Skip to main page content

Richard Broome

Managing Director
LSBUD

Sessions in which Richard Broome attends

martes 22 marzo, 2022

Zona horaria: (GMT-05:00) Eastern Time (US & Canada)
10:00
10:00 - 10:30 | 30 minutos

The 2012 DT-DICT (Building without destroying) reform in France aims to prevent damage to utility networks. This legislation places heavy constraints on stakeholders because it requires them to georeference all networks in the vicinity of construction work with centimetric accuracy by 2032, everywhere in the country. Patrice Lemire, CEO ...

10:45
10:45 - 11:15 | 30 minutos

Albeit industry efforts, over 1 million underground utilities are annually hit around the world, with estimated damages exceeding $100 billion, not considering billions invested in technologies and inefficient processes aimed to protect utilities during earthworks operations. Available utility data is usually unreliable, and even if data is accurate, the excavator operator may still damage a utility.  

13:00
13:00 - 13:30 | 30 minutos

As the world continues to grow and urbanize, new urban infrastructure is being constructed at an unprecedented rate while old world infrastructure is being replaced and upgraded.  This has lead to a greater demand for accurate and current utility locating and mapping. This demand is further exacerbated by the fact that infrastructure construction costs continue to rise and the slightest delay or extra cost associated with insufficient utility locating has an...

16:00
16:00 - 16:45 | 45 minutos

Abstract:The total cost of underground infrastructure damage in Canada during excavation work is estimated to be over $1 billion dollars annually. The primary cause of these damage incidents is the lack of reliable information on the location and other information about buried utilities and other infrastructure. The Canadian Underground Infrastructure Register project is intended to improve the current damage prevention process by providing access to reliable data t...

miércoles 23 marzo, 2022

Zona horaria: (GMT-05:00) Eastern Time (US & Canada)
10:00
10:00 - 10:30 | 30 minutos

In Singapore, almost all utilities are buried underground to free up valuable above ground space for more liveable environment. These underground assets which consist of power cables, telecommunication lines, water pipes, gas pipes and wastewater networks are critical infrastructure that keep our city functioning.  Most cities have not been able to keep reliable, complete, and up-to-date maps of their underground utilities due t...

10:45
10:45 - 11:15 | 30 minutos

Synopsis: The UK National Underground Asset Register has gone through rigorous pilot and preparation phases and has learned a lot about the data which we will share for 3 regions before a national roll out. However, despite all the best laid plans there will always be exceptions and unexpected scenarios which will need to either be fitted into the data model or have the data model change in order to fit them. The way in which we make these changes could make or break a project like this wh...

11:30
11:30 - 12:00 | 30 minutos

Utility and energy buried pipelines represent an extensive underground network covering most of a country's territory. Their precise lateral, horizontal positioning along with their depth of cover is a critical element of any operator's GIS. It enables to deploy more accurate pipeline predictive maintenance models and avoid third party interferences. The latter being identified as one of the main causes of pipeline failures. The 2020 CGA Dirt report states that 3...

martes 16 mayo, 2023

Zona horaria: (GMT-05:00) Eastern Time (US & Canada)
15:15
15:15 - 15:45 | 30 minutos

CUIR is a portal solution that will allow the owners of buried infrastructure to exchange information with firms requesting the nature and location of buried assets bounded within the area outlined in a One Call ticket. Unlike a central database, the CUIR process does not provide anyone access to the owners database, but rather allows the owner to receive the request and push the data to the requestor thus preventing any external party access to their database.This process will also...