US20040199445A1 - Business activity management system - Google Patents

Business activity management system Download PDF

Info

Publication number
US20040199445A1
US20040199445A1 US10/821,504 US82150404A US2004199445A1 US 20040199445 A1 US20040199445 A1 US 20040199445A1 US 82150404 A US82150404 A US 82150404A US 2004199445 A1 US2004199445 A1 US 2004199445A1
Authority
US
United States
Prior art keywords
value
risk
systems
transaction
changes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/821,504
Inventor
Jeff Eder
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eder Jeffrey
Asset Trust Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/821,504 priority Critical patent/US20040199445A1/en
Publication of US20040199445A1 publication Critical patent/US20040199445A1/en
Assigned to ASSET TRUST, INC. reassignment ASSET TRUST, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EDER, JEFF S
Assigned to ASSET RELIANCE, INC. reassignment ASSET RELIANCE, INC. NUNC PRO TUNC ASSIGNMENT (SEE DOCUMENT FOR DETAILS). Assignors: EDER, JEFF
Assigned to EDER, JEFFREY reassignment EDER, JEFFREY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ASSET RELIANCE INC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0637Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
    • G06Q10/06375Prediction of business process outcome or impact based on a proposed change
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"

Definitions

  • This invention relates to a method of and system for identifying and measuring the value and risk associated with tangible elements of value, intangible elements of value and/or external factors and using said measurements to optimize financial performance, risk transfer and associated business activities for an organization.
  • a preferable object to which the present invention is applied is quantifying and then satisfying the risk reduction needs for a commercial business.
  • Comprehensive quantification of enterprise financial status is enabled by:
  • the system of the present invention also calculates and displays an optimal value enhancement program for the commercial enterprise using the system. Because information on liquidity and foreign exchange needs is developed and transmitted along with the risk information, the system of the present invention is also capable of functioning as an automated, on-line liquidity transfer system, alone or in combination with the risk transfer system.
  • the present invention has the added benefit of eliminating a great deal of time-consuming and expensive effort by automating the extraction of data from the databases, tables, and files of existing computer-based corporate finance, operations, human resource, supply chain, web-site and “soft” asset management system databases in order to operate the system.
  • the automated extraction, aggregation and analysis of data from a variety of existing computer-based systems significantly increases the scale and scope of the analysis that can be completed.
  • the system of the present invention further enhances the efficiency and effectiveness of the business valuation by automating the retrieval, storage and analysis of information useful for valuing elements of value from external databases, external publications and the internet.
  • the utility of the valuations produced by the system of the present invention are further enhanced by explicitly calculating the expected purchase longevity of the different customers and different elements of value in order to improve the accuracy and usefulness of the valuations.
  • real options and contingent liabilities are valued using real option algorithms. Because real option algorithms explicitly recognize whether or not an investment is reversible and/or if it can be delayed, the values calculated using these algorithms are more realistic than valuations created using more traditional approaches like Net Present Value.
  • real option analysis for valuing growth opportunities and contingent liabilities gives the present invention a distinct advantage over traditional approaches to risk management.
  • intangible elements are by definition not tangible, they can not be measured directly. They must instead be measured by the impact they have on their surrounding environment.
  • electricity is an “intangible” that is measured by the impact it has on the surrounding environment. Specifically, the strength of the magnetic field generated by the flow of electricity through a conductor is used to determine the amount of electricity that is being consumed.
  • the system of the present invention measures intangible elements of value by identifying the attributes that, like the magnetic field, reflect the strength of the element in driving components of value (revenue, expense and change in capital), real options and market price for company equity and are easy to measure. Once the attributes related to the impact of each element are identified, they can be summarized into a single expression (a composite variable or vector). The vectors for all elements are then evaluated using a series of models to determine the relative contribution of each element to driving the components of value and market value. The system of the present invention then calculates the product of the relative element contributions and the value of the components of value, real options and market value to determine the net value impact of each element (see Table 5).
  • the method for tracking all the elements of value for a business enterprise eliminates many of the limitations associated with current systems for risk management that were described previously. To facilitate its use as a tool for managing risk for a commercial enterprise, the system of the present invention produces reports in formats that are similar to the reports provided by traditional accounting systems. Incorporating information regarding all the elements of value is just one of the ways the system of the present invention overcomes the limitations of existing systems. Other advances include:
  • the system of the present invention enables the just-in-time provision of financial services that are tailored to the exact needs of the enterprise.
  • the electronic linkage also eliminates the time lag that prevents many from companies from obtaining the risk reduction products they need
  • FIG. 1 is a block diagram showing the major processing steps of the present invention
  • FIG. 2 is a diagram showing the files or tables in the application database ( 50 ) of the
  • FIG. 3 is a block diagram of an implementation of the present invention.
  • FIG. 4 is a diagram showing the data windows that are used for receiving information from and transmitting information to the user ( 20 ) during system processing;
  • FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F are block diagrams showing the sequence of steps in the present invention used for specifying system settings and for initializing and operating the data bots that extract, aggregate, store and manipulate information utilized in system processing from: user input, the basic financial system database, the operation management system database, the web site transaction log database, the human resource information system database, risk management system database, external databases, the advanced finance system database, soft asset management system databases, the supply chain system database and the internet;
  • FIG. 6A, FIG. 6B and FIG. 6C are block diagrams showing the sequence of steps in the present invention that are utilized for initializing and operating the analysis bots;
  • FIG. 7 is a block diagram showing the sequence of steps in the present invention used for developing the optimal risk reduction strategy for each enterprise.
  • FIG. 8 is a block diagram showing the sequence of steps in the present invention used in communicating the summary information, printing reports, and receiving information concerning swaps and coverage from an exchange or other risk transfer provider ( 600 ).
  • FIG. 1 provides an overview of the processing completed by the innovative system for business activity management. Processing starts in this system ( 100 ) with the specification of system settings and the initialization and activation of software data “bots” ( 200 ) that extract, aggregate, manipulate and store the data and user ( 20 ) input required for completing system processing.
  • This information is extracted via a network ( 45 ) from: a basic financial system database ( 5 ), an operation management system database ( 10 ), a web site transaction log database ( 12 ), a human resource information system database ( 15 ), a risk management system database ( 17 ), an external database ( 25 ), an advanced financial system database ( 30 ), a soft asset management system database ( 35 ), a supply chain system database ( 37 ) and the internet ( 40 ).
