Forensic Analytics Indiana University

Size: px
Start display at page:

Download "Forensic Analytics Indiana University"

Transcription

1 Forensic Analytics Indiana University Kirk Petrie Senior Manager Carol Tannous Senior Manager November 12, 2014 Deloitte Transactions and Business Analytics LLP Copyright 2014 Deloitte Development LLC. All rights reserved. 0

2 Agenda 1. An Overview of Fraud 2. Forensic Analysis 3. Future of Forensic Analytics 4. Analytics In Action: Case Studies in Forensics Copyright 2014 Deloitte Development LLC. All rights reserved. 1

3 An Overview of Fraud Major fraud types Copyright 2014 Deloitte Development LLC. All rights reserved. 2

4 ACFE study recognizes high impact of fraud Economic stress can lead to global fraud problems. [ACFE Global Fraud] Survey participants estimated that the typical organization loses 5% of revenues each year to fraud. If applied to the 2013 estimated Gross World Product, this translates to a potential projected global fraud loss of nearly $3.7 trillion. This can result in increased pressure on professionals to meet earnings targets and increase risk of misappropriation of assets due to layoffs and cost cutting measures. The median duration the amount of time from when the fraud commenced until it was detected for the fraud cases reported to us was 18 months. 1 1 Association of Certified Fraud Examiners (ACFE) Reports to the Nations, 2014 Copyright 2014 Deloitte Development LLC. All rights reserved. 3

5 Fraud In the News Fraud and misuse occurs across industries BNP Paribas faces fine of more than $10bn in US sanctions investigation Wal-Mart Forecasts More Than $200M in FCPA Costs Sources: The Wall Street Journal, The Guardian, Reuters Copyright 2014 Deloitte Development LLC. All rights reserved. 4

6 Misappropriation: Vendor (Business Partner) Fraud Leveraging access to payments to misdirect funds Variety of schemes where employees who are entrusted to manage the funds of an organization steal from it. Ghost Vendors Fraudster creating and making payments to a fictitious vendor Disbursement Schemes Distribution of funds in overbilling or other unauthorized disbursement schemes Conflict of Interest Employee-to-vendor or vendor-to-vendor relationship that may result in preferential treatment Difficult to detect due to lack of data Poor or non-existent record keeping of the business partner Vague or scarce detail on invoices or other supporting information Unrecorded communications, such as calls or text messages to mobile phones, between staff and business partners Supply chain staff not taking vacations or holidays, thereby leaving others in charge of day-to-day tasks Copyright 2014 Deloitte Development LLC. All rights reserved. 5

7 Corruption: The Foreign Corrupt Practices Act Vendor fraud and improper deal making on a global scale Enacted in 1977 and amended in 1998, prohibits a U.S. person to make a payment to a foreign official for the purpose of obtaining or retaining business for or with, or directing business to, another person. Applies to foreign firms and persons who act in furtherance of such corrupt payments while in the United States. Specifies no materiality, making it illegal to offer anything of value as a bribe, including cash or non-cash items Distinguishes between bribery and facilitation payments as long as permitted under laws of the host country Settlements are becoming costly December 2008: Siemens 1 $800 Million Highest ever January 2009: KBR/Halliburton 2 $579 Million Highest for a U.S. company Rising Input Costs + Domestic Market Saturation = Pressure to Globalize Operations 1 Copyright 2014 Deloitte Development LLC. All rights reserved

8 Financial Statement Fraud: Revenue Manipulation Manipulating earnings across many levels of the organization Deliberate misrepresentation or omission designed to provide a false sense of stability in an organization s financial position. Can take many forms and initiated at various levels of the supply chain: Invoice and returns manipulation: Suspicious patterns of returns or credits occurring directly after fiscal quarter or year-ends Channel stuffing: Evidence of higher discounts or returns post quarter end. Profile data by product and customer groups to see outliers. Fictitious sales: Unusual patterns of inventory movement or sales entries Bill and Hold: Evidence of customer inventory being stored in warehouse Refreshing Receivables: Re-invoicing and manipulation of receivables Difficult to detect because perpetrated at different levels of the supply chain (including C-suite) and the goal is often only to maintain an image of financial stability. Copyright 2014 Deloitte Development LLC. All rights reserved. 7

9 Industry-Specific Fraud Forged identities, counterfeit products, hacking, and theft Telecommunications Financial Services Counterfeit, cloned, and stolen credit cards (US leads the world) Money laundering Mortgage fraud Impersonation for credit loans Electronic check deposit / mobile deposit fraud Toll fraud to compromise security (hack) a PBX system Bypass fraud / denial of service attacks E-Commerce and Retail Forged identity for internet transactions / identity theft Stolen goods Counterfeit goods (especially electronics) Procurement fraud Returns and warranty fraud Public Sector Social welfare fraud Regulatory filing and securities fraud Tax payer fraud Contracting and misuse fraud Life Sciences Drug counterfeiting Off-label drug marketing Clinical trial fraud Medical identity theft Automotive and Industrial Identity verification on loan applications Warranty fraud Repair fraud Supply chain fraud, especially in overseas locations Copyright 2014 Deloitte Development LLC. All rights reserved. 8

10 Potential Challenges to Combat Fraud Cost constraints vs. technology and business needs Lack of interface to financial and reporting systems Multiple accounting systems How do I run my tests on SAP? Oracle? Challenges in procuring data Reduced staff and budgets Demand for increased cost effectiveness Driving more value out of testing procedures (automated versus manual review) Aim for comprehensive review of macro- and micro-level issues Affordability of a technology solution Need for tools to capture, reconcile, analyze, and report data Data security and confidentiality Very large volumes of data, often over a variety of systems Custom solution or out of the box? Global versus domestic scope Need to identify areas and countries of focus Lack of understanding of local customs, languages, and practices Copyright 2014 Deloitte Development LLC. All rights reserved. 9

11 Section 2: Forensic Analytics Introduction to Forensic Analytics Copyright 2014 Deloitte Development LLC. All rights reserved. 10

12 Analytics in the News Stretching across industries and functions Sources: Copyright 2014 Deloitte Development LLC. All rights reserved. 11

13 Approach to Forensic Analytics From identification through analysis 1 DATA IDENTIFICATION Mapping of Electronically Stored Information (ESI) Identification of structured and unstructured data Identify relevant thirdparty data 2 Structured Data FORENSIC COLLECTION ETL Collect data using forensic preservation standards Maintain chain of custody Perform data integrity check to compare completeness 3 Use temporal and entity keys to integrate structured and unstructured data Superimpose data sets to derive context Unstructured Data DATA FUSION 4 Discovery Continuum FORENSIC ANALYTICS Apply rules-based detection on 100% of transaction data to identify anomalies (fraud, terrorism threats, etc.) Develop statisticallybased models to identify previously unknown patterns Optimize anomaly detection rule sets through a feedback loop New Patterns Risk-Ranked, Anomalous Data Sets Copyright 2014 Deloitte Development LLC. All rights reserved. 12

