THE ROLE OF MODEL VERIFICATION IN MODEL RISK MANAGEMENT

Size: px
Start display at page:

Download "THE ROLE OF MODEL VERIFICATION IN MODEL RISK MANAGEMENT"

Transcription

1 THE ROLE OF MODEL VERIFICATION IN MODEL RISK MANAGEMENT A QuantUniversity Whitepaper By Sri Krishnamurthy, CFA sri@quantuniversity.com

2 1 CONTENTS 1. Introduction: Model Verification and Model Validation A need for formal Model Verification in Model Risk Management Determining the degree of accuracy of implementation Adherence to regulatory requirements and guidance documents Adherence to internal model risk and deployment policies Understanding the art and science of model building Elements of Model Verification Scoping the Model Verification process Model Scope Model Specification -> Model Design -> Model Implementation Defining acceptance criteria Model Implementation Checks The Levers for the model: Input /Output Analysis Failure modes Determining the degree of correctness Model Policy and Process Checks Model Verification Reporting Summary References:... 10

3 2 THE ROLE OF MODEL VERIFICATION IN MODEL RISK MANAGEMENT 1. INTRODUCTION: The financial crisis of 2008 and the regulatory initiatives since then have put the spotlight on financial models and the need to manage model risk in financial institutions. More and more financial institutions are formally incorporating model risk management programs and are changing model development, testing and deployment processes to adhere to regulatory guidelines and best practices. Since the field is relatively new and best practices still evolving, organizations have had to try out various initiatives to customize model risk management programs that balance regulatory requirements and organizational objectives. As model complexity increases, model risk management becomes difficult since only a few groups in the organization know what a model actually does. Translating model designs to model implementation brings in additional challenges. First model development teams must ensure that they understand the model designs and can implement the designs accurately. For complex and proprietary financial products, quants find it challenging to communicate the design, intent and the appropriate use of quant models. Second, ensuring the model in question is implemented properly as per intended design and validating that the outputs are representative of the characteristics they are modeled after is complicated. For computer simulation models, these activities are under Model Verification and Model Validation [2] activities. Financial organizations relying are realizing the need to integrate rigorous model verification and model validation processes prior to deployment to understand and mitigate model risk. Though a lot of literature and practical guidelines are available for model validation, very little is available for model verification for financial models. In our previous article [1], we discussed best practices for the implementation of an effective model risk management program. In this article, we delve deeper into the role of model verification in model risk management. We start out by discussing the differences between model verification and model validation. We then discuss why formal model verification is necessary and make a case for the need of formal model verification as a part of model risk management. We then discuss four key elements that need to be considered as a part of a formal model verification process. We hope through this article, we can highlight the importance of model verification in building a robust model risk management practice.

4 3 2. MODEL VERIFICATION AND MODEL VALIDATION Though the concepts of model verification and validation are relatively new in finance, it is a wellestablished science and is widely adopted in fields such as design engineering and manufacturing. Whether it is designing structures that support skyscrapers or crash tests for cars, computer models are built to simulate actual conditions and to test how the model would behave when exposed to various input parameters and stresses. During this process, verification and validation is done to determine compliance to design and to determine if the model behaves as a real-world process would. One of the best definitions of verification and validation is found in a Department of Defense note [3]. Verification is defined as: The process of determining that a model or simulation implementation and its associated data accurately represent the developer s conceptual description and specifications. Validation is defined as: The process of determining the degree to which a model or simulation and its associated data are an accurate representation of the real world from the perspective of the intended uses of the model. Note that the primary goal of verification is to ensure correctness and to determine if the implementation accurately reflects the design specification. The goal of validation is to determine how closely the model reflects the behavior of the process/product it represents. In financial model risk management, many times verification and validation are clubbed under the umbrella of model validation. In model risk literature, Morini[4] was one of the first to draw attention to the role of model verification in model risk management. In this excellent reference for model risk, Morini discusses a scheme for model validation and notes the importance of model verification primarily as a check for internal consistency. Though model verification and validation are used in managing model risk, it is essential to treat both processes separately to ensure that a systematic approach can be taken to address model verification and validation. Let s discuss the need for formal model verification next.

5 4 3. A NEED FOR FORMAL MODEL VERIFICATION IN MODEL RISK MANAGEMENT One might argue that model verification easier in engineering and physical sciences where the laws of physics govern processes enabling the design of replicable processes based on test data. In finance, history rarely repeats itself and historical data provides limited value for verification. Even worse, for new innovations and custom financial engineering products (such as structured products), there isn t enough historical data to do proper model verification. If this is the case, what role does model verification play in finance for model risk management? There are multiple reasons to advocate for a formal model verification step in the model review and validation process. We list the main ones here: 3.1. Determining the degree of accuracy of implementation A model is typically made up of multiple components and dependencies. In fact, the Supervisory Guidance on Model Risk Management [5] notes: A model consists of three components: an information input component, which delivers assumptions and data to the model; a processing component, which transforms inputs into estimates; and a reporting component, which translates the estimates into useful business information. In order to ensure that the model works as designed, each component of the model should do its part and overall, the model should perform as per design. Having a formal model verification process facilitates verifying if each component and the model as a whole perform the role it was designed to perform. This includes ensuring that the data and inputs are correct, the processing component computes the requisite metrics as designed and the reporting or output component displays or stores results accurately. In addition, many models may not be fully developed in-house and require data and code sourced from third-party vendors and consultants. Even if the model wasn t fully developed within the organization, the impetus of ensuring that the model works as per design is still on the organization. A formal model verification step acts as a gating process to ensure that the model can be deployed. Even if the model s code wasn t sourced from outside, many organizations reuse code built for other models requiring testing to verify if the reused code provides the desired functionality. Also, models are typically developed by multiple people and sometimes different groups. A formal verification step can be used to verify if the integrated model works as desired. A key challenge organizations face when building models is dealing with legacy code. When I worked for a large financial company, I realized the challenges of working with legacy code when building models. The project required using four libraries developed in three different languages and was developed over ten years by different groups and from an acquired company. Companies which have gone through mergers and acquisitions, inherit legacy code when companies and departments merge. Sometimes, the original developers are no longer available but models and functions continue to be used. When legacy code is integrated with new code to build models, it is important to ensure that the model functions as per design. A formal model verification step helps ensuring this.