  • These information extractions and aggregations may be influenced by a user ( 20 ) through interaction with a user-interface portion of the application software ( 700 ) that mediates the display, transmission and receipt of all information to and from browser software ( 800 ) such as the Microsoft Internet Explorer in an access device ( 90 ) such as a phone or personal computer that the user ( 20 ) interacts with. While only one database of each type ( 5 , 10 , 12 , 15 , 17 , 25 , 30 , 35 and 37 ) is shown in FIG. 1, it is to be understood that the system ( 100 ) can extract data from multiple databases of each type via the network ( 45 ). It also to be understood that the user ( 20 ) and the exchange operator ( 21 ) can operate separate access devices ( 90 ).
  • One embodiment of the present invention contains a soft asset management system for each element of value being analyzed. Automating the extraction and analysis of data from each soft asset management system ensures that each soft asset is considered within the overall financial models for the enterprise. It should also be understood that it is possible to complete a bulk extraction of data from each database ( 5 , 10 , 12 , 15 , 17 , 25 , 30 , 35 and 37 ) via the network ( 45 ) using data extraction applications such as Data Transformation Services from Microsoft or Aclue from Decisionism before initializing the data bots. The data extracted in bulk could be stored in a single datamart or data warehouse where the data bots could operate on the aggregated data.
  • All extracted information is stored in a file or table (hereinafter, table) within an application database ( 50 ) as shown in FIG. 2 or an exchange database ( 51 ) as shown in FIG. 10.
  • the application database ( 50 ) contains tables for storing user input, extracted information and system calculations including a system settings table ( 140 ), a metadata mapping table ( 141 ), a conversion rules table ( 142 ), a basic financial system table ( 143 ), an operation system table ( 144 ), a human resource system table ( 145 ), an external database table ( 146 ), an advanced finance system table ( 147 ), a soft asset system table ( 148 ), a bot date table ( 149 ), a keyword table ( 150 ), a classified text table ( 151 ), a geospatial measures table ( 152 ), a composite variables table ( 153 ), an industry ranking table ( 154 ), an element of value definition table ( 155 ), a component of value definition table ( 156 ), a cluster ID table ( 157 ), an
  • the application database ( 50 ) can optionally exist as a datamart, data warehouse or departmental warehouse.
  • the system of the present invention has the ability to accept and store supplemental or primary data directly from user input, a data warehouse or other electronic files in addition to receiving data from the databases described previously.
  • the system of the present invention also has the ability to complete the necessary calculations without receiving data from one or more of the specified databases. However, in one embodiment all required information is obtained from the specified data sources ( 5 , 10 , 12 , 15 , 17 , 25 , 30 , 35 , 37 and 40 ).
  • one embodiment of the present invention is a computer system ( 100 ) illustratively comprised of a user-interface personal computer ( 110 ) connected to an application-server personal computer ( 120 ) via a network ( 45 ).
  • the application server personal computer ( 120 ) is in turn connected via the network ( 45 ) to a database-server personal computer ( 130 ).
  • the user interface personal computer ( 110 ) is also connected via the network ( 45 ) to an internet browser appliance ( 90 ) that contains browser software ( 800 ) such as Microsoft Internet Explorer or Netscape Navigator.
  • the database-server personal computer ( 130 ) has a read/write random access memory ( 131 ), a hard drive ( 132 ) for storage of the application database ( 50 ), a keyboard ( 133 ), a communications bus ( 134 ), a display ( 135 ), a mouse ( 136 ), a CPU ( 137 ) and a printer ( 138 ).
  • the exchange-server personal computer ( 140 ) can be networked to one thousand or more database server personal computers ( 130 ) via the network ( 45 ).
  • the application-server personal computer ( 120 ) has a read/write random access memory ( 121 ), a hard drive ( 122 ) for storage of the non-user-interface portion of the enterprise portion of the application software ( 200 , 300 , 400 and 500 ) of the present invention, a keyboard ( 123 ), a communications bus ( 124 ), a display ( 125 ), a mouse ( 126 ), a CPU ( 127 ) and a printer ( 128 ). While only one client personal computer is shown in FIG. 3, it is to be understood that the application-server personal computer ( 120 ) can be networked to fifty or more client personal computers ( 110 ) via the network ( 45 ). The application-server personal computer ( 120 ) can also be networked to fifty or more server, personal computers ( 130 ) via the network ( 45 ). It is to be understood that the diagram of FIG. 3 is merely illustrative of one embodiment of the present invention.
  • the user-interface personal computer ( 110 ) has a read/write random access memory ( 111 ), a hard drive ( 112 ) for storage of a client data-base ( 49 ) and the user-interface portion of the application software ( 700 ), a keyboard ( 113 ), a communications bus ( 114 ), a display ( 115 ), a mouse ( 116 ), a CPU ( 117 ) and a printer ( 118 ).
  • the application software ( 200 , 300 , 400 , 500 and 700 ) controls the performance of the central processing unit ( 127 ) as it completes the calculations required to support the enterprise portion of the risk transfer system.
  • the application software program ( 200 , 300 , 400 , 500 , 600 and 700 ) is written in a combination of C++ and Visual Basic®.
  • the application software ( 200 , 300 , 400 , 500 and 700 ) can use Structured Query Language (SQL) for extracting data from the databases and the internet ( 5 , 10 , 12 , 15 , 17 , 25 , 30 , 35 , 37 and 40 ).
  • SQL Structured Query Language
  • the user ( 20 ) can optionally interact with the user-interface portion of the application software ( 700 ) using the browser software ( 800 ) in the browser appliance ( 90 ) to provide information to the application software ( 200 , 300 , 400 , 500 and 700 ) for use in determining which data will be extracted and transferred to the application database ( 50 ) by the data bots.
  • User input is initially saved to the client database ( 49 ) before being transmitted to the communication bus ( 124 ) and on to the hard drive ( 122 ) of the application-server computer via the network ( 45 ).
  • the central processing unit ( 127 ) accesses the extracted data and user input by retrieving it from the hard drive ( 122 ) using the random access memory ( 121 ) as computation workspace in a manner that is well known.
  • the computers ( 110 , 120 and 130 ) shown in FIG. 3 illustratively are IBM PCs or clones or any of the more powerful computers or workstations that are widely available.
  • Typical memory configurations for client personal computers ( 110 ) used with the present invention should include at least 512 megabytes of semiconductor random access memory ( 111 ) and at least a 100 gigabyte hard drive ( 112 ).
  • Typical memory configurations for the application-server personal computer ( 120 ) used with the present invention should include at least 2056 megabytes of semiconductor random access memory ( 121 ) and at least a 250 gigabyte hard drive ( 122 ).