14 Flavors of Fraud Analytics Techniques A variety of approaches for a variety of findings Predictive Modeling Applying statistical techniques to develop probabilistic outcomes and projections on data sets. Anomaly Detection Applying previously known rules as a look-back against transactional data sets to identify anomalous behaviors. Network Analysis Discover associations between entities to identify potential fraud networks and other collusive behavior. Geospatial Analysis Adding spatial operations enhances analytics with an additional dimension based on geospatial patterns, relationships, and inferences. Text Analysis Analyzing unstructured data for sentiments, common themes, relationship. Copyright 2014 Deloitte Development LLC. All rights reserved. 13

15 Predictive Analysis Applying statistical and machine-learning techniques to develop probabilistic outcomes and projections on data sets. Adapt to evolving schemes Not based on prior knowledge/patterns Supervised approach addresses known and hidden patterns Unsupervised approach identifies new and emerging patterns Supervised Modeling Regression: Discover complex patterns in historical data with models that describe how fraud is related to one or more other factors using mathematical equations. Clustering: Identify patterns that are inconsistent with normal activity with statistical profiling. Unsupervised Modeling Copyright 2014 Deloitte Development LLC. All rights reserved. 14

16 Anomaly Detection Identification of items, events or observations which do not conform to an expected pattern or other items in a dataset Unsupervised modeling approach Creates peer groups from which to compare an observation against Can identify new/emerging trends of fraud in the data Tax Return Data Fraudulent returns Fictitious returns ID theft Excessive credits Inaccurate income Criminal schemes Observations deviate from the norm suggest they are anomalous Return preparer fraud Anomaly Types Copyright 2014 Deloitte Development LLC. All rights reserved. 15

17 Network Analysis Mapping relationships between entities to identify temporal, event, and association networks Reveal normal and anomalous patterns of interaction within and between groups Expose facilitators and enablers of fraud Follow transaction trails using link analysis Identify key individuals such as brokers and gatekeepers Identify potential vulnerabilities within a network Group Number: Broker Isolate Gatekeeper Copyright 2014 Deloitte Development LLC. All rights reserved. 16

18 Geospatial Analysis Adding spatial operations enhances analytics with an additional dimension based on geospatial patterns, relationships, and inferences. Sometimes flat data doesn t tell the whole story. There may be correlations that are only visible on a map, identified using the following analyses: Cluster analysis Spatial recognition Outliers Fraud hot spot density map. Regional supply chains vulnerabilities Copyright 2014 Deloitte Development LLC. All rights reserved. 17

19 Text Analysis Analyzing unstructured data for sentiments, common themes, and relationships. s, files, and documents Tweets, blogs, and social media contents Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam pellentesque imperdiet pretium. Quisque ac augue sit amet odio vestibulum SENTIMENTS porta id ut nisi. Maecenas nibh nibh, vestibulum at laoreet non, dignissim ac urna. Aenean nec mi est. Maecenas vitae lectus leo. ENTITIES Mauris auctor, magna et rhoncus bibendum, urna mauris tempor ante, id bibendum turpis ligula a massa. Aliquam lobortis aliquet augue, nec blandit diam RELATIONSHIPS auctor eget. Nunc congue massa vitae est ultricies feugiat in vitae enim. Curabitur semper tellus eu nulla blandit a rutrum diam faucibus. Aliquam erat volutpat. Donec euismod hendrerit nulla, vitae molestie enim vehicula vitae. Donec nec PATTERNS ligula vel dui viverra mattis. METADATA Cras tristique leo in lorem pharetra luctus. Phasellus in interdum tortor. Pellentesque erat risus, scelerisque vel lobortis ac, mollis vel nulla. In hac habitasse platea dictumst. Copyright 2014 Deloitte Development LLC. All rights reserved. 18

20 Section 3: Future of Forensic Analytics New approaches Enterprise Fraud Management Copyright 2014 Deloitte Development LLC. All rights reserved. 19

21 Enterprise View Time Business Analytics Maturity Model Developing a conceptual road map Level I Level II Level III Level IV Frequent Continuous Mature Analytics Ad-Hoc Periodic Enterprise Function Network, Text, Geospatial Tools Advanced Analytics Department Predictive Analytics Software Statistical Models Team Databases Rules-Based Queries Key Capabilities Tools and Technologies Spreadsheets Curren t State Random Samples Analytics Copyright 2014 Deloitte Development LLC. All rights reserved. 20

22 Cognitive Computing Cognitive computing is inspired by the way the human brain processes information, draws conclusions, and codifies instincts and experience. Cognitive computing auto-detects the similarity of new things to things previously seen or spots the anomalies. Detecting fraud by identifying relevant patterns Legal document review Claims management Spam filters Cognitive computing is rapidly becoming an indispensable technology to offload timeconsuming and repetitive tasks to intelligent software with highly refined and consistent results. Speech Recognition Natural Language Processing Machine Learning Algorithms Cognitive Computing Image & Pattern Recognition Artificial Intelligence Data Mining Deloitte estimates the U.S. cognitive computing market will expand in five years from the current $1 billion to $50 billion in Source: Copyright 2014 Deloitte Development LLC. All rights reserved. 21

23 Cloud Storage of Data Utilizing remote, networked servers to store, access, and analyze large volumes of data and services. The availability and accessibility of these services allow for flexible storage for a variety of data mediums, including photo and video. Serving as a critical component of data storage for fraud analysis Agile content, including video surveillance Cost-scalable Location independence, allowing for remote viewing Low maintenance and optimized performance Copyright 2014 Deloitte Development LLC. All rights reserved. 22

24 Big Data and Parallel Processing Utilizing storage and large-scale processing of data on clusters to process tremendous volumes efficiently. Available through both commercial and open-source options. Allowing dynamic review of a large volume and variety of data Variety encompasses different media types (structured and unstructured) Allows near real-time analysis Copyright 2014 Deloitte Development LLC. All rights reserved. 23

25 EFM: A New Approach to Fraud Prevention Continuously and comprehensively reviewing risks of fraud Enterprise Fraud and Misuse Management (EFM) provides a continuous monitoring solution to mitigate both the known and the emerging patterns of fraud, waste and abuse. Proactively screen data to identify suspicious patterns or anomalies on a real-time basis Remedy issue before it causes damage Look inside and outside the organization Move away from data silos Structured and unstructured Big Data Terabytes, petabytes, and beyond Time Enterprise View EFM Analytics Data Profile Copyright 2014 Deloitte Development LLC. All rights reserved. 24

