Inspection companies are now forced to use a two-step “acquire and archive” inspection process. As we have seen, this means the inspector may perform up to 1 hour of data archiving and the logistic around it for each day of acquisition. Unfortunately, the operational expense losses for inspection companies do not end there. An additional component that comes into play in this new process is the media used to store the data itself, namely, the USB key.
This post explains how the use of seemingly low-cost USB keys ends up significantly impacting inspection companies’ operating expenses (OPEX).
Granted, USB keys have gotten extremely cheap over the years. This makes it hard to believe that they may have any significant impact on the overall business. However, the problem resides in the collateral damage they cause. To better understand this, let’s review a typical inspection and file management process.
Step 1) Inspectors use NDT equipment to acquire the data, which they store on USB keys.
Step 2) Each file gets indexed properly, using tags such as client name, asset, site section, component, and contract number.
Step 3) Unconnect properly the key.
Step 4) Each USB key is stored in a secured location (inspectors may use up to a dozen USB keys per day).
Step 5) At the end of each day, inspectors leave the site and go to where they can access a PC (a trailer, most frequently).
Step 6) They then copy all of the inspection files from each USB key onto the PC.
Step 7) Once the PC is connected to a secure data server or cloud solution, they take every file they have recorded and archive all of them.
This last step might be done at the end of each day or once a week when data has been sorted and analysed.
Circling back to the point about collateral damage, we can see that almost each step in the process brings its own element of risk. For example, the inspector may miss a weld on a pipeline (Step 1), get the file indexing wrong (Step 2), use the same USB key twice and overwrite the existing data (Step 6), forget to copy the content of a key (Step 7), or he may even lose a key altogether.
In all of these cases, a common consequence is that inspectors must return to the inspection site and perform an acquisition for the second time. This means the inspection company has to cover wages and travel expenses twice for the same component.
From an operational standpoint, extra time will also be required to rework the schedule and ensure that sending an inspector back to a previous site does not put another project’s schedule at risk. This is not an easy task, especially considering the shortage of qualified and reliable inspectors available on the market.
Combined, all of these factors quickly eat up profit margins and, in the worst situation, can even lead to a contract breach.
Disrupting the legacy file management process
Thanks to the rapid evolution of mobile infrastructure and cloud technologies, inspection companies that are willing to explore solutions to this file management problem now have a few solutions available to them. The core idea behind all of these solutions is to automate the legacy, manipulation-intensive process described above and reduce the number of steps in order to proportionally reduce risk.
Since each solution has its pros and cons, Amotus Solutions is currently putting together a comparison chart to help guide the decision-making process.
If you would like to receive a copy, please send us an email at firstname.lastname@example.org with the subject line “Comparison Chart”, and we will make sure to send you a copy when it becomes available.
To know more about this news process come see us at the ASNT annual conference booth 828. Long beach, 24 to 27 October.
Follow us on “twitter@ LinkedIn” to get your “Free ROI study”
Did you enjoy this article?
We respect your privacy and will never share your information with third parties.