  • Typical memory configurations for the database-server personal computer ( 130 ) used with the present invention should include at least 4112 megabytes of semiconductor random access memory ( 131 ) and at least a 500 gigabyte hard drive ( 132 ).
  • Typical memory configurations for the exchange-server personal computer ( 140 ) used with the present invention should include at least 8224 megabytes of semiconductor random access memory ( 145 ) and at least a 750 gigabyte hard drive ( 141 ).
  • the revenue, expense and capital requirement forecasts for the current operation, the real options and the contingent liabilities are obtained from an advanced financial planning system database ( 30 ) derived from an advanced financial planning system similar to the one disclosed in U.S. Pat. No. 5,615,109.
  • the extracted revenue, expense and capital requirement forecasts are used to calculate a cash flow for each period covered by the forecast for the enterprise by subtracting the expense and change in capital for each period from the revenue for each period.
  • a steady state forecast for future periods is calculated after determining the steady state growth rate that best fits the calculated cash flow for the forecast time period.
  • the steady state growth rate is used to calculate an extended cash flow forecast.
  • the extended cash flow forecast is used to determine the Competitive Advantage Period (CAP) implicit in the enterprise market value.
  • CAP Competitive Advantage Period
  • the expense value is subdivided into five sub-components: the cost of raw materials, the cost of manufacture or delivery of service, the cost of selling, the cost of support and the cost of administration.
  • the capital value is subdivided into six sub-components: cash, non-cash financial assets, production equipment, other assets (non financial, non production assets), financial liabilities and equity.
  • the production equipment and equity sub-components are not used directly in evaluating the elements of value.
  • An element of value will be defined as “an identifiable entity or group of items that as a result of past transactions and other data has provided and/or is expected to provide economic benefit to an enterprise”.
  • An item will be defined as a single member of the group that defines an element of value. For example, an individual salesman would be an “item” in the “element of value” sales staff.
  • the data associated with performance of an individual item will be referred to as “item variables”.
  • the risk reduction program development using the approach outlined above is completed in five distinct stages.
  • the first stage of processing programs bots to continually extract, aggregate, manipulate and store the data from user input and databases and the internet ( 5 , 10 , 12 , 15 , 17 , 25 , 30 , 35 , 37 and 40 ) in order for the analysis of business value.
  • Bots are independent components of the application that have specific tasks to perform.
  • the second stage of processing programs analysis bots that continually:
  • the third stage of processing (block 400 from FIG. 1) analyzes the risks faced by the enterprise in normal and extreme conditions in order to develop a comprehensive risk management program for the enterprise.
  • the fourth stage of processing (block 500 from FIG. 1) implements the risk reduction program by communicating with the exchange, purchasing the required risk reduction and/or by updating soft asset, finance and operation management systems to implement risk reduction programs.
  • the fifth and final stage of processing (block 600 from FIG. 1) analyzes the risks from all the enterprises using the exchange, sets prices and communicates with each enterprise in order to complete risk reduction program transactions.
  • FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F detail the processing that is completed by the portion of the application software ( 200 ) that extracts, aggregates, transforms and stores the information required for system operation from the: basic financial system database ( 5 ), operation management system database ( 10 ), the web site transaction log database ( 12 ), human resource information system database ( 15 ), risk management system database ( 17 ), external database ( 25 ), advanced financial system database ( 30 ), soft asset management system database ( 35 ), the supply chain system database ( 37 ), the internet ( 40 ) and the user ( 20 ).
  • a brief overview of the different databases will be presented before reviewing each step of processing completed by this portion ( 200 ) of the application software.
  • Advanced financial systems utilize information from the basic financial systems to perform financial analysis, financial planning and financial reporting functions.
  • Virtually every commercial enterprise uses some type of basic financial system as they are required to use these systems to maintain books and records for income tax purposes.
  • An increasingly large percentage of these basic financial systems are resident in microcomputer and workstation systems.
  • Basic financial systems include general-ledger accounting systems with associated accounts receivable, accounts payable, capital asset, inventory, invoicing, payroll and purchasing subsystems. These systems incorporate worksheets, files, tables and databases. These databases, tables and files contain information about the company operations and its related accounting transactions.
  • these databases, tables and files are accessed by the application software of the present invention in order to extract the information required for completing a business valuation.
  • the system is also capable of extracting the required information from a data warehouse (or datamart) when the required information has been pre-loaded into the warehouse.
  • the general ledger system generally maintains summary, dollar only transaction histories and balances for all accounts while the associated subsystems, accounts payable, accounts receivable, inventory, invoicing, payroll and purchasing, maintain more detailed historical transaction data and balances for their respective accounts. It is common practice for each subsystem to maintain the detailed information shown in Table 7 for each transaction.
  • the output from a general ledger system includes income statements, balance sheets and cash flow statements in well defined formats which assist management in measuring the financial performance of the firm during the prior periods when data input and system processing have been completed.
  • ERP Enterprise Resource Planning Systems
  • MRP Material Requirement Planning Systems
  • Purchasing Systems Scheduling Systems and Quality Control Systems
  • Operation Management Systems in manufacturing firms may also monitor information relating to the production rates and the performance of individual production workers, production lines, work centers, production teams and pieces of production equipment including the information shown in Table 8.
  • TABLE 8 Operation Management System - Production Information 1. ID number (employee id/machine id) 2. Actual hours - last batch 3. Standard hours - last batch 4. Actual hours - year to date 5. Actual/Standard hours - year to date % 6. Actual setup time - last batch 7. Standard setup time - last batch 8. Actual setup hours - year to date 9. Actual/Standard setup hrs - yr to date % 10. Cumulative training time 11. Job(s) certifications 12. Actual scrap - last batch 13. Scrap allowance - last batch 14. Actual scrap/allowance - year to date 15. Rework time/unit last batch 16. Rework time/unit year to date 17. QC rejection rate - batch 18. QC rejection rate - year to date
  • Operation management systems are also useful for tracking requests for service to repair equipment in the field or in a centralized repair facility. Such systems generally store information similar to that shown below in Table 9. TABLE 9 Operation Management System - Service Call Information 1. Customer name 2. Customer number 3. Contract number 4. Service call number 5. Time call received 6. Product(s) being fixed 7. Serial number of equipment 8. Name of person placing call 9. Name of person accepting call 10. Promised response time 11. Promised type of response 12. Time person dispatched to call 13. Name of person handling call 14. Time of arrival on site 15. Time of repair completion 16. Actual response type 17. Part(s) replaced 18. Part(s) repaired 19. 2nd call required 20. 2nd call number
  • Web site transaction log databases keep a detailed record of every visit to a web site, they can be used to trace the path of each visitor to the web site and upon further analysis can be used to identify patterns that are most likely to result in purchases and those that are most likely to result in abandonment. This information can also be used to identify which promotion would generate the most value for the company using the system.