6 Adherence to regulatory requirements and guidance documents There have been many regulatory efforts to advocate best practices for model risk management. The Dodd Frank Act, Basel and the Solvency frameworks each address model risk and provide guidance on how institutions can incorporate model risk management programs. The Supervisory Guidance on Model Risk Management [5] is one of the key regulatory documents that provides extensive guidance on best practices and expectation of regulators when addressing model risk. Though model verification isn t explicitly addressed, many of the key aspects that model verification addresses are mentioned in this document. A key statement in section Model Development and Implementation of the OCC document [5] notes: Developers should ensure that the components work as intended, are appropriate for the intended business purpose, and are conceptually sound and mathematically and statistically correct. This essentially captures the essence of a formal model verification process Adherence to internal model risk and deployment policies In addition to regulatory requirements, companies have internal model risk policies and guidelines for internal groups. Many quantitative models developed in financial companies are proprietary and it is essential to vet them to ensure that companies aren t taking excessive risk by trusting models that aren t adequately tested and verified. In addition to the technical requirements of a model, quant groups are expected to implement business rules and organizational mandates into the model to ensure that using the model adheres to internal policies. Formal model verification can be used to check the adherence to various model risk policies adopted by the organization. In addition when models are deployed into production, models are modified to comply with information technology (IT) deployment policies. These may include authentication and authorization rules, logging, transaction management, exception handling etc. In addition to software testing, formal model verification can check adherence to IT deployment policies. Finally, it is widely acknowledged that quantitative models are complex and only a few people, typically the model development group, understand the intricacies of the model. The model validation group can adopt model verification into the model validation process to verify functionality of the models. Since the senior and supervisory management typically don t get to review of the details of specific models, incorporating formal model verification and setting expectations on clearance criteria at a policy level helps senior management ensure that the model risk policies are implemented Understanding the art and science of model building Model development is both an art and a science and so is model verification. The same model can implemented in multiple ways, using multiple algorithms and in different programming languages. Model verification requires understanding the design intent and the implementation of the model and thoroughly testing if the model performs well both under normal and stressed conditions. In addition, model verifiers must creatively device tests to verify if the model has weaknesses in handling edge cases or abnormal inputs. Failure and error handling analysis, i.e. whether a model fails gracefully with informative error messages or abruptly, is another area that would require model verifiers to creatively device tests that would cause models to fail and analyze failure modes. Leveraging the best practices of model development and programming language specific guidelines, a formal model verification step can uncover many issues that may not have been observed or encountered by model developers.

7 6 4. ELEMENTS OF MODEL VERIFICATION Now that we understand the need of model verification in model risk management, what constitutes model verification? Having worked with many clients verifying their models, we have developed best practices that we advocate to clients to help create and adopt a formal model verification program. We have devised a four-step model verification process that we believe every model verification process should have. The four steps are summarized in Figure 1 and elaborated in this section. Scoping the Model Verification process Model Implementation Checks Model Policy and Process Checks Model Verification Reportiing Figure 1: The Model Verification process 4.1. Scoping the Model Verification process Prior to model verification, it is essential that the scope of the model verification process be defined and all stakeholders (Supervisors, End-Users, IT, Model developers, Model Validators) aware of the process and the criteria used in the verification of the models. Let s discuss this in detail MODEL SCOPE We believe that the scope of model verification must include all the elements of the model that fall under the purview of model risk management. The verification of the model should include the model (source code and executables), input and output files, dependent libraries and execution environments that closely mirror how the model would be used. We also advocate reviewing associated documentation (including design documentation, methodology documentation and end-user guides), test plans and test results. How to systematically collect all the components required for model review? In manufacturing, a product assembly is typically associated with a Bill-of-materials (BOM). The BOM provides a comprehensive list of all the components that go into the final product and helps in ensuring that the finished product complies with the design. We advocate maintaining a Model BOM that captures all the software components and the associated dependencies that are required for a model. The scope of model verification should include verification of all the components listed and maintained in the Model BOM and the associated documents and artifacts (like drawings, workflows) that detail how the various components interact in the design of the model.

8 MODEL SPECIFICATION -> MODEL DESIGN -> MODEL IMPLEMENTATION Typically, quant researchers prepare a formal model specification that describes the model in detail, any modeling assumptions, mathematics and the modeling approach. The specification forms the basis for a design specification that details how the model would be implemented. Model prototyping is typically done to demonstrate the feasibility and the characteristics of the final model. The implementation team would then implement the production model in a chosen software platform. Since the final model is the realization of the model specification and design, model verification should include verification of the model along with the model specification and associated design documents. Note that the goal here is not to question the model s specification and approach. The goal is verify if the model is implemented as per the specification and design. Formal model validation is where the validity of the model to meet its intended purpose would be addressed DEFINING ACCEPTANCE CRITERIA To determine the correctness of implementation of the model, it is essential to first determine acceptance criteria. This helps communicate the intent and get agreement amongst stakeholders on the verification process. It also helps set the bar that needs to be achieved for the model to clear the model verification process. Acceptable accuracy of desired results and tests to be conducted needs to be defined prior to verification. A review of model assumptions and approximations need to be done to determine what tests are feasible and appropriate for the model. Performance criteria and service level agreements (SLA) need to be defined to ensure that the model meets design criteria and end-user requirements. It is recommended that the acceptance criteria be reviewed by the stakeholders prior to the model verification process to set appropriate expectations on the model verification process Model Implementation Checks Model implementation verification is not trivial and is both an art and a science. It requires expertise in programming and design and also requires understanding the mathematical model and modeling approach that was implemented. Since this is a complex task, a formal model implementation verification plan needs to be developed after reviewing the model specification and design and understanding the model acceptance criteria. Domain experts and implementation specialists should be consulted and the plan reviewed to ensure completeness of the plan. At a minimum, the plan should include the following three elements as a part of the model implementation checks THE LEVERS FOR THE MODEL: INPUT /OUTPUT ANALYSIS Most models are designed to process inputs and generate certain outputs. The input parameter space must be reviewed and tests designed to evaluate how the model performs for different values of inputs and outputs. These tests should include normal and permissible input ranges and invalid and stressed inputs. A review on whether the model performs as expected must be conducted and its impact assessed and documented. Special attention must be paid to check input validation, failure modes and controls to prevent unknown or unintended behaviors (see section 4.2.2). I have found that even basic what-if analysis (For example, specifying invalid correlations, invalid date/calendar specifications etc.) can reveal problems and inconsistencies in models and when feasible, I prefer to do thorough parameter sweeps to test how the model performs for a wide range of values. A review of test plans and test results conducted by the model development team helps determine the rigor of testing and if adequate testing was done during development. Any issues found should be captured and reviewed to