26 Section #4: Analytics in Action Case #1: U.N. Oil-for-Food Case #2: Energy Company Fraud, Waste, and Abuse Copyright 2014 Deloitte Development LLC. All rights reserved. 25

27 Scenario Exploiting humanitarian funds and efforts Background: After first Gulf War, UN developed a program to allow Iraq to sell oil on the world market in exchange for food, medicine, and other humanitarian needs. Goods exchanged to prevent Iraq from boosting its military capabilities. Indications surface of corruption and kickbacks. Goal: Identify extent of and major players involved in the misappropriated funds. Copyright 2014 Deloitte Development LLC. All rights reserved. 26

28 UN Oil-For-Food Investigation Collecting and Ingesting Transactional Data from Various Data Sources Humanitarian Goods Oil UN UN Iraq Iraq Shipping Agents Oil End Users Financing Institutions Financing Institutions Humanitarian Goods Companies Traders Copyright 2014 Deloitte Development LLC. All rights reserved. 27

29 UN Oil-For-Food Investigation Fusing Structured and Unstructured Data Data in varying formats and from various sources are processed, fused, and superimposed to enable a more contextual interpretation and analysis. Structured Data Extract Transform Load Derive temporal and entity keys CENTRAL DATAMART ID Date Name Account Number GL Amount Peter Smith AC Mike Trombone AF Sally Thomas EH Nigel Thompson EW Abe McNamara EW Peter Smith AC Mike Trombone AF Sally Thomas EH Nigel Thompson EW Abe McNamara EW Peter Smith AC Mike Trombone AF Sally Thomas EH Nigel Thompson EW Abe McNamara EW Peter Smith AC Mike Trombone AF Sally Thomas EH Nigel Thompson EW Abe McNamara EW Addison Joyce YH Unstructured Data Copyright 2014 Deloitte Development LLC. All rights reserved. 28

30 UN Oil-For-Food Investigation Result: A Comprehensive View of Financial Activities Example: Reconstructed Humanitarian Transaction from Various Data Sources UN Iraq Bank Company Contract holder Company Front Company Contract number Contract agreeing to pay illegal fees Contract value Company & Front Company W/29/M-52 LC Y Company & Front Company & W/29/M-52 $11,000,000 $11,000,000 $11,000,000 $11,000,000 Company agent Company & Front Company W/29/M-52 Transportation agent Front Company W/29/M-52 Payment After sales service fee Inland transportation fee Tender fee $10,500,000 $10,500,000 $10,500,000 $1,000,000 $900,000 $900,000 $400,000 $300,000 $300,000 $300,000 $200,000 $200,000 $200,000 Bank fee $20,000 $20,000 Copyright 2014 Deloitte Development LLC. All rights reserved. 29

31 US$/Metric Ton UN Oil-For-Food Investigation Result: Quantifying the Impact Understanding Overpricing Related to Actual Costs Projected expenditures differ from actual costs in later years Bi-Annual Phases Expected CFFP Market Actual OFFP Cost for Food Program (CFFP) versus Actual Oil for Food Program Copyright 2014 Deloitte Development LLC. All rights reserved. 30

32 Global Energy Company Fraud, Waste, and Abuse Scenario CRISP-DM Methodology Business and Data Understanding Data Preparation Modeling Evaluation Deployment Copyright 2014 Deloitte Development LLC. All rights reserved. 31

33 Scenario Identifying global supplier fraud Background: An energy and resources company operates all over the world in remote locations. Supply chain logistics are complex, buying volume is high, and new accounting systems had recently been implemented. The company had discovered one of their supply purchasers has been in collusion with vendors and was receiving kickbacks in exchange for overpaying and overbuying mechanical goods. The company is concerned that other instances of supplier fraud are occurring. Goal: Evaluate the potential effectiveness of a proactive approach for identifying fraud, waste and abuse by identifying the necessary pre-work to create models, work to generate predictive models, and post-work to improve model efficiency. Copyright 2014 Deloitte Development LLC. All rights reserved. 32

34 Actual CRISP-DM Approach From understanding through deployment Cross-Industry Standard Process for Data Mining (CRISP-DM) Stepwise Phases DB Materials Master Requisitions Analytics to identify known fraud? Similar cases? Most reliable analytic technique? Identify potential fraud on an ongoing basis? Deployment DB Data capture points? Purchase Orders Merge and cleanse data to establish reliable records to analyze? Analytics to identify unknown fraud? Modeling Evaluation Yes Predicted No Key business processes? Vulnerabilities? Past fraud? Data storage and formats? Data Understanding Data Preparation Yes No 32 13,582 Business Understanding FAMILIARIZE ANALYZE OPERATIONALIZE Copyright 2014 Deloitte Development LLC. All rights reserved. 33

35 Business and Data Understanding People Process Data Subject Questions Answers People Data Who are the subject matter experts in the procurement process? Who are the key role players in the supply chain? When is the data captured in the process and where is it stored? What are the major procurement tables and how are they related? Global Supply Chain Directors, Inventory Controllers, etc. Requestors, Inventory Controllers, Buyers, Approvers, Suppliers/Vendors SAP captures data throughout the procurement process SAP tables form the base for Purchase Order Information Artifact 1: Business Process Flow Artifact 2: Data Architecture Copyright 2014 Deloitte Development LLC. All rights reserved. 34

36 Business and Data Understanding (continued) Fraud fingerprints Analyzing Fraud Fingerprint Characteristics Price Increases Significant increases in Material Unit Price Split Requisitions Splitting Purchase Requisitions into multiple Orders Same Day Orders Multiple orders for a material on the same day Skirting Approval Purchase Order Amounts just below approval thresholds Copyright 2014 Deloitte Development LLC. All rights reserved. 35

37 Our Approach: Decision Tree Applying Rule-Induction machine-learning technique to develop probabilistic outcomes and projections on data sets Challenge Identify suspicious purchase orders that do not violate traditional fraud tests Technique Tools Decision Tree model was built using SPSS Modeler Visualization Utilize supervised technique of rule-induction to identify known and hidden patterns Labeled cases generated by evaluated business rule transactions are used to train the decision tree to identify different types of suspicious transactions Handle missing data as well Reason for Using Method can see beyond the human eye and significantly increase model performance Outcomes Dramatic increase in model accuracy compared to rules model Significantly fewer transactions to be evaluated manually Supervised modeling uncovers hidden pattern Copyright 2014 Deloitte Development LLC. All rights reserved. 36

