Software-based electric testing has been designed to support electrical engineering specialists in carrying out mandatory inspections. Timly helps companies keep track of dates, reports, and more.
BlogPuwer Regulation – Smart Inspection Period Management With Timly
Apr 21, 2023 | Maintenance Management
The HSE has issued the Provision and Use of Work Equipment Regulations 1998 (short: PUWER Regulation), which is the authoritative regulation for companies on the testing of electrical systems and equipment. In addition, there are more regulations which are almost identical in content, but is aimed at public institutions such as authorities.
BlogIntelligent Software Inspection via App: Very Simple With Timly
Apr 18, 2023 | Deadline Management, Maintenance Management
Well-organised software inspection is the basis of a stable IT infrastructure. However, the one-time installation of the operating system and required programmes is no longer sufficient. Important factors that need to be taken into account are licence periods, updates, bug fixes and security patches that need to be checked and applied regularly. With Timly you always stay up to date…
BlogCrane Inspection and Lifting Technology: How to Increase Safety With Timly
Apr 14, 2023 | Deadline Management, Safety Management
The strict regulations of the crane inspection take into account the dangers posed by improperly functioning lifting technology. In addition to the classic slewing tower cranes used on construction sites, this also applies to all devices for lifting loads. The reason is obvious: if loads fall in the working area of people, there is danger to life or at least the risk of serious accidents at work.
BlogTisax Certification and Digital Personnel File – Modern Personnel Management With Timly
Mar 23, 2023 | Maintenance Management
In terms of content, the TISAX certification was initially based on the well-known ISO IEC 27001 standard, which is one of the most established certifications in information security management. This standard regulates, for example, precautions to protect against data theft and misuse, encryption and access mechanisms and the ongoing monitoring of the integrity of the company’s own systems.
Blog