9 8 determine how critical the issues are and whether there are sufficient controls in place to address the risk posed by these issues. Refer our paper on quantifying model risk [6] for additional details on this topic FAILURE MODES Error and exception handling is key to ensure that a model is designed robustly and can be trusted to operate not only under normal conditions but also when a model encounters unanticipated conditions. A well-designed model must anticipate potential issues and implement controls to address unanticipated failures appropriately. Model verification tests must check how models behave if invalid/extreme inputs are presented to the model. When invalid inputs are presented, tests must be conducted to evaluate if the models communicate intelligible error messages back to the users, whether models log messages appropriately for replication and whether a model gracefully exits or crashes without messages. Failure testing is as much as an art as a science and isn t trivial. Many times models have multiple parameters and testing for all possible combinations of parameters is practically impossible. Model verifiers must creatively design tests to create failure conditions. Input validation is a key part of the model and it ensures that invalid inputs are caught early and doesn t let the model continue if invalid inputs are presented. This is a common practice in manufacturing and engineering. I recollect my experience as a mechanical engineer stress testing hydraulic pumps. The input hoses connected to the pump were designed to fail early and protect the hydraulic pump. The goal of stress testing was to ensure that when an abnormally high pressure (invalid input) was applied, the hoses fail before the high pressure fluid reached the hydraulic pump. Hoses are 1/100 th of the cost of the hydraulic pump and are easily replaceable in the field. We can draw parallels to input validation where checking for invalid inputs in the model before processing protects the model from potential model failures. In models expected to do transactions, output analysis is crucial. Models must be checked if state management of variables is done appropriately to ensure that in the event of model failures, transactions are rolled back and invalid states cleared. Tests must also be done to verify if appropriate logs and variable dump files are created to facilitate debugging and replication of issues. Unanticipated model failures may occur due to multiple reasons and it is impossible to forecast all potential failures. But with adequate planning, systematic testing for errors and ensuring that appropriate controls are implemented, model failures can be minimized reducing the risk of catastrophic failures DETERMINING THE DEGREE OF CORRECTNESS Checking if a model generates acceptable results is remarkably complex especially for complex financial products and for products that have limited historical data. The model verification and acceptance criteria define the degree of correctness expected in the models results. One way to verify if the model generated results meet acceptance criteria is to benchmark results from the model with an independently created model in an alternate language/platform. This could be prototypes quants developed or alternate simplified models that generates results. If a model is meant to replace an existing model, backward compatibility tests can be conducted and the existing model can be used as the reference model. In addition, interactive debugging and code and variable introspection could be done to verify calculations. Most programming environments provide variable and state inspection tools to facilitate incremental debugging. Unit tests and functional tests enable verifying atomic functionality in the models. We also advocate reviewing test plans and test results model developers have run to verify testing results and understand the rigor of testing adopted during and after development.

10 Model Policy and Process Checks Models not only are technical implementations of the model specifications but also encapsulate organizational business rules to adhere to the policies and controls adopted by the organization. The model risk policy of an organization typically defines the regulatory and internal model policies that need to be followed when implementing models. This could include security and authentication rules, data governance policies and how the model sources inputs, processes and saves results. The model verification step should include a model policy check to ensure that the model implementation adheres to the published model risk policy. In addition, many organizations have IT and deployment guidelines to ensure that the models are ready for production. The model verification step can be used to verify compliance with IT deployment policies and if the models are indeed ready for primetime. Finally, as we noted in [1], since model risk drivers are permeated throughout the model life cycle, for effective model risk management, model risk should be addressed throughout the lifecycle of the model. The model verification step can be used to determine if the model implementation, associated documentation, test plans, results etc. comply with the documented policies for mitigating model risk throughout the model life cycle. For example, if the organization has a policy on reviewing and addressing model issues through a formal process, verifying lists of outstanding issues, reviewing how well they are tracked, categorized, fixed and tested, sheds light on the rigor of addressing model risk and checking for evidence of the policy implementation. This could be used to identify gaps in testing and verification and to introduce improvements into the model lifecycle management processes Model Verification Reporting Once the model verification is completed, the results must be appropriately documented and shared with the respective stakeholders for review. We believe that a comprehensive report on model verification helps assess the maturity of the model is and if it is truly ready for deployment. Typically, the model risk committee reviews the results against the acceptance criteria and determines a plan of action to address issues that require attention prior to deployment. After agreement from the model development team, the plan of action should be documented and communicated to the stakeholders including senior and supervisory management. 5. SUMMARY In this article, we discussed the role of model verification in model risk management. We differentiated model verification from model validation and discussed the need of a formal model verification process. We then discussed four elements that we believe are essential components of a formal model verification process. Many of the aspects of model verification we discuss here are meant to provide practical tips to operationalize the best practices of model risk management and to facilitate addressing many model risk concerns regarding model verification. We encourage readers to consider customizing and adopting a formal model verification process as a part of their model review and validation processes. We believe that formal model verification enables taking a systematic approach to address model risk and assists in building a robust model risk management practice.

11 10 6. REFERENCES: 1. Krishnamurthy, S. (2014), The Decalogue. Wilmott, 2014: DoD Modeling and Simulation (M&S) Verification, Validation, and Accreditation (VV&A), ), DoD Instruction , December 9, Morini, M. (2011) Understanding Model Risk, in Understanding and Managing Model Risk: Practical Guide for Quants, Traders and Validators, John Wiley & Sons, Ltd 5. OCC /SR 11-7: Supervisory Guidance on Model Risk Management 6. Krishnamurthy, S. (2014), Quantifying Model Risk. Wilmott, 2014: 56 59

12 11 BIO: Sri Krishnamurthy, CFA, CAP is the founder of a data and quantitative analysis company. QuantUniversity recently launched a new offering called Model Risk Analytics and offers advisory services for model risk management. Sri has advised with more than 25 customers providing asset management, energy analytics, risk management and trading solutions and teaches quantitative methods and analytics for MBA students at Babson College. He is the author of several quantitative finance articles and is working on the forthcoming book published by Wiley titled Financial Application Development: A case study approach. He can be reached at sri@quantuniversity.com. For more information contact on our Model Risk contact: QuantUniversity, LLC A data and quantitative analysis company Sri@quantuniversity.com

Model Risk Management (MRM)

Model Risk Management (MRM) Model Risk Management (MRM) 2015 SEAC Fall Meeting Dwayne Husbands November 20, 2015 Overview Introduction Model risk management framework Common challenges Page 1 Introduction Background Model risk management

More information

KPMG s financial management practice

KPMG s financial management practice KPMG s financial management practice kpmg.com KPMG LLP s (KPMG) Financial Management (FM) practice supports the growing agenda and increased responsibilities of the CFO. We work with our clients with passion

More information

CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide

CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide processlabs CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide CMMI-DEV V1.3 Process Areas Alphabetically by Process Area Acronym processlabs CAR - Causal Analysis and Resolution...