  • Web site transaction logs generally contain the information shown in Table 10. TABLE 10 Web Site Transaction Log Database 1. Customer's URL 2. Date and time of visit 3. Pages visited 4. Length of page visit (time) 5. Type of browser used 6. Referring site 7. URL of site visited next 8. Downloaded file volume and type 9. Cookies 10. Transactions
  • Computer based human resource systems may some times be packaged or bundled within enterprise resource planning systems such as those available from SAP, Oracle and Peoplesoft.
  • Human resource systems are increasingly used for storing and maintaining corporate records concerning active employees in sales, operations and the other functional specialties that exist within a modern corporation. Storing records in a centralized system facilitates timely, accurate reporting of overall manpower statistics to the corporate management groups and the various government agencies that require periodic updates.
  • human resource systems include the company payroll system as a subsystem. In one embodiment of the present invention, the payroll system is part of the basic financial system. These systems can also be used for detailed planning regarding future manpower requirements.
  • Human resource systems typically incorporate worksheets, files, tables and databases that contain information about the current and future employees.
  • Risk management systems databases ( 17 ) contain statistical data about the past behavior and forecasts of likely future behavior of interest rates, currency exchange rates and commodity prices. They also contain information about the current mix of risk reduction products (derivatives, insurance, etc.) the enterprise has purchased. Some companies also use risk management systems to evaluate the desirability of extending or increasing credit lines to customers. The information from these systems can be used to supplement the risk information developed by the system of the present invention.
  • External databases can be used for obtaining information that enables the definition and evaluation of a variety of things including elements of value, market value factors, industry real options and composite variables. In some cases information from these databases can be used to supplement information obtained from the other databases and the internet ( 5 , 10 , 12 , 15 , 17 , 30 , 35 , 37 and 40 ). In the system of the present invention, the information extracted from external databases ( 25 ) can be in the forms listed in Table 12.
  • the system of the present invention uses different “bot” types to process each distinct data type from external databases ( 25 ).
  • the same “bot types” are also used for extracting each of the different types of data from the internet ( 40 ).
  • the system of the present invention must have access to at least one external database ( 25 ) that provides information regarding the equity prices for the enterprise and the equity prices and financial performance of competitors.
  • Advanced financial systems may also use information from external databases ( 25 ) and the internet ( 40 ) in completing their processing.
  • Advanced financial systems include financial planning systems and activity based costing systems.
  • Activity based costing systems may be used to supplement or displace the operation of the expense component analysis segment of the present invention as disclosed previously.
  • Financial planning systems generally use the same format used by basic financial systems in forecasting income statements, balance sheets and cash flow statements for future periods. Management uses the output from financial planning systems to highlight future financial difficulties with a lead time sufficient to permit effective corrective action and to identify problems in company operations that may be reducing the profitability of the business below desired levels. These systems are most often developed by individuals within companies using two and three dimensional spreadsheets such as Lotus 1-2-3®, Microsoft Excel® and Quattro Pro®.
  • EIS executive information system
  • DSS decision support system
  • the advanced finance system database is similar to the financial planning system database detailed in U.S. Pat. No. 5,165,109 for “Method of and System for Generating Feasible, Profit Maximizing Requisition Sets”, by Jeff S. Eder, the disclosure of which is incorporated herein by reference.
  • Soft asset management systems include: alliance management systems, brand management systems, customer relationship management systems, channel management systems, intellectual property management systems, process management systems and vendor management systems.
  • Soft asset management systems are similar to operation management systems in that they generally have the ability to forecast future events as well as track historical occurrences.
  • Customer relationship management systems are the most well established soft asset management systems at this point and will be the focus of the discussion regarding soft asset management system data. In firms that sell customized products, the customer relationship management system is generally integrated with an estimating system that tracks the flow of estimates into quotations, orders and eventually bills of lading and invoices.
  • customer relationship management systems In other firms that sell more standardized products, customer relationship management systems generally are used to track the sales process from lead generation to lead qualification to sales call to proposal to acceptance (or rejection) and delivery. All customer relationship management systems would be expected to track all of the customer's interactions with the enterprise after the first sale and store information similar to that shown below in Table 13. TABLE 13 Customer Relationship Management System - Information 1. Customer/Potential customer name 2. Customer number 3. Address 4. Phone number 5. Source of lead 6. Date of first purchase 7. Date of last purchase 8. Last sales call/contact 9. Sales call history 10. Sales contact history 11. Sales history: product/qty/price 12. Quotations: product/qty/price 13. Custom product percentage 14. Payment history 15. Current A/R balance 16. Average days to pay
  • Supply chain management system databases ( 37 ) contain information that may have been in operation management system databases ( 10 ) in the past. These systems provide enhanced visibility into the availability of goods and promote improved coordination between customers and their suppliers. All supply chain management systems would be expected to track all of the items ordered by the enterprise after the first purchase and store information similar to that shown below in Table 14. TABLE 14 Supply Chain Management System Information 1. Stock Keeping Unit (SKU) 2. Vendor 3. Total Quantity on Order 4. Total Quantity in Transit 5. Total Quantity on Back Order 6. Total Quantity in Inventory 7. Quantity available today 8. Quantity available next 7 days 9. Quantity available next 30 days 10. Quantity available next 90 days 11. Quoted lead time 12. Actual average lead time
  • System processing of the information from the different databases ( 5 , 10 , 12 , 15 , 17 , 25 , 30 , 35 and 37 ) and the internet ( 40 ) described above starts in a block 201 , FIG. 5A, which immediately passes processing to a software block 202 .
  • the software in block 202 prompts the user ( 20 ) via the system settings data window ( 701 ) to provide system setting information.
  • the system setting information entered by the user ( 20 ) is transmitted via the network ( 45 ) back to the application server ( 120 ) where it is stored in the system settings table ( 140 ) in the application database ( 50 ) in a manner that is well known.
  • the specific inputs the user ( 20 ) is asked to provide at this point in processing are shown in Table 15.