38 Our Approach: Anomaly Detection Identification of items, events or observations which do not conform to an expected pattern or other items in a dataset Challenge Identify suspicious purchase orders that do not violate traditional fraud tests Technique Tools Anomaly Clustering conducted using SPSS Modeler Visualization Cluster observations into peer groups Identify observations which are statistically different from observations like itself Use distance metrics to calculate and rank the degree of anomalous activity an observation presents Reason for Using No labeled cases of suspicious activity available Outcomes Observations deviate from the norm suggest they are statistically anomalous Identified emerging pattern of purchase order amounts outside of the expected peer group Copyright 2014 Deloitte Development LLC. All rights reserved. 37

39 Evaluation and Deployment Putting the results into action Actual Confusion Matrix Predicted Yes No Yes No 95 1,120 The above matrix shows that the modeling is closely predicting the suspiciousness of orders at 88.7% True Positive rate = 74% False Positive rate = 8% Is this an acceptable performance? If Yes, than move on to deploy model If No, return to Modeling phase to enhance modeling performance Monitoring Options Once a model is accepted it can be deployed Options for deploying a model Ad hoc Frequent Continuous Ad hoc is the cheapest option, but also the least effective. Frequent requires a part time effort and is a good option for companies that do not want to overspend for a solution Continuous monitoring may benefit from a full-time team to leverage advanced tools on an ongoing basis for higher levels of fraud detection and prevention. Copyright 2014 Deloitte Development LLC. All rights reserved. 38

40 The Role of Analytics in Regulation and Litigation Communication and translation are paramount experts are increasingly utilizing advanced (and legally defensible) sampling and predictive modeling and coding techniques to limit the onerous effort that a full-scale review of documents and data entails. Courts are more likely to accept these newer approaches to the extent that experts are able to translate complex statistical, accounting, financial, and sometimes abstract economic concepts to judges and juries in ways that are compelling and clearly understandable to the layman. - Kennedy Consulting and Research Advisory Report (2013) Copyright 2014 Deloitte Development LLC. All rights reserved. 39

41 "This presentation contains general information only and is based on the experiences and research of Deloitte practitioners. Deloitte is not, by means of this presentation, rendering business, financial, investment, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this presentation. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Copyright 2014 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited

Poster Design Tips. Academic Technology Center

Poster Design Tips. Academic Technology Center Poster Design Tips Academic Technology Center Colors White Background Recommended Full-color backgrounds will be charged extra Use Borders, Images and Graphics to add some color instead Colors Keep it

More information

lloyd s coverholders brand GUIDELINES

lloyd s coverholders brand GUIDELINES lloyd s coverholders brand GUIDELINES contents Introduction Quick questions Part One: How may I describe my relationship with Lloyd s? Part Two: How may I use the Coverholder at Lloyd s logo? Further information

More information

The package provides not only Roman fonts, but also sans serif fonts and

The package provides not only Roman fonts, but also sans serif fonts and The package provides not only Roman fonts, but also sans serif fonts and typewriter fonts. Times Roman Condensed (c, n). 0123456789, $20, C30, 60. Naïve Æsop s Œuvres in français were my first reading.

More information

Software Engineering Research Group MSc Thesis Style

Software Engineering Research Group MSc Thesis Style Software Engineering Research Group MSc Thesis Style Version of July 5, 2007 Leon Moonen Software Engineering Research Group MSc Thesis Style THESIS submitted in partial fulfillment of the requirements

More information

(or remove the package call from the preamble of this document).

(or remove the package call from the preamble of this document). Example for pageslts keys This example demonstrates the most common uses of package pageslts, v1.2c as of 2014/01/19 (HMM). The used options were pagecontinue=true, alphmult=ab, AlphMulti=AB, fnsymbolmult=true,

More information

Canada. MEETING AND TRADESHOW PUBLIC RELATIONS: A HOW-TO GUIDE Get the Most out of Your Meeting and Tradeshow Investment. June 8 12 HOW-TO GUIDE

Canada. MEETING AND TRADESHOW PUBLIC RELATIONS: A HOW-TO GUIDE Get the Most out of Your Meeting and Tradeshow Investment. June 8 12 HOW-TO GUIDE IN S ET 1 MI 20 3 1 MI 20 3 RY TH 60 A N N IV E R S A N N U AL M E ET RY TH A G A N N IV E R S IN 60 A G NM NM IN A N N IV E A N N U AL M E S 1 A N N U AL M E ET MEETING AND TRADESHOW PUBLIC RELATIONS:

More information

PREVIEW Health Plans. Partner Resources Small Businesses Medi-Cal. Other Languages

PREVIEW Health Plans. Partner Resources Small Businesses Medi-Cal. Other Languages Header Message Header for Members Message Here Including Lorem ipsom norte Content elibri yiun for entor the fentori Member semplor sririmt Page emptri yi sru frep sortnis. Lorem ipsom norte elibri entor

More information

Inventory Planning Methods: The Proper Approach to Inventory Planning

Inventory Planning Methods: The Proper Approach to Inventory Planning retail consulting Inventory and Planning industry Methods thought! 1 leadership Inventory Planning Methods: The Proper Approach to Inventory Planning! Inventory Planning Methods! 2 Merchandise planning

More information

Have a question? Talk to us...

Have a question? Talk to us... A. Home (Level 1) Philosophy Overview & Methods Curriculum Philosophy & Overview Methods Classroom Curriculum Training Overview Continuing Classroom Training Education Student Continuing Testimonials Education

More information

A Crash Course in Internet Marketing.» A Crash Course in Internet Marketing

A Crash Course in Internet Marketing.» A Crash Course in Internet Marketing A Crash Course in Internet Marketing Internet Marketing is a broad field that encompasses SEO, PPC, Video, Social Media, and Websites Internet Marketing is important for local businesses in particular

More information

IDENTITY BRANDING DANIEL DURKEE

IDENTITY BRANDING DANIEL DURKEE IDENTITY BRANDING DANIEL DURKEE DURKEE IDENTITY BRANDING INTRODUCTION VISION My previous logo lacked a clean design and it relied heavily on gradients to represent the fluid design of the letters D C D

More information

European E-Commerce, E-Fulfilment and Job Creation

European E-Commerce, E-Fulfilment and Job Creation European E-Commerce, E-Fulfilment and Job Creation October 2015 As grows and evolves, so too will the supply chains, facilities and talent that support the critical functions of e-fulfilment. E-fufilment

More information

Public Relations: A How-To Guide for SNMMI Chapters

Public Relations: A How-To Guide for SNMMI Chapters Public Relations: A How-To Guide for SNMMI Chapters The Importance of Public Relations Public relations is about managing perceptions and making a good impression. It s about storytelling, and our job

More information

lloyd s BROKERs brand guidelines

lloyd s BROKERs brand guidelines lloyd s BROKERs brand guidelines contents Introduction Quick questions Part One: How may I describe my relationship with Lloyd s? Part Two: How may I use the Broker at Lloyd s logos? Promotional material