More information

2010 ERP REPORT. Organizational Change Management

2010 ERP REPORT. Organizational Change Management 2010 ERP REPORT Organizational Change Management LLC. All reserved. No unauthorized reproduction without the author s written consent. All references to this publication must cite Panorama Consulting Group

More information

EXECUTIVE BRIEFING Achieving Risk Regulatory Compliance Overcoming the Data Integration Challenges

EXECUTIVE BRIEFING Achieving Risk Regulatory Compliance Overcoming the Data Integration Challenges Achieving Risk Regulatory Compliance Overcoming the Data Integration Challenges Management Summary Principles for effective risk data aggregation and risk reporting Risk data aggregation and reporting

More information

R.POONKODI, ASSISTANT PROFESSOR, COMPUTER SCIENCE AND ENGINEERING, SRI ESHWAR COLLEGE OF ENGINEERING, COIMBATORE.

R.POONKODI, ASSISTANT PROFESSOR, COMPUTER SCIENCE AND ENGINEERING, SRI ESHWAR COLLEGE OF ENGINEERING, COIMBATORE. R.POONKODI, ASSISTANT PROFESSOR, COMPUTER SCIENCE AND ENGINEERING, SRI ESHWAR COLLEGE OF ENGINEERING, COIMBATORE. UNIT I INTRODUCTION Testing as an Engineering Activity Testing as a Process Testing axioms

More information

Certified Identity Governance Expert (CIGE) Overview & Curriculum

Certified Identity Governance Expert (CIGE) Overview & Curriculum Overview Identity and Access Governance (IAG) provides the link between Identity and Access Management (IAM) rules and the policies within a company to protect systems and data from unauthorized access,

More information

Best Practices for the Architecture, Design, and Modernization of Defense Models and Simulations

Best Practices for the Architecture, Design, and Modernization of Defense Models and Simulations 1 Best Practices for the Architecture, Design, and Modernization of Defense Models and Simulations Dr. Katherine L. Morse, JHU/APL Brian Miller, US Army CERDEC NVESD Michael Heaphy, OSD(AT&L)/DMSCO Outline

More information

Data maturity model for digital advertising

Data maturity model for digital advertising Data maturity model for digital advertising Prepared for: Introduction why develop a data maturity model? The past decade has seen companies in media, advertising, marketing and commerce rapidly transition

More information

CMMI for Services Quick Reference

CMMI for Services Quick Reference CAPACITY AND AVAILABILITY MANAGEMENT PROJECT & WORK MGMT (ML3) The purpose of Capacity and Availability Management (CAM) is to ensure effective service system performance and ensure that resources are

More information

THE PROMISE SERVICE IT S HERE AND NOW

THE PROMISE SERVICE IT S HERE AND NOW THE PROMISE OF AS-A- SERVICE IT S HERE AND NOW THE PROMISE OF AS-A-SERVICE: IT S HERE AND NOW In 2015, when Accenture and HfS surveyed executives about the maturity of an as-a-service delivery model for

More information

Axioma Risk Model Machine

Axioma Risk Model Machine Axioma Risk Model Machine CUSTOMIZABLE RISK MODELS TAILORED TO YOUR INVESTMENT PROCESS Axioma Risk Model Machine is an innovative tool allowing clients to easily build custom risk models. Custom risk models

More information

How mature is my test organization: STDM, an assessment tool

How mature is my test organization: STDM, an assessment tool How mature is my test organization: STDM, an assessment tool Bonney Joseph, (Bonney.joseph@wipro.com) Nikhil Gupta, (Nikhil.gupta@wipro.com) Abstract Software ing thought of as a support function until

More information

The Critical Role of Talent Analytics in Successful Mergers and Acquisitions

The Critical Role of Talent Analytics in Successful Mergers and Acquisitions The Critical Role of Talent Analytics in Successful Mergers and Acquisitions The art and science of managing human capital to create people-driven synergies Why 70% of M&A transactions don t achieve expected

More information

SYSTEMS MODELING AND SIMULATION (SMS) A Brief Introduction

SYSTEMS MODELING AND SIMULATION (SMS) A Brief Introduction SYSTEMS MODELING AND SIMULATION (SMS) A Brief Introduction Edward A. Ladzinski, CEO & Co-founder Phone: +1-704-254-1643 Email: ed.ladzinski@smsthinktank.com Frank W. Popielas, Managing Partner & Co-founder

More information

CMMI-SVC V1.3 CMMI for Services Version 1.3 Quick Reference Guide

CMMI-SVC V1.3 CMMI for Services Version 1.3 Quick Reference Guide processlabs CMMI-SVC V1.3 CMMI for Services Version 1.3 Quick Reference Guide CMMI-SVC V1.3 Process Areas Alphabetically by Process Area Acronym processlabs CAM - Capacity and Availability Management...

More information

CMMI V2.0 MODEL AT-A-GLANCE. Including the following views: Development Services Supplier Management. CMMI V2.0 outline BOOKLET FOR print.

CMMI V2.0 MODEL AT-A-GLANCE. Including the following views: Development Services Supplier Management. CMMI V2.0 outline BOOKLET FOR print. CMMI V.0 MODEL AT-A-GLANCE Including the following views: Development Services Supplier Management CMMI V.0 outline BOOKLET FOR print.indd CMMI V.0 An Integrated Product Suite Designed to meet the challenges

More information

3 STEPS TO MAKE YOUR SHARED SERVICE ORGANIZATION A DIGITAL POWERHOUSE

3 STEPS TO MAKE YOUR SHARED SERVICE ORGANIZATION A DIGITAL POWERHOUSE GUIDE 3 STEPS TO MAKE YOUR SHARED SERVICE ORGANIZATION A DIGITAL POWERHOUSE www.celonis.com IN THIS GUIDE Shared-service organizations (SSOs) are about to get a digital upgrade. For decades, SSOs have

More information

Driving Better Business Outcomes. Jason Dunn IT Project Management Office Freddie Mac September 25, 2015

Driving Better Business Outcomes. Jason Dunn IT Project Management Office Freddie Mac September 25, 2015 Driving Better Business Outcomes Jason Dunn IT Project Management Office Freddie Mac September 25, 2015 1 A few simple questions Do you feel that it is important to know how your investments are doing?

