / develop workplans  know the location of fuse boxes / meters / water stopcocks / keep records  (keys / master codes / paint colours)   keep an up to date list of contractors  try to build a relationship with them electricians / plumbers / window cleaners / carpet cleaners / glaziers / fire fighting equipment / cleaning consumables / it support / telephone contractors / water companies / fire alarms / burglar alarms / locksmiths / decorators / heating engineers / plasterers / catering suppliers / flooring specialists / automatic doors / audio visual repairs / joiners / vending machines / gas engineers / pest control / waste management and  recycling / sewerage and drains / signs  / hygiene suppliers  / lift maintenance /  roofers / office systems  maintenance will become increasingly technical building maintenance
integrated systems  “ wi-fi   is going to be the fourth utility…landlords need to view it that way and are increasingly doing just that.” Bob Cringle  open standards like oBIX are just beginning to evolve and will likely break down the silos between building systems ranging from security to lift controls open standards like oBIX are just beginning to evolve and will likely break down the silos between building systems ranging from security to lift controls
well being and comfort security and safety energy performance human - building interaction information and communication   integrated systems
jhghjg SENSORS &  ALARMS INTRUSION DETECTION
jhghjg SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT
jhghjg CCTV SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS EMERGENCY COMMUNICATION ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS EMERGENCY COMMUNICATION ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],integrated systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],environmental impact
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],environmental impact
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],funding
[object Object],sustainable income
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],sustainable income
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],sustainable income
 
[object Object],[object Object],[object Object],[object Object],connecting... with communities
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],connecting... with communities
connecting... with stakeholders
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],evaluation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],summary
online toolkits
publications
useful links

Weitere ähnliche Inhalte

Ähnlich wie Buildings

Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfBilal Ahmad
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docxDarkKnight367793
 
Discussion Command and Control ArchitectureNow that you hav.docx
Discussion Command and Control ArchitectureNow that you hav.docxDiscussion Command and Control ArchitectureNow that you hav.docx
Discussion Command and Control ArchitectureNow that you hav.docxmadlynplamondon
 
Take Location Intelligence Into the Field With Easy-to-Build Mobile Apps
Take Location Intelligence Into the Field With Easy-to-Build Mobile AppsTake Location Intelligence Into the Field With Easy-to-Build Mobile Apps
Take Location Intelligence Into the Field With Easy-to-Build Mobile AppsPrecisely
 
01 facility management definition and scope opt
01   facility management definition and scope opt01   facility management definition and scope opt
01 facility management definition and scope optArya Wirabhuana
 
Access Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxAccess Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxMarcelPitelli1
 
Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010Agora Group
 
a) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdfa) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdfanushafashions
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
Showcase Begin With The End In Mind
Showcase   Begin With The End In MindShowcase   Begin With The End In Mind
Showcase Begin With The End In Mindbmenden52
 
Digital Transformation by William Poos
Digital Transformation by William PoosDigital Transformation by William Poos
Digital Transformation by William PoosNRB
 
Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safetytim_owen
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Knowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementKnowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementAmr El-Ganainy
 

Ähnlich wie Buildings (20)

Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
 
PPT for CEO.pptx
PPT for CEO.pptxPPT for CEO.pptx
PPT for CEO.pptx
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docx
 
Discussion Command and Control ArchitectureNow that you hav.docx
Discussion Command and Control ArchitectureNow that you hav.docxDiscussion Command and Control ArchitectureNow that you hav.docx
Discussion Command and Control ArchitectureNow that you hav.docx
 
Take Location Intelligence Into the Field With Easy-to-Build Mobile Apps
Take Location Intelligence Into the Field With Easy-to-Build Mobile AppsTake Location Intelligence Into the Field With Easy-to-Build Mobile Apps
Take Location Intelligence Into the Field With Easy-to-Build Mobile Apps
 
01 facility management definition and scope opt
01   facility management definition and scope opt01   facility management definition and scope opt
01 facility management definition and scope opt
 
S36169184
S36169184S36169184
S36169184
 
Access Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxAccess Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptx
 
Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010
 
a) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdfa) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdf
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Showcase Begin With The End In Mind
Showcase   Begin With The End In MindShowcase   Begin With The End In Mind
Showcase Begin With The End In Mind
 
Digital Transformation by William Poos
Digital Transformation by William PoosDigital Transformation by William Poos
Digital Transformation by William Poos
 
NAME's Appendix - H
NAME's Appendix - HNAME's Appendix - H
NAME's Appendix - H
 
Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safety
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Knowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementKnowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & Management
 
S3_List
S3_ListS3_List
S3_List
 

Mehr von kennylieske

Mehr von kennylieske (6)

Fire
FireFire
Fire
 
Wordpress
WordpressWordpress
Wordpress
 
Web2.0
Web2.0Web2.0
Web2.0
 
Healthsafe
HealthsafeHealthsafe
Healthsafe
 
FaBworkshop
FaBworkshopFaBworkshop
FaBworkshop
 
Technology
TechnologyTechnology
Technology
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Buildings