More information

WNM 210 - Visual Design & Typography Academy of Art University Jessica Hall - halica84@gmail.com

WNM 210 - Visual Design & Typography Academy of Art University Jessica Hall - halica84@gmail.com San Francisco Cable Car Museum WNM 210 - Visual Design & Typography Academy of Art University Jessica Hall - halica84@gmail.com History & Present Status History Overview: Established in 1974, the Cable

More information

Milestone Marketing Method www.unkefer.net

Milestone Marketing Method www.unkefer.net & associates Marketing & Branding Your Business & associates Fundamentally, your business runs on the quality of the relationships you develop. The Mile Stone Marketing Method (M 3 ) puts you in a position

More information

ibooks Identity Guidelines September 2013

ibooks Identity Guidelines September 2013 is Identity Guidelines September 2013 Contents Overview 3 is Badge Basics 4 Graphic Standards 5 Do s and Don ts 6 Examples 7 Promoting Your s Basics 8 Terminology 9 Do s and Don ts 10 Additional Tools

More information

Print Less. Save More.

Print Less. Save More. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Ut molestie scelerisque ante. Cras libero tortor, bibendum vitae, ornare vel, nonummy id, lorem. Cras sed risus sed libero luctus sagittis. Nulla

More information

Portfolio 2012. Matteo Rosin. Mobile +39 349 5308547 E-mail info@ithinkgraphic.com Web ithinkgraphic.com Skype matteo.rosin

Portfolio 2012. Matteo Rosin. Mobile +39 349 5308547 E-mail info@ithinkgraphic.com Web ithinkgraphic.com Skype matteo.rosin Portfolio 2012 Matteo Rosin Mobile +39 349 5308547 E-mail info@ithinkgraphic.com Web ithinkgraphic.com Skype matteo.rosin Portfolio 2012 Brand ID Wol Trading Ltd 2012 Progetto Restyling logo Web design

More information

Film4 Off-air Identity Style Guide

Film4 Off-air Identity Style Guide Film4 Off-air Identity Style Guide Film4 style guide contents 1. On-air identity style guide 2. Off-air identity style guide 2.1.1 The Logo 2.1.2 Logo keyline 2.1.3 Logo position 2.1.4 Isolation area 2.1.5

More information

NEW AND UNIFIED TEMPLATES FOR CANADIAN ACOUSTICS ARTICLES

NEW AND UNIFIED TEMPLATES FOR CANADIAN ACOUSTICS ARTICLES NEW AND UNIFIED TEMPLATES FOR CANADIAN ACOUSTICS ARTICLES Cécile Le Cocq 1, Jérémie Voix 2, and Lucius Munatius Plancus 2 1 Lorem ipsum dolor sit amet, consectetur adipiscing elit. Duis varius. 2 Etiam

More information

Logo and Design Guidelines for Solution Partners

Logo and Design Guidelines for Solution Partners Logo and Design Guidelines for Solution Partners April 2011 version 4.0 1 TABLE OF CONTENTS 1 INTRODUCTION 2 LOGOS 3 COLORS 4 TYPOGRAPHY 5 GRAPHICS 6 TEMPLATES 7 CONTACT 2 1 INTRODUCTION WELCOME to the

More information

vehicle tracking & fleet management system

vehicle tracking & fleet management system vehicle tracking & fleet management system about arvento Arvento was founded in 2005 with one goal in mind, to provide rich, reliable vehicle tracking systems for Turkey and world. Today, Arvento as one

More information

No 1 NYU IDENTITY LOGO BASICS

No 1 NYU IDENTITY LOGO BASICS No 1 NYU IDENTITY LOGO BASICS 470,000ALUMNI 48,000STUDENTS 9,000 EMPLOYEES 3,100 FULL-TIME FACULTY 2,500 COURSES OFFERED 130COUNTRIES Represented 18SCHOOLS 11 STUDY AWAY SITES 3DEGREE GRANTING CAMPUSES

More information

Volkswagen Service Corporate Design Manual. Last revised: July 2012

Volkswagen Service Corporate Design Manual. Last revised: July 2012 Corporate Design Manual Last revised: July 2012 2 Contents Contents Introduction 3 Das Auto 4 Visual Elements 5 Icons 6 Icon application 7 Brand 8 Dealer ad without grid 9 Retail Offers 10 Retails Sub-Brands

More information

Sample Brand Strategy. // LAST MODIFIED May 14, 2014 BY CHRIS FORD //

Sample Brand Strategy. // LAST MODIFIED May 14, 2014 BY CHRIS FORD // Sample Brand Strategy // LAST MODIFIED May 14, 2014 BY CHRIS FORD // INTRODUCTION This document will define the most important aspects of your brand: your brand vision, brand values, the identity of your

More information

lloyd s UNDERWRITERS brand guidelines

lloyd s UNDERWRITERS brand guidelines lloyd s UNDERWRITERS brand guidelines contents Introduction Quick questions Part One: How may I describe my relationship with Lloyd s? Part Two: How may I use the Lloyd s Underwriters logos? Promotional

More information

Escrito por Esporte Concentração Qua, 25 de Fevereiro de 2009 01:41 - Última atualização Ter, 20 de Julho de 2010 11:16

Escrito por Esporte Concentração Qua, 25 de Fevereiro de 2009 01:41 - Última atualização Ter, 20 de Julho de 2010 11:16 This page presents most of typographical aspects of JA Quartz Make your readers happy with great Typography and User Experience! This is an Heading 1 Lorem tortor Curabitur urna interdum Maecenas ut felis

More information

FRANCHISE OPPORTUNITY 2014/15

FRANCHISE OPPORTUNITY 2014/15 FRANCHISE OPPORTUNITY 2014/15 #CARRA "A lot of guys come out of football or have just fallen short of being a player, and need a new opportunity, they have the capabilities to coach but need a leg up,

More information

Event Management Database Retrofit Analysis and Design

Event Management Database Retrofit Analysis and Design Event Management Database Retrofit Analysis and Design Database Design and Management Class Final Project MASY-GC-2500 Fall 2014 Instructor: Marc S. Paller Submitted By: Fangzhou Cheng Submitted On: October

More information

Branding Standards Draft 2 - May 2012

Branding Standards Draft 2 - May 2012 Branding Standards Draft 2 - May 2012 Table of Contents 3 4 5 11 15 17 21 24 26 28 29 30 Welcome! Who We Are Logo Usage Logo Usage - What to Avoid Written Style Typography Colour Palette Photography Graphics

More information

Graphic Identity Standards Guide

Graphic Identity Standards Guide Graphic Identity Standards Guide MARCH 2014 EDITION Date of Issue: PHase 2, March 2014 This guide is a publication of The office of Communications, Marketing and Brand Management, The College of New Jersey

More information

BRAND GUIDELINES. Version 1.1 September 09

BRAND GUIDELINES. Version 1.1 September 09 BRAND GUIDELINES Version 1.1 September 09 1 Contents The Story Behind Our Identity 04 Where the wandering water gushes From the hills above Glen Car The New IT Sligo Logo 05 The Name of the Institute &

More information

A Guide to the Utah State University Visual Identity Program. www.usu.edu/prm/identity. Edition One (v8, 02/10/2015)

A Guide to the Utah State University Visual Identity Program. www.usu.edu/prm/identity. Edition One (v8, 02/10/2015) A Guide to the Utah State University Visual Identity Program www.usu.edu/prm/identity Edition One (v8, 02/10/2015) 2 table of contents Letter from the President.... 3 Introduction.... 4 Approval process...