More information

This resource is associated with the following paper: Assessing the maturity of software testing services using CMMI-SVC: an industrial case study

This resource is associated with the following paper: Assessing the maturity of software testing services using CMMI-SVC: an industrial case study RESOURCE: MATURITY LEVELS OF THE CUSTOMIZED CMMI-SVC FOR TESTING SERVICES AND THEIR PROCESS AREAS This resource is associated with the following paper: Assessing the maturity of software testing services

More information

Dynamic Simulation and Supply Chain Management

Dynamic Simulation and Supply Chain Management Dynamic Simulation and Supply Chain Management White Paper Abstract This paper briefly discusses how dynamic computer simulation can be applied within the field of supply chain management to diagnose problems

More information

This chapter illustrates the evolutionary differences between

This chapter illustrates the evolutionary differences between CHAPTER 6 Contents An integrated approach Two representations CMMI process area contents Process area upgrades and additions Project management concepts process areas Project Monitoring and Control Engineering

More information

Chapter 6. Software Quality Management & Estimation

Chapter 6. Software Quality Management & Estimation Chapter 6 Software Quality Management & Estimation What is Quality Management Also called software quality assurance (SQA) s/w quality:- It is defined as the degree to which a system, components, or process

More information

Chief Executive Officers and Compliance Officers of All National Banks, Department and Division Heads, and All Examining Personnel

Chief Executive Officers and Compliance Officers of All National Banks, Department and Division Heads, and All Examining Personnel O OCC 2000 16 OCC BULLETIN Comptroller of the Currency Administrator of National Banks Subject: Risk Modeling Description: Model Validation TO: Chief Executive Officers and Compliance Officers of All National

More information

Work Plan and IV&V Methodology

Work Plan and IV&V Methodology Work Plan and IV&V Methodology Technology initiatives and programs should engage with an IV&V process at the project planning phase in order to receive an unbiased, impartial view into the project planning,

More information

Using Measures and Risk Indicators for Early Insight Into Software Product Characteristics such as Software Safety

Using Measures and Risk Indicators for Early Insight Into Software Product Characteristics such as Software Safety Using Measures and Risk Indicators for Early Insight Into Software Product Characteristics such as Software Safety Victor R. Basili Univeristy of Maryland and Fraunhofer Center for Experimental, Maryland

More information

Implementing Analytics in Internal Audit. Jordan Lloyd Senior Manager Ravindra Singh Manager

Implementing Analytics in Internal Audit. Jordan Lloyd Senior Manager Ravindra Singh Manager Implementing Analytics in Internal Audit Jordan Lloyd Senior Manager Ravindra Singh Manager What does Success Look Like To deliver successful analytical insight as an everyday part of the audit process

More information

Service Virtualization

Service Virtualization Service Virtualization A faster, more efficient and less costly way to develop and test enterprise-class applications As cloud and mobile computing gain rapid acceptance, IT departments are expected to

More information

Top 35 Reasons You Need Contact Center Performance Management

Top 35 Reasons You Need Contact Center Performance Management Top 35 Reasons You Need Contact Center Performance Management February 2014 Sponsored by: - 1 - DMG Consulting LLC Table of Contents Introduction... 1 Real-Time and Historical CCPM... 1 Top Reasons to

More information

SOA Research Agenda. Grace A. Lewis

SOA Research Agenda. Grace A. Lewis Workshop SOA Research Agenda Grace A. Lewis Workshop Approach Broadened the scope of the research agenda to show that we are interested in more than just SOA as an architectural style Performed an extensive

More information

Session 42, Model Governance: What Could Possibly Go Wrong? Part I. Moderator: David R.W. Payne, MAAA, FCAS

Session 42, Model Governance: What Could Possibly Go Wrong? Part I. Moderator: David R.W. Payne, MAAA, FCAS Session 42, Model Governance: What Could Possibly Go Wrong? Part I Moderator: David R.W. Payne, MAAA, FCAS Presenter: Dwayne Allen Husbands, FSA, MAAA David R.W. Payne, MAAA, FCAS Chad R. Runchey, FSA,

More information

DORNERWORKS QUALITY SYSTEM

DORNERWORKS QUALITY SYSTEM DORNERWORKS QUALITY SYSTEM ALIGNMENT WITH CMMI INTRODUCTION Since its beginning, DornerWorks has had quality as one of our main goals. We have delivered solutions for over a dozen aircraft, including several

More information

Alpha 2 (Alpha Squared) Generating Outsized Returns in Private Equity with Two Layers of Analytics

Alpha 2 (Alpha Squared) Generating Outsized Returns in Private Equity with Two Layers of Analytics Alpha 2 (Alpha Squared) Generating Outsized Returns in Private Equity with Two Layers of Analytics By George E. Danner President Business Laboratory Introduction Private Equity General Partner (GP) firms

More information

Kseniia Jones Senior Manager Global Risk Advisory Deloitte UK

Kseniia Jones Senior Manager Global Risk Advisory Deloitte UK Inside magazine - Edition 2018 You and I were The rise of managed services Hugo Morris Partner Managed Risk Services Deloitte UK Mark Whitehead Director UK Risk Advisory Deloitte UK Kseniia Jones Senior

More information

4/26. Analytics Strategy

4/26. Analytics Strategy 1/26 Qlik Advisory As a part of Qlik Consulting, Qlik Advisory works with Customers to assist in shaping strategic elements related to analytics to ensure adoption and success throughout their analytics

More information

active business INTELLIGENCE CONNECTING INFORMATION TECHNOLOGY TO WORKFLOW

active business INTELLIGENCE CONNECTING INFORMATION TECHNOLOGY TO WORKFLOW Copyright 2014 by the Construction Financial Management Association. All rights reserved. This article first appeared in CFMA Building Profits. Reprinted with permission. active business CONNECTING INFORMATION

More information

Strategy Analysis. Chapter Study Group Learning Materials

Strategy Analysis. Chapter Study Group Learning Materials Chapter Study Group Learning Materials 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters to use and modify this content to support chapter activities. All

More information

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2 Passit4Sure.OG0-093.221Questions Number: OG0-093 Passing Score: 800 Time Limit: 120 min File Version: 7.1 TOGAF 9 Combined Part 1 and Part 2 One of the great thing about pass4sure is that is saves our