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. accessibility (h) things to consider when developing a disability access audit
  • 8. accessibility (h) things to consider when developing a disability access audit publicity (different formats / web design) signs (high visibility, wayfinder, braille, lowercase) entrance (tactile paving, doorbells, ramp gradients, automatic doors / door width, handrails, lighting, seating, contrasting colours, reception desk height) hearing loops (test them / consider overspilling) toilets (alarms, peninsula access, handrails, floor space, taps) lifts fire safety (visual alarms, refuge areas, phone links evac chairs) parking for blue badge holders (marked out) adjustable equipment (flip charts etc) assistive technology support dogs governance, recruitment and employment staff training
  • 9.  
  • 10.
  • 11.
  • 12. health and safety health and safety at work act working at heights regulations coshh control of substances hazardous to health gas safety electrical safety regulations (periodic/pat tests) regulatory reform act (fire safety) puwer provision and use of work equipment regulations first aid provision / first aid kits / accident books riddor reporting of incidents, diseases and dangerous occurrences regulations hse/cqc - powers to close buildings down health and safety
  • 13. health and safety health and safety should be principled rather than pragmatic duty of care
  • 14. risk assessments general risk assessments looking at all aspects of safety vdu risk assessments h lone working risk assessments (need to consider cleaners or maintenance staff) fire risk assessments / fire evacuation procedures h (prevention, evacuation, fire suppression and need to include risks to fire fighters and other property nearby) fire refuge points are deemed as places of relative safety individual risk assessments should be conducted for disabled people, younger people and pregnant women
  • 15. risk assessments hazard: anything with potential to cause harm risk: the likelihood of the hazard causing harm a) identify hazards that could affect anyone b) assess the risk of occurrence c) evaluate the severity of the outcome d) eliminate the hazard if possible or reduce them to the lowest level of risk possible step by step look for the hazard > decide who might be harmed and how > evaluate the risk arising from the hazard and decide if existing measures are adequate or should more be done > record your findings and inform people > review and update
  • 16. risk assessments risk assessments should enable one size does not fit all - be adaptable it can be hard to be objective about something you use every day develop an organisational workplan in relation to h &s have a plan ‘b’ (business continuity measures and insurance)
  • 17. business continuity disaster recovery usually relates to IT systems and buildings business continuity plan focuses on being able to provide services (human resources - financial management) disasters fall into three categories value of data: can you operate without email for a day (or week) what if all your accounting data is lost what if your entire client list is lost
  • 18. business continuity disaster recovery usually relates to IT systems and buildings business continuity plan focuses on being able to provide services (human resources - financial management) disasters fall into three categories natural disasters - hurricanes, earthquakes, etc technical disasters - hardware failure, power cuts human disasters - disgruntled employee, virus etc fire can fall into any of the three value of data: can you operate without email for a day (or week) what if all your accounting data is lost what if your entire client list is lost
  • 19. plans should consider physical destruction (fire, flood damage, earthquake) data destruction (system failures, hackers) where to start... prevention - fire fighting equipment, structural surveys, backing up data, secure networks, using anti virus. create a contact list covering... staff, tenants, it professionals, emergency services, utility companies, plumbers, electricians, glaziers and other contractors business continuity
  • 20. decide what is critical to the organisation what order to restore back up systems or make repairs keep an assets register include serial numbers and activation codes keep all this information off site (ideally with two people) test your plan - data etc make sure contacts are updated business continuity
  • 22. one of the biggest issues buildings encounter unless you know who is responsible for doing a repair then it generally doesn’t get done who’s job is it to report repairs don’t assume you can maintain a building ‘on the cheap’ broken windows develop a maintenance plan (include time scale and anticipated costs) painting and decorating/carpet replacement/window cleaning building maintenance
  • 23. use maintenance as an opportunity to make improvements should consider environment / access (lighting/decorating/taps) as you repair and replace undertake regular maintenance checks ‘walkrounds’ / develop workplans know the location of fuse boxes / meters / water stopcocks / keep records (keys / master codes / paint colours) keep an up to date list of contractors try to build a relationship with them electricians / plumbers / window cleaners / carpet cleaners / glaziers / fire fighting equipment / cleaning consumables / it support / telephone contractors / water companies / fire alarms / burglar alarms / locksmiths / decorators / heating engineers / plasterers / catering suppliers / flooring specialists / automatic doors / audio visual repairs / joiners / vending machines / gas engineers / pest control / waste management and recycling / sewerage and drains / signs / hygiene suppliers / lift maintenance / roofers / office systems maintenance will become increasingly technical building maintenance
  • 24. integrated systems “ wi-fi is going to be the fourth utility…landlords need to view it that way and are increasingly doing just that.” Bob Cringle open standards like oBIX are just beginning to evolve and will likely break down the silos between building systems ranging from security to lift controls open standards like oBIX are just beginning to evolve and will likely break down the silos between building systems ranging from security to lift controls
  • 25. well being and comfort security and safety energy performance human - building interaction information and communication integrated systems
  • 26. jhghjg SENSORS & ALARMS INTRUSION DETECTION
  • 27. jhghjg SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT
  • 28. jhghjg CCTV SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT
  • 29. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT Safety/Security Technologies
  • 30. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 31. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 32. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 33. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 34. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 35. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 36. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 37. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 38. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS EMERGENCY COMMUNICATION ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 39. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS EMERGENCY COMMUNICATION ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.  
  • 48.
  • 49.
  • 51.
  • 52.

Hinweis der Redaktion

  1. handouts