Browse by topic
- All terms
- Kaikki termit
- 3D Modelling and Visualisation
- Companies and Technology Providers
- Data Models and Documentation
- File Types and Formats
- Geospatial Information and Mapping
- Industrial Internet and Real-Time Monitoring
- Industrial Solutions and Design
- Information Technology and Software
- Measurement and Data Collection
- Processes and Methods
- Project Management and Collaboration
- Safety and Standardisation
- XR Technologies and Immersive Solutions
Construction Site Monitoring
Construction site monitoring refers to the continuous supervision and documentation of activities at a construction or production site. Its aim is to ensure that the work progresses according to plans, […]
Read moreKKS System
(Kraftwerk-Kennzeichnungssystem) is a standardised identification system for equipment and systems in power plants and industrial facilities. It provides a consistent and hierarchical naming structure that facilitates the design, construction, maintenance, […]
Read moreLockout-Tagout Cards
Lockout-tagout (LOTO) cards are a key component of safety protocols designed to protect workers from hazardous energy sources during maintenance and servicing tasks. These cards contain detailed instructions on how […]
Read moreLOD (Level of Detail), Measurement Accuracy Levels
LOD, or Level of Detail (or in some contexts Level of Development), is a scale used in construction and industrial modeling to describe the accuracy and information richness of a […]
Read moreSafety Observation
Safety observation is a systematic process in which data is collected, analysed and reported to assess the safety conditions of a working environment. Its objective is to identify potential hazards, […]
Read moreSafety Protocol
A safety protocol is a set of rules and procedures that protect communications, systems and data from unauthorised access, manipulation or data breaches. Common cybersecurity protocols include HTTPS (secure communication […]
Read moreSafety Standards
Safety standards are formal guidelines and best practices that define how information security and risk management should be implemented across different systems and organisations. Well-known standards include ISO/IEC 27001 (information […]
Read more