More information

CMMI for Acquisition Quick Reference

CMMI for Acquisition Quick Reference AGREEMENT MANAGEMENT PROJECT MANAGEMENT (ML2) The purpose of Agreement Management (AM) is to ensure that the supplier and the acquirer perform according to the terms of the supplier agreement. SG 1 The

More information

Model Risk Management in Financial Services

Model Risk Management in Financial Services WHITE PAPER 1 WHITE PAPER Challenge Financial services organizations are facing increasing regulatory scrutiny with regard to how they measure and manage model risk. At Stake Non-compliance could have

More information

Transformation Enablement

Transformation Enablement Offering Overview Transformation Enablement Ensure your organization s digital transformation initiatives achieve radically different levels of performance and quickly capture value with Cognizant Digital

More information

How to Tackle Core (Legacy) System Challenges using APIs

How to Tackle Core (Legacy) System Challenges using APIs How to Tackle Core (Legacy) System Challenges using APIs Reduce backlog and release digital services faster with automated API integration and management for core (legacy) systems Allow your back-end systems

More information

Building smart products: best practices for multicore software development

Building smart products: best practices for multicore software development IBM Software Rational Thought Leadership White Paper Building smart products: best practices for multicore software development 2 Building smart products: best practices for multicore software development

More information

Model Risk Management

Model Risk Management Model Risk Management Brian Nappi, Crowe Horwath 2017 Crowe Horwath LLP Agenda Regulatory Perspectives on Model Risk Management Model Basics MRM Audit Considerations MRM Best Practices FAQ s 2017 Crowe

More information

TDWI strives to provide course books that are contentrich and that serve as useful reference documents after a class has ended.

TDWI strives to provide course books that are contentrich and that serve as useful reference documents after a class has ended. Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews cannot be printed. TDWI strives to provide

More information

Overview of Model Risk Control Operations

Overview of Model Risk Control Operations D O T H E M A T H Overview of Model Risk Control Operations By Sagar Balan & Vishwanathan Iyer June 4 2014 This industry benchmarking activity aims to highlight the challenges faced by MRC teams across

More information

Analytics & Risk. careers.blackrock.com

Analytics & Risk. careers.blackrock.com Analytics & Risk BlackRock was founded by eight entrepreneurs who wanted to start a very different company. One that combined the best of a financial leader and a technology pioneer. And one that focused

More information

Improved Risk Management via Data Quality Improvement

Improved Risk Management via Data Quality Improvement Improved Risk Management via Data Quality Improvement Prepared by: David Loshin Knowledge Integrity, Inc. January, 2011 Sponsored by: 2011 Knowledge Integrity, Inc. 1 Introduction All too frequently, we

More information

Network Optimization Handbook. Your Guide to a Better Network

Network Optimization Handbook. Your Guide to a Better Network Network Optimization Handbook Your Guide to a Better Network Who is this book for? This e-book is for IT leaders who are ready to adopt a proactive approach to optimizing their networks and who want insights

More information

Policy Administration Transformation

Policy Administration Transformation Financial Services the way we do it Policy Administration Transformation Helping insurers capture dramatic improvements in time-to-market, product or price leadership and operational excellence The insurance

More information

Testing: The Critical Success Factor in the Transition to ICD-10

Testing: The Critical Success Factor in the Transition to ICD-10 Testing: The Critical Success Factor in the Transition to ICD-10 The United States (US) adopted the International Classification of Diseases, 9th Edition, Clinical Modification (ICD-9-CM) in 1979. During

More information

Chapter 3 Prescriptive Process Models

Chapter 3 Prescriptive Process Models Chapter 3 Prescriptive Process Models - Generic process framework (revisited) - Traditional process models - Specialized process models - The unified process Generic Process Framework Communication Involves

More information

WHITE PAPER. ERP and Enterprise Performance Management Best Practices

WHITE PAPER. ERP and Enterprise Performance Management Best Practices WHITE PAPER ERP and Enterprise Performance Management Best Practices Table of Contents 3 Using ERP for All Your Consolidations and Reporting Needs Costs Customization Value Add Activities Solving the ERP

More information

THE FIVE BUILDING BLOCKS OF AN EXCEPTIONAL WEB EXPERIENCE. Your guide to winning the personalization race.

THE FIVE BUILDING BLOCKS OF AN EXCEPTIONAL WEB EXPERIENCE. Your guide to winning the personalization race. THE FIVE BUILDING BLOCKS OF AN EXCEPTIONAL WEB EXPERIENCE. Your guide to winning the personalization race. 2018 EXECUTIVE SUMMARY The most important component for brand relevance and long-term customer

More information

A Measurement Approach Integrating ISO 15939, CMMI and the ISBSG

A Measurement Approach Integrating ISO 15939, CMMI and the ISBSG A Measurement Approach Integrating ISO 15939, CMMI and the ISBSG Luc Bégnoche, Alain Abran, Luigi Buglione Abstract In recent years, a number of well-known groups have developed sets of best practices

More information

Accelerate Innovation by Improving Product Development Processes

Accelerate Innovation by Improving Product Development Processes Accelerate Innovation by Improving Product Development Processes W H I T E PA P E R Getting from concept to shipment as fast as possible is the goal of virtually every product development team. Business

More information

ECM Migration Without Disrupting Your Business:

ECM Migration Without Disrupting Your Business: ECM Migration Without Disrupting Your Business: Seven Steps to Effectively Move Your Documents Planning your enterprise content management (ECM) migration is just as important as selecting and implementing

More information

NCOVER. ROI Analysis for. Using NCover. NCover P.O. Box 9298 Greenville, SC T F

NCOVER. ROI Analysis for. Using NCover. NCover P.O. Box 9298 Greenville, SC T F NCOVER ROI Analysis for Test Coverage Using NCover NCover P.O. Box 9298 Greenville, SC 29601 T 864.990.3717 F 864.341.8312 conversation@ncover.com www.ncover.com Table of Contents Executive Summary 2 Cost

More information

PART THREE: Work Plan and IV&V Methodology (RFP 5.3.3)

PART THREE: Work Plan and IV&V Methodology (RFP 5.3.3) PART THREE: Work Plan and IV&V Methodology (RFP 5.3.3) 3.1 IV&V Methodology and Work Plan 3.1.1 NTT DATA IV&V Framework We believe that successful IV&V is more than just verification that the processes

More information

Turnkey or Time Bomb?