More information

ACS Mexico Our Goal Is Service

ACS Mexico Our Goal Is Service ACS Mexico Our Goal Is Service ACS Mexico is the offshore operation that is closest to the heart of Xerox and the rest of the world. Spanning four sites in Hermosillo, Juarez, Monterrey and Reynosa our

More information

Master of Education in Curriculum and Instruction

Master of Education in Curriculum and Instruction Western New England University, 1215 Wilbraham Road, Springfield MA Visit: education.wne.edu Call: (877) 704-5366 Master of Education in Curriculum and Instruction Master of Education in Curriculum and

More information

Anecdote Keystroke logging: general

Anecdote Keystroke logging: general Observing and analysing digital writing processes with Inputlog & Introduction Faculty of Applied Economics Department of Management Teaching: Business Communication (Dutch) Research group on Writing and

More information

Graphic Standards Marketing Department. www.oit.edu. Hands-on education for real-world achievement.

Graphic Standards Marketing Department. www.oit.edu. Hands-on education for real-world achievement. Graphic Standards Marketing Department www.oit.edu Hands-on education for real-world achievement. Hello, you can call us Oregon Tech for short. Oregon Tech wishes to present a consistent identity to the

More information

Skills Guide: How to write a press release

Skills Guide: How to write a press release Skills Guide: How to write a press release Who is Who? Who? Communications was created by Will Hoyles, a public relations and communications expert with over six years experience of delivering high quality

More information

The Blogger s Guide to Banner Ads. Monetize Your Site!

The Blogger s Guide to Banner Ads. Monetize Your Site! The Blogger s Guide to Banner Ads Monetize Your Site! How to use this Guide Once you decide to start monetizing your blog, figuring out where to start is probably the hardest part. Banner ads are probably

More information

Sales Playbook Sales Planning Manager

Sales Playbook Sales Planning Manager INSERT LOGO Sales Playbook Sales Planning Manager 1 We would like to develop a Sales Playbook to increase the retention and effectiveness of new hires Situation Currently,

More information

Text. Basic typography. Keep your eyes open! Typography Defined. Identify these logos 2012-03-12. Legibility. Playful l interaction

Text. Basic typography. Keep your eyes open! Typography Defined. Identify these logos 2012-03-12. Legibility. Playful l interaction Sonnoli Text Basic typography Legibility Most of the time test is there to read Size, font, colour contrast against background Playful l interaction ti text as image, illustration, inspiration, decoration

More information

Argus. One Page Responsive Template. themelock.com. <a class="read-more" id="news-1" href="popup/news_1.html"></a>

Argus. One Page Responsive Template. themelock.com. <a class=read-more id=news-1 href=popup/news_1.html></a> Argus One Page Responsive Template Thanks for purchasing the template and for supporting our work. Argus is our new fancy template. Responsive, clean and professional look with sleek design will satisfy

More information

How To Design A History Day Exhibit

How To Design A History Day Exhibit National History Day Making Exhibits Original Presentation made by Wanda Chin, Exhibition and Design Director at the University of Alaska Museum of the North, on November 29, 2006. 1 Category Rules: Exhibit

More information

Considering the economic implications as educational institutions expand online learning initiatives.

Considering the economic implications as educational institutions expand online learning initiatives. Vviewpoints doi:10.1145/2436256.2436264 Michael A. Cusumano Technology Strategy and Management Are the Costs of Free Too High in Online Education? Considering the economic implications as educational institutions

More information

2013-14. CONTENTS Colors Typography Logos Photography Letterhead

2013-14. CONTENTS Colors Typography Logos Photography Letterhead 2013-14 CONTENTS Colors Typography Logos Photography Letterhead brand Standards Colors Primary Color Our primary color is green, Pantone 356. Green symbolizes growth, harmony, hope, healing, life, peace,

More information

Presbyterian College. This is our promise. Style Guide for the Presbyterian College Brand

Presbyterian College. This is our promise. Style Guide for the Presbyterian College Brand This is our promise Style Guide for the Brand Introduction PC has adopted a new branding strategy. The goal is to establish what makes us unique, and to strengthen our reputation among our constituents.

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

No 3 NYU IDENTITY DESIGN GUIDE

No 3 NYU IDENTITY DESIGN GUIDE No 3 NYU IDENTITY DESIGN GUIDE Visual identity is more than a logo. NYU is a large and diverse community where individual expression is celebrated, as it should be. Rather than create new logo marks, we

More information

Hill International Reduces Global IT costs while Improving Service with Help from CA Technologies

Hill International Reduces Global IT costs while Improving Service with Help from CA Technologies CUSTOMER SUCCESS STORY MAY 2012 Hill International Reduces Global IT costs while Improving Service with Help from CA Technologies CLIENT PROFILE Industry: Construction professional services Company: Hill

More information

Meet Your Action Learning Coaches

Meet Your Action Learning Coaches Home Welcome to the Regional Leadership Program Manager Certification course website! Here you will find all the learning modules and content materials we will engage with over the next 12 weeks. Please

More information

Graduate Research School Thesis Format Guide

Graduate Research School Thesis Format Guide Graduate Research School Thesis Format Guide The Graduate Research School A guide for candidates preparing to submit their thesis for examination GRADUATE RESEARCH SCHOOL The University of New South Wales

More information

Email Best Practices agency creative.

Email Best Practices agency creative. Email Best Practices agency creative. Fall 2011 Email: The Most Successful 1:1 Marketing Platform Ever Created Acxiom s Guide to Email Greatness Part 1: Maps See what the email landscape looks like now...

More information

Thetris Project Brand Book

Thetris Project Brand Book Thetris Project Brand Book THEmatic Transnational church Route development with the Involvement of local Society www.thetris.eu Table of Contents Logotype Introduction 1 Logo 3 Colors 4 Basic Variation

More information

Uptime Institute Symposium 2010

Uptime Institute Symposium 2010 UNDERWRITER CASE STUDY Uptime Institute Symposium 2010 The Chameleon Data Center: "Transforming to meet your business needs..." By Carlos Garcia de la Noceda, PhD, MBA, Senior Program Manager Tanya M.