  • Geospatial data If yes, identity of geocoding service. 23. The maximum number of generations to be processed without improving fitness 24. Default clustering algorithm (selected from list) and maximum cluster number 25. Amount of cash and marketable securities required for day to day operations 26. Total cost of capital (weighted average cost of equity, debt and risk capital) 27. Number of months a product is considered new after it is first produced 28. Enterprise industry segments (SIC Code) 29. Primary competitors by industry segment 30. Management report types (text, graphic, both) 31. Default reports 32. Default Missing Data Procedure 33. Maximum time to wait for user input 34. Maximum discount rate for new projects (real option valuation) 35. Maximum number of sub-elements 36. Maximum amount to be spent on risk reduction per year 37. Confidence interval for risk reduction programs 38. On line account information for risk reduction products
  • the enterprise checklists are used by a “rules” engine (such as the one available from Neuron Data) in block 202 to influence the number and type of items with pre-defined metadata mapping for each category of value. For example, if the checklists indicate that the enterprise is focused on branded, consumer markets, then additional brand related factors will be pre-defined for mapping. The application of these system settings will be further explained as part of the detailed explanation of the system operation.
  • a “rules” engine such as the one available from Neuron Data
  • the software in block 202 uses the current system date to determine the time periods (months) that require data to complete the current operation and the real option valuations. After the date range is calculated it is stored in the system settings table ( 140 ).
  • the valuation of the current operation by the system utilizes basic financial, advanced financial, soft asset management, supply chain, web-site transaction, external database and human resource data for the three year period before and the three year forecast period after the current date.
  • the user ( 20 ) also has the option of specifying the data periods that will be used for completing system calculations.
  • processing advances to a software block 203 .
  • the software in block 203 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to map metadata using the standard specified by the user ( 20 ) (XML, Microsoft Open Information Model or the Metadata Coalitions specification) from the basic financial system database ( 5 ), the operation management system database ( 10 ), the web site transaction log database ( 12 ), the human resource information system database ( 15 ), the risk management system database ( 17 ), the external database ( 25 ), the advanced financial system database ( 30 ), the soft asset management system database ( 35 ) and the supply chain system database ( 37 ) to the enterprise hierarchy stored in the system settings table ( 140 ) and to the pre-specified fields in the metadata mapping table ( 141 ).
  • XML XML, Microsoft Open Information Model or the Metadata Coalitions specification
  • Pre-specified fields in the metadata mapping table include, the revenue, expense and capital components and sub-components for the enterprise and pre-specified fields for expected value drivers. Because the bulk of the information being extracted is financial information, the metadata mapping often takes the form of specifying the account number ranges that correspond to the different fields in the metadata mapping table ( 141 ). Table 16 shows the base account number structure that the account numbers in the other systems must align with. For example, using the structure shown below, the revenue component for the enterprise could be specified as enterprise 01, any department number, accounts 400 to 499 (the revenue account range) with any sub-account. TABLE 16 Account Number 01 - 902 (any) - 477- 86 (any) Segment Enterprise Department Account Sub-account Subgroup Workstation Marketing Revenue Singapore Position 4 3 2 1
  • any database fields that are not mapped to pre-specified fields are defined by the user ( 20 ) as component of value elements of value or non-relevant attributes and umapped” in the metadata mapping table ( 141 ) to the corresponding fields in each database in a manner identical to that described above for the pre-specified fields.
  • the software in block 203 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide conversion rules for each metadata field for each data source. Conversion rules will include information regarding currency conversions and conversion for units of measure that may be required to accurately and consistently analyze the data.
  • the inputs from the user ( 20 ) regarding conversion rules are stored in the conversion rules table ( 142 ) in the application database ( 50 ). When conversion rules have been stored for all fields from every data source, then processing advances to a software block 204 .
  • the software in block 204 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 212 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 207 .
  • the software in block 207 checks the bot date table ( 149 ) and deactivates any basic financial system data bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 207 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the basic financial system database ( 5 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Bots are independent components of the application that have specific tasks to perform. In the case of data acquisition bots, their tasks are to extract and convert data from a specified source and then store it in a specified location.
  • Each data bot initialized by software block 207 will store its data in the basic financial system table ( 143 ). Every data acquisition bot for every data source contains the information shown in Table 17. TABLE 17 1. Unique ID number (based on date, hour, minute, second of creation) 2. The data source location 3. Mapping information 4. Timing of extraction 5. Conversion rules (if any) 6. Storage Location (to allow for tracking of source and destination events) 7. Creation date (date, hour, minute, second)
  • processing advances to a block 208 .
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the basic financial system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the basic financial system table ( 143 ).
  • processing advances to a block 211 .
  • the software in block 211 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data are stored in the basic financial system table ( 143 ). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database ( 50 ) continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing passes on to software block 212 .
  • the software in block 212 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 228 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 221 .
  • the software in block 221 checks the bot date table ( 149 ) and deactivates any operation management system data bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 221 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the operation management system database ( 10 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 221 will store its data in the operation system table ( 144 ).
  • processing advances to a block 222 .
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the operation management system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the operation system table ( 144 ).
  • processing advances to a block 211 .
  • the software in block 211 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data are stored in the operation system table ( 144 ). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database ( 50 ) continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to a software block 225 .
  • the software in block 225 checks the bot date table ( 149 ) and deactivates any web site transaction log data bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 225 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the web site transaction log database ( 12 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 225 will store its data in the web log data table ( 172 ).
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the web site transaction log metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the web log data table ( 172 ). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211 .
  • the software in block 211 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data are stored in the web log data table ( 172 ). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database ( 50 ) continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to a software block 226 .
  • the software in block 226 checks the bot date table ( 149 ) and deactivates any human resource information system data bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 226 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the human resource information system database ( 15 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 226 will store its data in the human resource system table ( 145 ).
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the human resource information system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the human resource system table ( 145 ). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211 .
  • the software in block 211 prompts the user ( 20 ).via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data are stored in the human resource system table ( 145 ). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database ( 50 ) continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to software block 228 .
  • the software in block 228 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 248 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 241 .
  • the software in block 241 checks the bot date table ( 149 ) and deactivates any external database data bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 241 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the external database ( 25 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 241 will store its data in the external database table ( 146 ).
  • processing advances to a block 242 .
  • the bots extract and convert data in accordance with their preprogrammed instructions.
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the external database metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the external database table ( 146 ). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211 .
  • the software in block 211 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data are stored in the external database table ( 146 ). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database ( 50 ) continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to a software block 245 .