Turnkey or Time Bomb? Turnkey or Time Bomb? Marketers should take a closer look at turnkey CRM solutions CRM architectures are a complex collection of processes that must be kept in alignment. At times, even the best architectures

More information

Enhancing Utility Outage Management System (OMS) Performance

Enhancing Utility Outage Management System (OMS) Performance Enhancing Utility Outage Management System (OMS) Performance by John Dirkman, P.E. Executive summary Traditional grid outage management systems suffer from two fundamental flaws: they lack an accurate,

More information

MEETING THE CHALLENGE OF TRANSFORMATIONAL CHANGE:

MEETING THE CHALLENGE OF TRANSFORMATIONAL CHANGE: MEETING THE CHALLENGE OF TRANSFORMATIONAL CHANGE: Do You Have the Transformational Change Leadership to Cross the Abyss? Implementation Management Associates, Inc. Corporate Headquarters 1658 Cole Blvd.

More information

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation Chapter 2 Software Processes Lecture 1 Software process descriptions When we describe and discuss processes, we usually talk about the activities in these processes such as specifying a data model, designing

More information

Standing up to the semiconductor verification challenge

Standing up to the semiconductor verification challenge 43 Bill Butcher Standing up to the semiconductor verification challenge Companies should seek faster, more cost-effective ways to test the quality of complex system-on-a-chip devices. Aaron Aboagye, Mark

More information

Source-to-pay: Delivering value beyond savings

Source-to-pay: Delivering value beyond savings Source-to-pay: Delivering value beyond savings Transforming the source-to-pay process Because the source-to-pay (S2P) process crosses three organizations procurement, finance, and IT an outdated and manual

More information

Software Engineering

Software Engineering Software Engineering (CS550) Software Development Process Jongmoon Baik Software Development Processes (Lifecycle Models) 2 What is a S/W Life Cycle? The series of stages in form and functional activity

More information

Large Federal Agency Leverages IV&V to Achieve Quality Delivery for Critical Modernization Initiative

Large Federal Agency Leverages IV&V to Achieve Quality Delivery for Critical Modernization Initiative Large Federal Agency Leverages IV&V to Achieve Quality Delivery for Critical Modernization Initiative Capgemini Government Solutions provides Independent Verification and Validation (IV&V) services to

More information

A buyer s guide to data-driven HR. Which approach is best for you?

A buyer s guide to data-driven HR. Which approach is best for you? A buyer s guide to data-driven HR Which approach is best for you? You know where you want to go. Now pick your route. Smart organizations know that they need to use their HR data to do big, important things.

More information

Sharpening the tools of the trade: New Developments with FX Strategy back testing platforms

Sharpening the tools of the trade: New Developments with FX Strategy back testing platforms Sharpening the tools of the trade: New Developments with FX Strategy back testing platforms Back testing foreign exchange trading strategies has always been more difficult than it has been for equities,

More information

How I Learned to Stop Worrying and Love Benchmarking Functional Verification!

How I Learned to Stop Worrying and Love Benchmarking Functional Verification! How I Learned to Stop Worrying and Love Benchmarking Functional Verification! Mike Bartley Test and Verification Solutions SETsquared Business Acceleration Centre University Gate East, Park Row Bristol

More information

version NDIA CMMI Conf 3.5 SE Tutorial RE - 1

version NDIA CMMI Conf 3.5 SE Tutorial RE - 1 Requirements Engineering SE Tutorial RE - 1 What Are Requirements? Customer s needs, expectations, and measures of effectiveness Items that are necessary, needed, or demanded Implicit or explicit criteria

More information

Healthcare Data Management for Providers

Healthcare Data Management for Providers White Paper Healthcare Data Management for Providers Expanding Insight, Increasing Efficiency, Improving Care This document contains Confidential, Proprietary and Trade Secret Information ( Confidential

More information

Amsterdam, The future of retail banking: the customers

Amsterdam, The future of retail banking: the customers Amsterdam, 2016 The future of retail banking: the customers The future of retail banking: the customers Retail banking was long referred to as a 3 6 3 business. The bank borrows money at a 3% interest

More information

Systems Engineering Concept

Systems Engineering Concept Systems Engineering Concept WHITE PAPER February 2017 The Systems Engineering Concept provides practical hands-on methods and tools, that enable companies to meet today s global business challenges through

More information

Take-aways from EY s series of Internal Audit Analytics roundtables over 2016

Take-aways from EY s series of Internal Audit Analytics roundtables over 2016 Take-aways from EY s series of Internal Audit Analytics roundtables over 2016 2 Amsterdam Roundtable on Data Analytics for Internal Audit Over 2016 EY hosted a series of roundtables with key executives

More information

Viewpoint Link services to outcomes

Viewpoint Link services to outcomes Link services to outcomes Get engaged with business outcomes service management Table of contents Refocus on outcomes 3 Understand business outcomes service management 3 Leverage the business of IT 4 See

More information

Specialty Chemicals: Unlock Agility and Improve Customer Satisfaction Through Enhanced Production Scheduling

Specialty Chemicals: Unlock Agility and Improve Customer Satisfaction Through Enhanced Production Scheduling WHITE PAPER Specialty Chemicals: Unlock Agility and Improve Customer Satisfaction Through Enhanced Production Scheduling Edgar Aquino, Product Marketing Specialist - Supply Chain Management, Aspen Technology,

More information

Risk Mitigation in a Core Banking Conversion

Risk Mitigation in a Core Banking Conversion Risk Mitigation in a Core Banking Conversion Greg Meidt, chief information officer Chemical Bank Dick Smies, vice president IBS Conversion Services 1 800 822 6758 Introduction A core banking migration

More information

SCALING DATA MANAGEMENT TO MEET COMPLEXITY CHALLENGES: RIGHT-SIZING A SOLUTION TO FIT YOUR NEEDS

SCALING DATA MANAGEMENT TO MEET COMPLEXITY CHALLENGES: RIGHT-SIZING A SOLUTION TO FIT YOUR NEEDS SCALING DATA MANAGEMENT TO MEET COMPLEXITY CHALLENGES: RIGHT-SIZING A SOLUTION TO FIT YOUR NEEDS SCALING DATA MANAGEMENT TO MEET COMPLEXITY CHALLENGES 2 CHOOSING BETWEEN TWO EXTREME OPTIONS In the past

More information

Wipro s PLM Harmonization Framework for Successful M&A

Wipro s PLM Harmonization Framework for Successful M&A Wipro s PLM Harmonization Framework for Successful M&A CIMdata Commentary Key takeaways: PLM, which embodies the virtual assets of companies combined through mergers or acquisitions, is crucial for predicting

More information

Service-Oriented Architecture

Service-Oriented Architecture Executive s Guide to Service-Oriented Architecture ERIC A. MARKS MICHAEL BELL John Wiley & Sons, Inc. Executive s Guide to Service-Oriented Architecture ERIC A. MARKS MICHAEL BELL John Wiley & Sons, Inc.

