Information Technology
Tools. Energy. Community.
T.E.C. has been instrumental, essential, to helping us achieve one of the industry’s highest success rates when it comes to finishing on time and under budget. More importantly, it’s also responsible for helping our clients and associates increase their operating efficiency to new levels.
More than 20 years ago, shortly after Pacific West opened, when most general contractors kept project information on paper or the occasional Excel spreadsheet, we created a division to create a networked construction management application.
The fruits of those labors have come in the form of two proprietary programs: tecxc.com and OwnerCare. Collectively, we refer to our overall approach to information technology as T.E.C. (Tools, Energy, Community).
T.E.C. has helped enhance the efficiency of every aspect in the building process, particularly construction management, risk management, quality assurance, and warranty services.
T.E.C. allows us to connect with our clients and other project partners over an easy-to-use, 24/7, integrated platform operating in real-time over the internet.
T.E.C. incorporates industry-leading software, including:
- Primavera™ Time Management Software
- Sage Precision Estimating by Oracle
- Sage Accounting by Oracle
- AutoCAD
- Autodesk Revit
- Autodesk BIM
- MiTek Virtual Plant Software
- Exaktime Payroll System
- PlanGrid
Custom applications supercharge:
- Estimating
- Scheduling
- Quality Assurance
- Off-site Assembly and Manufacturing
- Accounting
- Purchasing
- Project Management
- Construction Techniques
Privacy. Security.
The exchange of information is fundamental to successful construction management. By using our web-based platform, we’re able to give everyone involved immediate access to all relevant information. Instantaneously.
Equal to that efficiency is our system’s integrity. Pacific West’s IT/T.E.C program is protected by an Information Security Policy that supports the strategic aims of the business and financial communities, and is committed to maintaining and improving information security. Sophisticated policies and processes are built in to ensure confidentiality of both corporate and client information, while protecting against unauthorized access.