  • the software in block 245 checks the bot date table ( 149 ) and deactivates any advanced financial system data bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 245 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the advanced financial system database ( 30 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 245 will store its data in the advanced finance system database table ( 147 ).
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the advanced finance system database metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the advanced finance system database table ( 147 ). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211 .
  • the software in block 211 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data are stored in the advanced finance system database table ( 147 ). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database ( 50 ) continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to software block 246 .
  • the software in block 246 checks the bot date table ( 149 ) and deactivates any soft asset management system data bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 246 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to a soft asset management system database ( 35 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Extracting data from each soft asset management system ensures that the management of each soft asset is considered and prioritized within the overall financial models for the each enterprise. Each data bot initialized by software block 246 will store its data in the soft asset system table ( 148 ).
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the metadata for the soft asset management system databases to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the soft asset system table ( 148 ). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211 .
  • the software in block 211 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data are stored in the soft asset system table ( 148 ). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database ( 50 ) continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to software block 248 .
  • the software in block 248 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 264 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 261 .
  • the software in block 261 checks the bot date table ( 149 ) and deactivates any risk management system data bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 261 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to a risk management system database ( 17 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 261 will store its data in the risk system table ( 176 ).
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the metadata for the risk management system database ( 17 ) to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the risk management system table ( 174 ). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211 .
  • the software in block 211 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data are stored in the risk management system table ( 174 ). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database ( 50 ) continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to software block 262 .
  • the software in block 262 checks the bot date table ( 149 ) and deactivates any supply chain system data bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 262 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to a supply chain system database ( 37 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 262 will store its data in the supply chain system table ( 174 ).
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the metadata for the supply chain system database ( 37 ) to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the supply chain system table ( 174 ). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211 .
  • the software in block 211 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data are stored in the supply chain system table ( 174 ). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database ( 50 ) continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to software block 264 .
  • the software in block 264 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 276 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 265 .
  • the software in block 265 prompts the user ( 20 ) via the identification and classification rules window ( 703 ) to identify keywords such as company names, brands, trademarks and competitors for pre-specified fields in the metadata mapping table ( 141 ).
  • the user ( 20 ) also has the option of mapping keywords to other fields in the metadata mapping table ( 141 ).
  • the user ( 20 ) is prompted to select and classify descriptive terms for each keyword.
  • the input from the user ( 20 ) is stored in the keyword table ( 150 ) in the application database before processing advances to a software block 267 .
  • the software in block 267 checks the bot date table ( 149 ) and deactivates any internet text and linkage bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the keyword table ( 150 ). The software in block 267 then initializes internet text and linkage bots for each field in the metadata mapping table ( 141 ) that mapped to a keyword in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform. In the case of text and linkage bots, their tasks are to locate, count and classify keyword matches and linkages from a specified source and then store their findings in a specified location.
  • Each text and linkage bot initialized by software block 267 will store the location, count and classification data it discovers in the classified text table ( 151 ).
  • Multimedia data can be processed using bots with essentially the same specifications if software to translate and parse the multimedia content is included in each bot. Every internet text and linkage bot contains the information shown in Table 18. TABLE 18 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Storage location 4. Mapping information 5. Home URL 6. Keyword 7. Descriptive term 1 To 7 + n. Descriptive term n
  • the text and linkage bots locate and classify data from the internet ( 40 ) in accordance with their programmed instructions with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 268 before the bot completes data storage.
  • the software in block 268 checks to see if all linkages are identified and all keyword hits are associated with descriptive terms that have been classified. If the software in block 268 doesn't find any unclassified “hits” or “links”, then the address, counts and classified text are stored in the classified text table ( 151 ).
  • processing advances to a block 269 .
  • the software in block 269 prompts the user ( 20 ) via the identification and classification rules window ( 703 ) to provide classification rules for each new term.
  • the information regarding the new classification rules is stored in the keyword table ( 150 ) while the newly classified text and linkages are stored in the classified text table ( 151 ). It is worth noting at this point that the activation and operation of bots where all fields map to the application database ( 50 ) continues. Only bots with unclassified fields will “wait” for user input before completing data storage. The new classification rules will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to a software block 270 .
  • the software in block 270 checks the bot date table ( 149 ) and deactivates any external database bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the keyword table ( 150 ). The software in block 270 then initializes external database bots for each field in the metadata mapping table ( 141 ) that mapped to a keyword in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Every bot initialized by software block 270 will store the location, count and classification of data it discovers in the classified text table ( 151 ). Every external database bot contains the information shown in Table 19. TABLE 19 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Storage location 4. Mapping information 5. Data source 6. Keyword 7. Storage location 8. Descriptive term 1 To 8 + n. Descriptive term n
  • the bots After being initialized the bots locate data from the external database ( 25 ) in accordance with its programmed instructions with the frequency specified by user ( 20 ) in the system settings table ( 140 ). As each bot locates and classifies data from the external database ( 25 ) processing advances to a software block 268 before the bot completes data storage.
  • the software in block 268 checks to see if all keyword hits are associated with descriptive terms that have been classified. If the software in block 268 doesn't find any unclassified units”, then the address, count and classified text are stored in the classified text table ( 151 ) or the external database table ( 146 ) as appropriate. Alternatively, if there are terms that haven't been classified, then processing advances to a block 269 .
  • the software in block 269 prompts the user ( 20 ) via the identification and classification rules window ( 703 ) to provide classification rules for each new term.
  • the information regarding the new classification rules is stored in the keyword table ( 150 ) while the newly classified text is stored in the classified text table ( 151 ). It is worth noting at this point that the activation and operation of bots where all fields map to the application database ( 50 ) continues. Only bots with unclassified fields “wait” for user input before completing data storage. The new classification rules will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to software block 276 .
  • the software in block 276 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 291 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 277 .
  • the software in block 277 checks the system settings table ( 140 ) to see if there is geocoded data in the application database ( 50 ) and to determine which on-line geocoding service (CentrusTM from QM Soft or MapMarkerTM from MapInfo) is being used. If geospatial data are not being used, then processing advances to a block 291 . Alternatively, if the software in block 277 determines that geospatial data are being used, processing advances to a software block 278 .
  • the software in block 278 prompts the user ( 20 ) via the geospatial measure definitions window ( 709 ) to define the measures that will be used in evaluating the elements of value. After specifying the measures, the user ( 20 ) is prompted to select the geospatial locus for each measure from the data already stored in the application database ( 50 ). The input from the user ( 20 ) is stored in the geospatial measures table ( 152 ) in the application database before processing advances to a software block 279 .