More information

about arvento www.arvento.com

about arvento www.arvento.com about arvento Arvento Mobile Systems is a technology company based in Turkey, specialized in designing, developing and manufacturing mobile tracking technologies and telematics products. Arvento is one

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

Le book. www.coupdouest.nc

Le book. www.coupdouest.nc Le book www.coupdouest.nc 3, rue Émile Zola - Baie de l Orphelinat - 98800 Nouméa - Nouvelle-Calédonie Tél. (+687) 28 14 20 - contact@coupdouest.nc Ridet: 891440.001 - A.P.E.: 744B Le book www.coupdouest.nc

More information

The data conundrum Finding your path with data analytics

The data conundrum Finding your path with data analytics The data conundrum Finding your path with data analytics Introductions Jason Pett,, US Internal Audit Leader Duncan Barnard,, Managing Director, Data Analytics Vikas Agarwal,, Managing Director, Data Analytics

More information

Clair Smith clairssmith.co Practice of Design Michael Salamon

Clair Smith clairssmith.co Practice of Design Michael Salamon Clair Smith clairssmith.co Practice of Design Michael Salamon TABLE OF CONTENTS: overview of the project / process research / goals brainstorming / sketches type studies / layout customer journey gantt

More information

Fraud Analytics The three-minute guide

Fraud Analytics The three-minute guide Fraud Analytics The three-minute guide Fraud Analytics The three-minute guide 1 What is fraud analytics? Fraud analytics combines analytic technology and techniques with human interaction to help detect

More information

Milano Design Week 8 13 Aprile Official Circuit of zona Tortona Savona Communications Plan

Milano Design Week 8 13 Aprile Official Circuit of zona Tortona Savona Communications Plan Milano Design Week 8 13 Aprile Official Circuit of zona Tortona Savona Communications Plan Tortona Around Design The new Fuorisalone Design Week at the Zona Tortona-Savona Tortona Around Design is a communications

More information

A BERKSHIRE MARKETING GROUP CASE STUDY JEFFERSON COMMUNITY COLLEGE

A BERKSHIRE MARKETING GROUP CASE STUDY JEFFERSON COMMUNITY COLLEGE A BERKSHIRE MARKETING GROUP CASE STUDY JEFFERSON COMMUNITY COLLEGE There Really Is More Here With this one simple secret, you can change the world. LEARN MORE AT SUNYJEFFERSON.EDU JEFFERSON COMMUNITY COLLEGE

More information

A collection of Ray White properties across Australia & New Zealand for CCPIT members

A collection of Ray White properties across Australia & New Zealand for CCPIT members A collection of Ray White properties across Australia & New Zealand for CCPIT members MAY 2015 RAY WHITE S AUSTRALASIAN FOOTPRINT CONTENT 05 Welcome 07 Ray White Group 09 New China desk 11 Introducing

More information

Agency Services Centers of excellence

Agency Services Centers of excellence AGENCY SERVICES Agency Services Centers of excellence Our three centers of excellence are staffed with experienced professionals that partner with you to achieve your business goals. Analytics and Insights

More information

Procurement Fraud Identification & Role of Data Mining

Procurement Fraud Identification & Role of Data Mining The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application

More information

FRAUD RISK ASSESSMENT

FRAUD RISK ASSESSMENT FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by

More information

Olive Data Centre Improves Service and Optimises Resources with CA Unified Infrastructure Management and CA Cloud Service Management

Olive Data Centre Improves Service and Optimises Resources with CA Unified Infrastructure Management and CA Cloud Service Management CUSTOMER SUCCESS STORY NOVEMBER 2012 Olive Data Centre Improves Service and Optimises Resources with CA Unified Infrastructure Management and CA Cloud Service Management CLIENT PROFILE Industry: IT Services

More information

DFP Wealth Management Ltd

DFP Wealth Management Ltd DFP Wealth Management Ltd In eget sapien vitae massa Aliquam dapibus ipsum vitae sem. Nulla vestibulum eleifend nulla. Suspendisse sem lorem, ornare non. Nulla quis nibh. Proin ac pede vel ligula Suspendisse

More information

SECTION TITLE 1.1. The importance of rapid mobile app development in enterprise mobility INSIGHTREPORT

SECTION TITLE 1.1. The importance of rapid mobile app development in enterprise mobility INSIGHTREPORT SECTION TITLE In association with The relationship between shoppers, brands and consumers has changed. The internet, combined with the growth in the number of channels, devices and means by which the average

More information

Tuto News - Summer 2015

Tuto News - Summer 2015 In eget sapien vitae massa Tuto News - Summer 2015 Annuities Aliquam dapibus ipsum vitae sem. Nulla vestibulum eleifend nulla. Suspendisse sem lorem, ornare non. Nulla quis nibh. Proin ac pede vel ligula

More information

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business

More information

Replacement Conservatories

Replacement Conservatories Replacement Conservatories The cost-effective way to revive your tired conservatory My dream... Rediscover the conservatory way of living Your conservatory will have been an impressive show piece when

More information

Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption

Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What

More information

EFFICACY RESULTS. Studies illustrating the efficacy, impact and motivation of MyEnglishLabs for adult learners of English

EFFICACY RESULTS. Studies illustrating the efficacy, impact and motivation of MyEnglishLabs for adult learners of English EFFICACY RESULTS Studies illustrating the efficacy, impact and motivation of s for adult learners of English 1 benefits students by providing instant feedback on the exercises which allows them to check

More information

IBM Managed Security Services Virtual-Security Operations Center portal

IBM Managed Security Services Virtual-Security Operations Center portal Responding to continually changing security needs with centralized and interactive control IBM Managed Security Services Virtual-Security Operations Center portal Highlights Offers vital security information

More information

Mobile Applications : Easy Events

Mobile Applications : Easy Events Mobile Applications : Easy Events Introducing Easy Events - now anyone can create events. The toolset provided caters for any sized event from a corporate movie night to local book signing. Photoshop,

More information

GUIDE TO UNDERSTANDING AND APPLYING THE DON DIFFERENCE TEMPLATES AND DIGITAL ASSETS

GUIDE TO UNDERSTANDING AND APPLYING THE DON DIFFERENCE TEMPLATES AND DIGITAL ASSETS GUIDE TO UNDERSTANDING AND APPLYING THE DON DIFFERENCE TEMPLATES AND DIGITAL ASSETS 15-05-1670-d v.01 August 11, 2015 Purpose of this Manual The guidelines in this manual are designed to create a flexible

More information

[Year]Business Plan. [Type the company name] [Type the document subtitle]

[Year]Business Plan. [Type the company name] [Type the document subtitle] [Type the company name] [Year]Business Plan [Type the document subtitle] NOTE: This business plan guide is one of many templates available to help nascent and existing business owners manage the growth

More information

CYBER SECURITY EXAMINATION GUIDANCE

CYBER SECURITY EXAMINATION GUIDANCE CYBER SECURITY EXAMINATION GUIDANCE NCUA CYBER SECURITY EXAMS OLD WINE IN NEW BOTTLES? In a March 10, 2014 post to CU Insight, NCUA Board Chair Debbie Matz stated: Lately, I ve been doing a lot of thinking

More information

The last Budget was seen as the Pension Budget this one is seen as the Savers Budget.