More information

Design of an Integrated Model for Development of Business and Enterprise Systems

Design of an Integrated Model for Development of Business and Enterprise Systems International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 5, May 2015, PP 50-57 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Design

More information

UPGRADE CONSIDERATIONS Appian Platform

UPGRADE CONSIDERATIONS Appian Platform UPGRADE CONSIDERATIONS Appian Platform ArchiTECH Solutions LLC 7700 Leesburg Pike #204 www.architechsolutions.com 703-972-9155 atsdelivery@architechsolutions.com TABLE OF CONTENTS Introduction... 3 Upgrade

More information

Merger and Acquisition Integration

Merger and Acquisition Integration 4G M&A Integration Linking Behaviour to Bottom Line Performance Merger and Acquisition Integration Acquisitions vary widely in ambition and scope, ranging from relatively small bolt-on transactions to

More information

Solutions. Take Communication Surveillance to the next level

Solutions. Take Communication Surveillance to the next level CCustomer mmunication Interaction Intelligence Management Solutions Take Communication Surveillance to the next level The Challenges of Compliance and preventing Market Abuse The financial services industry

More information

SuccessFactors Employee Central Side-by-Side Deployment with SAP ERP. White Paper

SuccessFactors Employee Central Side-by-Side Deployment with SAP ERP. White Paper SuccessFactors Employee Central Side-by-Side Deployment with SAP ERP White Paper Legal Disclaimer This paper outlines our general solution vision and direction and should not be relied on in making a purchase

More information

Infor PM 10. Do business better.

Infor PM 10. Do business better. Infor PM 10 Infor PM is designed for companies in all industries that seek to better monitor, measure, and manage their business performance in real time. Do business better. The speed, complexity, and

More information

Practical Considerations for Various Model Validation Techniques Tuesday, June 27, :00 pm-5:00 pm

Practical Considerations for Various Model Validation Techniques Tuesday, June 27, :00 pm-5:00 pm Practical Considerations for Various Model Validation Techniques Tuesday, June 27, 2017 4:00 pm-5:00 pm Presented by: Speaker Name Elaine Halliday, CPA MountainView-McGuire 16437 N. Scottsdale Rd. Suite290

More information

Concept of Operations. Disaster Cycle Services Program Essentials DCS WC OPS PE

Concept of Operations. Disaster Cycle Services Program Essentials DCS WC OPS PE Concept of Operations Disaster Cycle Services Program Essentials DCS WC OPS PE October 2014 Change Log Date Page(s) Section Change Owner: Disaster Cycle Services 2 Change Log... 2 Introduction... 4 Purpose...

More information

Seven Ways Metals, Mining, & Materials Companies Turn Data into a Sustainable, Competitive Advantage

Seven Ways Metals, Mining, & Materials Companies Turn Data into a Sustainable, Competitive Advantage Seven Ways Metals, Mining, & Materials Companies Turn Data into a Sustainable, Competitive Advantage This guide focuses on streamlining the flow of information within Metals, Mining & Materials (MMM) companies.

More information

Sourcing Optimization Driving Supply Chain Decision Making

Sourcing Optimization Driving Supply Chain Decision Making Supply Chain Analysis Sourcing Optimization Driving Supply Chain Decision Making Sourcing optimization projects rely on collaboration across the organization and between external stakeholders. Optimization

More information

Disclosure Management

Disclosure Management Disclosure Management Collaborative report production management combining numbers with narrative Overview Many companies have experienced growing pains in recent years with both internal and external

More information

THE CUSTOMER EXPERIENCE MANAGEMENT REPORT & RECOMMENDATIONS Customer Experience & Beyond

THE CUSTOMER EXPERIENCE MANAGEMENT REPORT & RECOMMENDATIONS Customer Experience & Beyond www.sandsiv.com THE CUSTOMER EXPERIENCE MANAGEMENT REPORT & RECOMMENDATIONS TM 1 Customer Experience & Beyond www.sandsiv.com TM Customer Experience & Beyond Legal Notice: Sandsiv 2015. All Rights Reserved.

More information

Data management meets the C-suite

Data management meets the C-suite Q&A Data management meets the C-suite Why it matters and what to do about it Audit / Tax / Advisory / Risk / Performance Smart decisions. Lasting value. Data management meets the C-Suite: Why it matters

More information

Governance Grows Up as Outcomes Become Key

Governance Grows Up as Outcomes Become Key Governance Grows Up as Outcomes Become Key Outsourcing Center, Beth Ellyn Rosenthal, Senior Writer January 20, 2014 Ask 10 people what constitutes a successful long-term outsourcing relationship and you

More information

Setting the Global HR Transformation Strategy

Setting the Global HR Transformation Strategy 2 Solution integration 3 Change analytics 1 What is truly meant by global Setting the Global HR Transformation Strategy 2 Solution Integration The days of a one size fits all HR service delivery model

More information

Capturing synergies to deliver deal value

Capturing synergies to deliver deal value November 2012 Capturing synergies to deliver deal value A publication from PwC's Deals M&A Integration practice At a glance Value realized from an acquisition depends on how well the newly combined company

More information

A Product Innovation Platform and Its Impact on Successful PLM Deployments

A Product Innovation Platform and Its Impact on Successful PLM Deployments A Product Innovation Platform and Its Impact on Successful PLM Deployments CIMdata Commentary Key takeaways: Product innovation platforms are the foundation upon which functional capabilities, data, and

More information

22 ways to get the most out of OEE and lean manufacturing disciplines

22 ways to get the most out of OEE and lean manufacturing disciplines automation technology & consulting 22 ways to get the most out of OEE and lean manufacturing disciplines Overall equipment effectiveness (OEE) and lean manufacturing have won many converts. These two disciplines

More information

The table below compares to the 2009 Essential Elements and the 2018 Enhanced Data Stewardship Elements

The table below compares to the 2009 Essential Elements and the 2018 Enhanced Data Stewardship Elements October 8, 2018 The Essential Elements of Accountability were developed by a multi-stakeholder group that met in Dublin Ireland as the Global Accountability Dialogue. The Essential Elements provided granularity

More information