  • the software in block 279 checks the bot date table ( 149 ) and deactivates any geospatial bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the geospatial measures table ( 152 ). The software in block 279 then initializes geospatial bots for each field in the metadata mapping table ( 141 ) that mapped to geospatial data in the application database ( 50 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ) before advancing processing to a software block 280 .
  • Bots are independent components of the application that have specific tasks to perform. In the case of geospatial bots, their tasks are to calculate user specified measures using a specified geocoding service and then store the measures in a specified location. Each geospatial bot initialized by software block 279 will store the measures it calculates in the application database table where the geospatial data was found. Tables that could include geospatial data include: the basic financial system table ( 143 ), the operation system table ( 144 ), the human resource system table ( 145 ), the external database table ( 146 ), the advanced finance system table ( 147 ) and the soft asset system table ( 148 ). Every geospatial bot contains the information shown in Table 20. TABLE 20 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Geospatial locus 6. Geospatial measure 7. Geocoding service
  • the geospatial bots locate data and complete measurements in accordance with their programmed instructions with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). As each geospatial bot retrieves data and calculates the geospatial measures that have been specified, processing advances to a block 281 before the bot completes data storage. The software in block 281 checks to see if all geospatial data located by the bot has been measured. If the software in block 281 doesn't find any unmeasured data, then the measurement is stored in the application database ( 50 ). Alternatively, if there are data elements that haven't been measured, then processing advances to a block 282 .
  • the software in block 282 prompts the user ( 20 ) via the geospatial measure definition window ( 709 ) to provide measurement rules for each new term.
  • the information regarding the new measurement rules is stored in the geospatial measures table ( 152 ) while the newly calculated measurement is stored in the appropriate table in the application database ( 50 ). It is worth noting at this point that the activation and operation of bots that don't have unmeasured fields continues. Only the bots with unmeasured fields “wait” for user input before completing data storage. The new measurement rules will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to a software block 291 .
  • the software in block 291 checks: the basic financial system table ( 143 ), the operation system table ( 144 ), the human resource system table ( 145 ), the external database table ( 146 ), the advanced finance system table ( 147 ), the soft asset system table ( 148 ), the classified text table ( 151 ) and the geospatial measures table ( 152 ) to see if data are missing from any of the periods required for system calculation.
  • the range of required dates was previously calculated by the software in block 202 . If there are no data missing from any period, then processing advances to a software block 293 . Alternatively, if there are missing data for any field for any period, then processing advances to a block 292 .
  • the software in block 292 prompts the user ( 20 ) via the missing data window ( 704 ) to specify the method to be used for filling the blanks for each item that is missing data.
  • Options the user ( 20 ) can choose from for filling the blanks include: the average value for the item over the entire time period, the average value for the item over a specified period, zero, the average of the preceding item and the following item values and direct user input for each missing item. If the user ( 20 ) doesn't provide input within a specified interval, then the default missing data procedure specified in the system settings table ( 140 ) is used. When all the blanks have been filled and stored for all of the missing data, system processing advances to a block 293 .
  • the software in block 293 calculates attributes by item for each numeric data field in the basic financial system table ( 143 ), the operation system table ( 144 ), the human resource system table ( 145 ), the external database table ( 146 ), the advanced finance system table ( 147 ) and the soft asset system table ( 148 ).
  • the attributes calculated in this step include: cumulative total value, the period-to-period rate of change in value, the rolling average value and a series of time lagged values.
  • the software in block 293 calculates attributes for each date field in the specified tables including time since last occurrence, cumulative time since first occurrence, average frequency of occurrence and the rolling average frequency of occurrence.
  • the numbers derived from numeric and date fields are collectively referred to as “item performance indicators”.
  • the software in block 293 also calculates pre-specified combinations of variables called composite variables for measuring the strength of the different elements of value.
  • the item performance indicators are stored in the table where the item source data was obtained and the composite variables are stored in the composite variables table ( 153 ) before processing advances to a block 294 .
  • the software in block 294 uses attribute derivation algorithms such as the AQ program to create combinations of the variables that did't pre-specified for combination. While the AQ program is used in one embodiment of the present: invention, other attribute derivation algorithms, such as the LINUS algorithms, may be used to the same effect.
  • the software creates these attributes using both item variables that were specified as 37 element” variables and item variables that were not.
  • the resulting composite variables are stored in the composite variables table ( 153 ) before processing advances to a block 295 .
  • the software in block 295 derives market value factors by enterprise for each numeric data field with data in the sentiment factors table ( 169 ).
  • Market value factors include: the ratio of enterprise earnings to expected earnings, commodity prices not captured in process valuations, inflation rate, growth in g.d.p., volatility, volatility vs. industry average volatility, interest rates, increases in interest rates, insider trading direction and levels, consumer confidence and the unemployment rate that have an impact on the market price of the equity for an enterprise and/or an industry.
  • the market value factors derived in this step include: cumulative totals, the period to period rate of change, the rolling average value and a series of time lagged values.
  • the software in block 295 calculates market value factors for each date field in the specified table including time since last occurrence, cumulative time since first occurrence, average frequency of occurrence and the rolling average frequency of occurrence.
  • the numbers derived from numeric and date fields are collectively referred to as “market performance indicators”.
  • the software in block 295 also calculates pre-specified combinations of variables called composite factors for measuring the strength of the different market value factors.
  • the market performance indicators and the composite factors are stored in the sentiment factors table ( 169 ) before processing advances to a block 296 .
  • the software in block 296 uses attribute derivation algorithms, such as the Linus algorithm, to create combinations of the factors that were not pre-specified for combination. While the Linus algorithm is used in one embodiment of the present invention, other attribute derivation algorithms, such as the AQ program, may be used to the same effect.
  • the software creates these attributes using both market value factors that were included in “composite factors” and market value factors that were not. The resulting composite variables are stored in the sentiment factors table ( 169 ) before processing advances to a block 297 .
  • the software in block 297 uses pattern-matching algorithms to assign pre-designated data fields for different elements of value to pre-defined groups with numerical values. This type of analysis is useful in classifying purchasing patterns and/or communications patterns as “heavy”, “light”, “moderate” or “sporadic”.
  • the classification and the numeric value associated with the classification are stored in the application database ( 50 ) table where the data field is located before processing advances to a block 298 .
  • the software in block 298 retrieves data from the metadata mapping table ( 141 ), creates and then stores the definitions for the pre-defined components of value in the components of value definition table ( 155 ).
