Musterd is an evacuation management and emergency roll-call system.
Using software, smartphone and cloud technology, Musterd ensures the safety of all personnel on a physical site during an emergency. Know who's where, when.
Musterd integrates with your access control system, so it stays informed about the up-to-date locations of all people on your site -- in real-time.
Musterd uses fast, secure communications to synchronize this data across a network of hand-held Musterd devices. In an emergency, any Musterd device can instantly produce a list of 'unsafe' people for roll-call, mustering and rescue operations – even if your access control system has been disabled.
Musterd operates across your whole site, and manages combined, real-time 'safe' and 'unsafe' lists of your personnel. If anyone hasn't reported for roll-call at a Musterd device, then Musterd tells you where they might be found.
When an emergency strikes, Musterd ensures the safety of your personnel. By giving safety teams a real-time view of site personnel location and safety status, Musterd tells you where your people are to be found, who's safe and who's not.
Musterd hand-held devices manage evacuations and roll-calls in real time, as an emergency unfolds.
Musterd is built to survive. In an emergency, Musterd continues to work after the power fails, the network has crashed or the access control system has been disabled.
Musterd’s Cloud Support and real-time updates allow Musterd to “go it alone”, continuing to protect personnel by providing last known locations even when critical infrastructure is damaged
If WiFi fails, then Musterd automatically switches to the local GSM / Mobile Phone Network
Musterd hand-held devices remove the need for printed lists or network-dependent technology. Musterd works even when printers or other systems are jammed, disconnected or out of reach
Musterd works with many types of emergencies, and more than one simultaneously:
Musterd doesn't sleep. Day and night, Musterd stays in touch with your access control, capturing the data it needs to build a complete picture of your personnel and where to find them.
Musterd is designed to enhance the safety of personnel on any site.
Printing roll call reports was slow and unreliable, especially in emergencies. Musterd seamlessly integrates with our access control system, and provides a reliable, cloud-based solution to our mustering problems.Coveris
I can’t speak highly enough of the team; we receive a level of “Service and Support” from Thinking Software which is exemplary, they’re in a league of their own.Mandy Maxwell, Albert Bartletts
We’ve enjoyed working with Thinking Software – we would certainly recommend them – and we look forward to their help in meeting our needs as we expand Somerset Care.Keith Crockett, Somerset Care
Over the years we have established strong links with named Thinking Software staff, some of whom have been with us since inception, the support staff at Thinking Software are always promptly available online and by phone to helpSteve Carthew, Crealy Adventure Park
We hadn’t anticipated all the planning problems we’d face, but lucky for us, the trainers and developers at Thinking Software stayed with us and solved the problems as they aroseWilliam Brannan, Glasgow Science Centre
Frankly – I love Thinking Software!Lindsay Southward, Malmaison & Hotel du Vin
We love working with Thinking Software, and we wouldn’t hesitate to recommend them to any business looking to save time and money.Heather Jones, Holiday Inn
Musterd is an Evacuation and Roll-Call System. It’s designed to help people assemble and stay safe in a Fire or other Emergency.
Musterd watches your access control and knows where everybody is at any time. So if there’s an emergency, Musterd can improve your Roll-Call process and help you find anyone who’s missing.
Musterd uses a small, read-only service component to watch your access control system and capture the events it needs to keep in step with the location of the personnel on your site.
If your site is suddenly disabled by loss of power or network, Musterd will know the locations of your personnel at the moment of failure. Musterd then "goes it alone", helping Fire Marshals and Rescue Teams to assemble your personnel and monitor their safety at your site's muster and assembly points.
Musterd has a Manual Make-Safe option to cover personnel who’ve lost or forgotten their access control fobs.
Musterd can operate in sites of any size.
Musterd is suitable for nearly any sort of site -- factories, offices, retail or service businesses, warehousing, production or distribution facilities -- in fact, any place in which a smartphone is safe for business use.
The cost of a Musterd System is based on the number of people on your site, together with the number of Musterd-enabled, hand-held Devices you decide to deploy (the general rule is one Device per muster point).
Please contact us for a quick estimate of your cost to get Musterd into operation at your site.
