TESTING ON INTERNET EXPLORER 11
We are in the process of testing Riskenomics in Internet Explorer 11 and can report that all is working well. We have not come across any issues, so are quietly hopeful that the final stages of testing will also proceed smoothly.
Riskenomics Release 5 is now available! It provides the following new features:
SUPPORT FOR IE10
Riskenomics 5 now supports Internet Explorer 10 making the dependency modelling experience even faster and compatible with the latest release from Microsoft.
METADATA AND WORKFLOW GRIDS
The new metadata and workflow grids allow us to capture even more data without impacting the speed or performance of the platform.
ENHANCED DUE DATE SCHEDULING (DDS)
The use of DDS is really coming to the fore, especially in the compliance world where timely reminders and alerts are very much welcomed.
The enhancements to the DDS system include capturing ‘Remedial’ issues following a statutory inspection. Failure to adequately manage Remedial issues following a compliance inspection can result in the certificates being classed as null and void, leaving clients exposed.
DDS ANNIVERSARY SCHEDULING
DDS scheduled events can now be adjusted from the anniversary of the last visit. So, if an inspection takes place 4 weeks early or late, all subsequent visits can be adjusted accordingly, preserving the integrity of the schedule.
LIVE FEEDS
The automatic population of models is required more and more. In response to this we have developed a range of techniques to receive data securely including imports via email, FTP, SFTP and even manual uploads of spreadsheets and CSV files.
We can also actively collect data from site by parsing XML pages presented by BMS or Power Monitoring Systems.
NEW AJAX MODULE
For the techies amongst you, our new AJAX module has greatly improved the speed and performance of Riskenomics!
The following features are now available with Riskenomics 4.4
WINDOWS 8 AND INTERNET EXPLORER 10
Riskenomics has been successfully tested on Microsoft’s new releases – Windows 8 and Internet Explorer 10.
All is working as it should be!
DUE DATE SCHEDULING
Riskenomics allows automatic email alerts for key activities such as statutory compliance. Enter 3 levels of email escalation triggered by dates and times set by the user. For example send a ‘Green’ reminder when an activity is due for renewal or completion. Send an Amber alert to a wider audience if the deadline is getting close and finally send a ‘Red’ alert when deadlines have been missed.
WORKFLOW REPEATS
If workflow events are a regular occurrence such as compliance visits simply generate future workflows automatically.
WORKFLOW COPY AND PASTE
If workflows contain similar details save time by copying and pasting the entire content of the workflow including DDS information.
CAPTURE REMEDIAL WORKS
When it comes to keeping compliant with statutory and regulatory obligations it is all too easy to forget the remedial works that must be complete to ensure the system remains compliant. Riskenomics Workflows now enable the capture and management of Remedial issues.
WORKFLOW QUERY WINDOW
Using Workflows extensively for compliance and other activities generates a lot of workflow records. The Workflow Query Window allows the user to filter the Workflow window to show Red, Amber or Green items as well as filtering over date ranges and by the First, Second and Final alert dates. This is a very powerful feature for seeing which activities will be up for renewal in the coming period.
EXCEL EXPORT
Export both the Metadata data grid and the Workflow data grid into Excel. Manipulate the data within Excel and simply upload the results back into Riskenomics to update the models.
EXPORT EMAIL LOG
With Riskenomics generating email alerts the Email Log generates an Excel spreadsheet report of all emails generated by the system – useful at audit time!
CUSTOM FILTER PDF REPORTS
Take the standard Riskenomics PDF and apply your own filters and sorting requirements to generate a report which contains all the information you need.
DASHBOARD MODULE
Riskenomics now has an optional comprehensive dashboard module enabling the construction of bespoke management information dashboards generated by the wealth of data within Riskenomics and other sources such as spreadsheets.
LIVE FEEDS AND LIVE FEED MONITOR
Riskenomics now supports the collection and integration of live feed data. Both operational risk and capacity risk values can be updated by state changes from the physical controllers.
MICROSOFT BING CONSOLE PAGE
The opening page of Riskenomics now includes the Microsoft Bing mapping interface. Pins showing the operational and capacity risk status for each model are placed in their respective location to provide an overview of the status of models within Riskenomics. To open a model simply click on the pin! The console page also includes risk Summaries which are pie charts generated for the actual model or all of the models with a pin on the map
‘CHECKED OUT BY’ IDENTIFICATION
Existing customers will appreciate this – the name of the person who has checked out a model is now displayed – just in case they forgot to check in the model
‘CHECK IN MODEL’ PROMPT
No excuses for keeping a model checked out now as Riskenomics prompts the user when exiting the system.
MODEL LEVEL ACCESS CONTROL
Administrators can now assign users access to selected models only. After logging in to Riskenomics the user will see only those regions, folders and models that have been assigned to the user.
SINGLE LOGIN MULTI DATABASE ACCESS
Some Riskenomics users have multiple databases for multiple clients or multiple business units. In the past that meant separate logins for each database – we now have the ability to do this from a single login and the user can select the database they wish to enter.
REGIONAL ZONES
As an enhancement of the multi-database access we can also assign permissions on a ‘zone’ basis. Each database is assigned to a zone so a user can have full access rights to their primary zone but they can also have read-only access to other zones within the Riskenomics environment. This enables controlled monitoring of all activity within the system without compromising security.