The last Budget was seen as the Pension Budget this one is seen as the Savers Budget. Better Financial Planning Budget Report 2015 From Austerity to Prosperity? George Osborne said in his 2015 Budget on March 18th, that they will use whatever resources they have to get the deficit down.

More information

Sicredi Reduces Project Management Costs by 20 percent with CA Project & Portfolio Management SaaS

Sicredi Reduces Project Management Costs by 20 percent with CA Project & Portfolio Management SaaS CUSTOMER SUCCESS STORY MARCH 2013 Sicredi Reduces Project Management Costs by 20 percent with CA Project & Portfolio Management SaaS CLIENT PROFILE Industry: Financial services Company: Sicredi Employees:

More information

Title. Principles of Demand Management. Lowest Logical Airfare: Which Policy? Program: Combining Transient Spend with M&E

Title. Principles of Demand Management. Lowest Logical Airfare: Which Policy? Program: Combining Transient Spend with M&E 1 Text Title Insights into Effective Travel Management Issue 6 Global Edition March 21 Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse lectus urna, suscipit non fringilla at, dapibus

More information

Advanced Data Analytics, the Fraudsters Worst Enemy

Advanced Data Analytics, the Fraudsters Worst Enemy Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability

More information

[Title] M A S T E R T H E S I S. [Month] [Year] Prof. Dr. Jacques PASQUIER ROCHA & Dr. Patrik FUHRER Software Engineering Group. [Other supervisors]

[Title] M A S T E R T H E S I S. [Month] [Year] Prof. Dr. Jacques PASQUIER ROCHA & Dr. Patrik FUHRER Software Engineering Group. [Other supervisors] [Title] [Subtitle] M A S T E R T H E S I S [FIRSTNAME] [LASTNAME] [Month] [Year] Thesis supervisors: Prof. Dr. Jacques PASQUIER ROCHA & Dr. Patrik FUHRER Software Engineering Group [Other supervisors]

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Graphic standards guide

Graphic standards guide Graphic standards guide Pantone Pantone Black Pantone 492 C Pantone 7413 C Pantone 173 C Quadricromia Quadricolour Quadrichromie Cuatricromia Preto/Black/Noir/Negro/K C50% / M100% / Y90% / K0% C10% / M55%

More information

Juice Rehab. Lunch Box Detox

Juice Rehab. Lunch Box Detox Juice Rehab Lunch Box Detox Breakfast, Lunch and healthy snacks delivered to your door! Healthy, nutritious and all made from Living foods that taste amazing. 1.Radiance This menu plan includes a smoothie,

More information

HMH : Site Consolidation Batch 3B June Wireframes - Customer Care : v 1.3

HMH : Site Consolidation Batch 3B June Wireframes - Customer Care : v 1.3 HMH : Site Consolidation Batch B June Wireframes - Customer Care : v. Copyright 0. This document shall not be disclosed to any person other than authorized representatives of HMH without the Document Overview

More information

Fraud Awareness Training

Fraud Awareness Training UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for

More information

Solve your toughest challenges with data mining

Solve your toughest challenges with data mining IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could

More information

Understanding Microsoft s BI Tools

Understanding Microsoft s BI Tools Understanding Microsoft s BI Tools The purpose of this document is to provide a high level understanding of what tools Microsoft has to support the concepts of data warehousing, business intelligence,

More information

Retargeting Technology. www.adrolays.com

Retargeting Technology. www.adrolays.com Retargeting Technology INTRODUCTION More than 89% of all visitors leave a website without buying anything. adrolays retargeting is a qualitative high value solution, that offers potential customers incentives

More information

IBM Counter Fraud Signature Solutions

IBM Counter Fraud Signature Solutions IBM Counter Fraud Signature Solutions November 5th, 2013 Athens Carmen Ene, VP IBM Global Business Services, Europe Leader Counter Fraud & Financial Crimes Provider ID Theft o Claim for routine services

More information

I WORK FOR UX PORTFOLIO GUIDANCE

I WORK FOR UX PORTFOLIO GUIDANCE I WORK FOR UX PORTFOLIO GUIDANCE CONTENTS INTRODUCTION 3 THE DESIGN OF YOUR PORTFOLIO 4 UX DELIVERABLES CLIENTS WANT TO SEE 8 TIPS 14 ABOUT ZEBRA PEOPLE 15 INTRODUCTION Viewing, sending and receiving feedback

More information

HMS Helps US Healthcare System Operate more Efficiently with Automated Identity and Access Management

HMS Helps US Healthcare System Operate more Efficiently with Automated Identity and Access Management CUSTOMER SUCCESS STORY MAY 2014 HMS Helps US Healthcare System Operate more Efficiently with Automated Identity Access Management CLIENT PROFILE Industry: Healthcare Company: HMS Employees: 2,000-plus

More information

IPT 2015 Sales & Use Tax Symposium Indian Wells, CA. Tax Accrual Data Analytics Dashboards to Minimize Risk

IPT 2015 Sales & Use Tax Symposium Indian Wells, CA. Tax Accrual Data Analytics Dashboards to Minimize Risk IPT 2015 Sales & Use Tax Symposium Indian Wells, CA Tax Accrual Data Analytics Dashboards to Minimize Risk Presenters Holly Hamby Weatherford IT Director Tax Holly.Hamby@weatherford.com Les Jackson Deloitte

More information

OVERVIEW. Team Valio. Brief from Valio. Testing Lohkeava Yoghurt. Current Packaging Analysis. Research. Concepts 1-6. Campaign

OVERVIEW. Team Valio. Brief from Valio. Testing Lohkeava Yoghurt. Current Packaging Analysis. Research. Concepts 1-6. Campaign TEAM VALIO OVERVIEW Team Valio Brief from Valio Testing Lohkeava Yoghurt Current Packaging Analysis Research Concepts 1-6 Campaign Ram Sankar Mengqi Kang Anja-Lisa Hirscher Tommi Leskinen Pinja Juvonen

More information