(based on the Diagram) and security of data
This diagram represents the boundaries of a typical Site. A Musterd System is built on various on-Site and off-Site elements, including:
The Musterd Monitor Service (MMS) is a standard Windows Service, and is generally installed on the same hardware which hosts the Access Control Server (ACS). The MMS listens for "changes" on the ACS (by changes, we mean new Access Events, or alterations in Personnel Details or Access Control configuration). When the MMS senses change(s) in the ACS, it collects and pushes them into the Musterd Cloud Database (MCD), which is the SQL Server Database residing in the Microsoft Azure Cloud in the Diagram.
These are for communication between WEMDs and MCS only.
Due to the nature and size of the data being transferred, Bandwidth usage is minimal. Data is densely packed by a proprietary serialisation technique, and the packet size is adjustable to accommodate for particular network conditions. This functionality has been tested with packet sizes between 512 bytes up to 64 KB. The default packet size is 16 KB, which means that one request will return with a quantity of data not greater than this.
Musterd’s initial synchronisation with the ACS will require more bandwidth, but this is effectively a one-off operation. After synchronisation, only changes of relevant data in the ACS are transferred to the MCS, and this normal runtime operation uses very little bandwidth. For example, a single Access Event (one person’s swipe of a credential on an Access Control Reader) generates around 128 bytes of traffic. Access Events are responsible for 99% of communications traffic.
Thinking Software is a committed, innovative supplier of Workforce Management and Time and Attendance solutions, founded in 1994.
Our clients rely on us to provide systems which improve the safety of their personnel, as well as robust time and attendance monitoring, human resources compliance and workforce resource planning.
Used by numerous businesses around the globe, Thinking Software helps its clients keep costs down, improve efficiency and enhance business performance.
With our combined expertise in software design and customer support we serve a wide range of sectors including hospitality, leisure and entertainment, care providers, manufacturers, construction sites, local authorities and education, retail and services.
At Thinking Software, we are committed to safeguarding and preserving the privacy of our visitors
We update this Policy from time to time, so please review this Policy regularly.
Information We Collect
In running and maintaining our website we may collect and process the following data about you:
We may gather information about your general internet use by using the cookie. Where used, these cookies are downloaded to your computer and stored on the computer’s hard drive. Such information will not identify you personally. It is statistical data. This statistical data does not identify any personal details whatsoever.
You can adjust the settings on your computer to decline any cookies if you wish. This can easily be done by activating the reject cookies setting on your computer.
Use of Your Information
We use the information that we collect from you to provide our services to you. In addition to this we may use the information for one or more of the following purposes:
If you have previously purchased goods or services from us we may provide to you details of similar goods or services, or other goods and services, that you may be interested in.
Where your consent has been provided in advance we may allow selected third parties to use your data to enable them to provide you with information regarding unrelated goods and services which we believe may interest you. Where such consent has been provided it can be withdrawn by you at any time.
Storing Your Personal Data
In operating our website it may become necessary to transfer data that we collect from you to locations outside of the European Union for processing and storing. By providing your personal data to us, you agree to this transfer, storing or processing. We do our upmost to ensure that all reasonable steps are taken to make sure that your data is treated stored securely.
Unfortunately the sending of information via the internet is not totally secure and on occasion such information can be intercepted. We cannot guarantee the security of data that you choose to send us electronically, Sending such information is entirely at your own risk.
Disclosing Your Information
Third Party Links
Access to Information
In accordance with the Data Protection Act 1998 you have the right to access any information that we hold relating to you. Please note that we reserve the right to charge a fee of £10 to cover costs incurred by us in providing you with the information.
Nullam id dolor id nibh ultricies vehicula ut id elit. Donec sed odio dui. Etiam porta sem malesuada magna mollis euismod. Donec id elit non mi porta gravida at eget metus. Sed posuere consectetur est at lobortis. Etiam porta sem malesuada magna mollis euismod. Sed posuere consectetur est at lobortis.
Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Maecenas sed diam eget risus varius blandit sit amet non magna. Nullam quis risus eget urna mollis ornare vel eu leo. Integer posuere erat a ante venenatis dapibus posuere velit aliquet.