  • the revenue component of value is not divided into sub-components
  • the expense value is divided into five sub-components: the cost of raw materials, the cost of manufacture or delivery of service, the cost of selling, the cost of support and the cost of administration
  • the capital value is divided into six sub-components: cash, non-cash financial assets, production equipment, other assets, financial liabilities and equity in one embodiment. Different subdivisions of the components of value can be used to the same effect.
  • processing advances to a software block 302 to begin the analysis of the extracted data using analysis bots.
  • FIG. 6A, FIG. 6B and FIG. 6C detail the processing that is completed by the portion of the application software ( 300 ) that programs analysis bots to:
  • Each analysis bot generally normalizes the data being analyzed before processing begins.
  • Processing in this portion of the application begins in software block 302 .
  • the software in block 302 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 314 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 303 .
  • the software in block 303 retrieves data from the meta data mapping table ( 141 ) and the soft asset system table ( 148 ) and then assigns item variables, item performance indicators and composite variables to each element of value using a two-step process.
  • item variables and item performance indicators are assigned to elements of value based on the soft asset management system they correspond to (for example, all item variables from a brand management system and all item performance indicators derived from brand management system variables are assigned to the brand element of value).
  • pre-defined composite variables are assigned to the element of value they were assigned to measure in the metadata mapping table ( 141 ). After the assignment of variables and indicators to elements is complete, the resulting assignments are saved to the element of value definition table ( 155 ) and processing advances to a block 304 .
  • the software in block 304 checks the bot date table ( 149 ) and deactivates any temporal clustering bots with creation dates before the current system date.
  • the software in block 304 then initializes bots in order for each component of value.
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ), retrieve the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the component of value definition table ( 156 ) in order and define segments for the component of value data before saving the resulting cluster information in the application database ( 50 ).
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is to segment the component and sub-component of value variables into distinct time regimes that share similar characteristics.
  • the temporal clustering bot assigns a unique identification (id) number to each “regime” it identifies and stores the unique id numbers in the cluster id table ( 157 ). Every time period with data are assigned to one of the regimes.
  • the cluster id for each regime is saved in the data record for each item variable in the table where it resides.
  • the item variables are segmented into a number of regimes less than or equal to the maximum specified by the user ( 20 ) in the system settings.
  • the data are segmented using a competitive regression algorithm that identifies an overall, global model before splitting the data and creating new models for the data in each partition. If the error from the two models is greater than the error from the global model, then there is only one regime in the data. Alternatively, if the two models produce lower error than the global model, then a third model is created. If the error from three models is lower than from two models then a fourth model is added. The process continues until adding a new model does not improve accuracy. Other temporal clustering algorithms may be used to the same effect. Every temporal clustering bot contains the information shown in Table 21. TABLE 21 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Maximum number of clusters 6. Variable 1 . . . 6 + n. Variable n
  • the software in block 305 checks the bot date table ( 149 ) and deactivates any variable clustering bots with creation dates before the current system date.
  • the software in block 305 then initializes bots in order for each element of value.
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ), retrieve the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the element of value definition table ( 155 ) in order and define segments for the element of value data before saving the resulting cluster information in the application database ( 50 ).
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is to segment the element of value variables into distinct clusters that share similar characteristics.
  • the clustering bot assigns a unique id number to each “cluster” it identifies and stores the unique id numbers in the cluster id table ( 157 ). Every item variable for every element of value is assigned to one of the unique clusters.
  • the cluster id for each variable is saved in the data record for each item variable in the table where it resides.
  • the item variables are segmented into a number of clusters less than or equal to the maximum specified by the user ( 20 ) in the system settings table ( 140 ).
  • the data are segmented using the “default” clustering algorithm the user ( 20 ) specified in the system settings.
  • the system of the present invention provides the user ( 20 ) with the choice of several clustering algorithms including: an unsupervised “Kohonen” neural network, neural network, decision tree, support vector method, K-nearest neighbor, expectation maximization (EM) and the segmental K-means algorithm.
  • the bot will iterate the number of clusters until it finds the cleanest segmentation for the data. Every variable clustering bot contains the information shown in Table 22. TABLE 22 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Element of value 6.
  • Clustering algorithm type Maximum number of clusters 8. Variable 1 . . . to 8 + n. Variable n
  • the software in block 306 checks the bot date table ( 149 ) and deactivates any predictive model bots with creation dates before the current system date. The software in block 306 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the element of value definition table ( 155 ) and the component of value definition table ( 156 ) required to initialize predictive model bots for each component of value.
  • Bots are independent components of the application that have specific tasks to perform. In the case of predictive model bots, their primary task is to determine the relationship between the item variables, item performance indicators and composite variables (collectively hereinafter, “the variables”) and the components of value (and sub-components of value). Predictive model bots are initialized for each component and sub-component of value. They are also initialized for each cluster and regime of data in accordance with the cluster and regime assignments specified by the bots in blocks 304 and 305 . A series of predictive model bots is initialized at this stage because it is impossible to know in advance which predictive model type will produce the “best” predictive model for the data from each commercial enterprise.
  • the series for each model includes 12 predictive model bot types: neural network; CART; GARCH, projection pursuit regression; generalized additive model (GAM), redundant regression network; rough-set analysis, boosted Na ⁇ ve Bayes Regression; MARS; linear regression; support vector method and stepwise regression. Additional predictive model types can be used to the same effect.
  • the software in block 306 generates this series of predictive model bots for the levels of the enterprise shown in Table 23. TABLE 23 Predictive models by enterprise level Enterprise: Element variables relationship to enterprise revenue component of value Element variables relationship to enterprise expense subcomponents of value Element variables relationship to enterprise capital change subcomponents of value Element of Value: Sub-element of value variables relationship to element of value
  • Every predictive model bot contains the information shown in Table 24.
  • TABLE 24 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Component or subcomponent of value 6. Global or Cluster (ID) and/or Regime (ID) 7. Element or Sub-Element ID 8. Predictive Model Type 9. Variable 1 . . . to 9 + n. Variable n
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, the bots retrieve the required data from the appropriate table in the application database ( 50 ) and randomly partition the item variables, item performance indicators and composite variables into a training set and a test set.
  • the software in block 306 uses “bootstrapping” where the different training data sets are created by re-sampling with replacement from the original training set so data records may occur more than once. The same sets of data will be used to train and then test each predictive model bot.
  • processing advances to a block 307 .
  • the software in block 307 determines if clustering improved the accuracy of the predictive models generated by the bots in software block 306 .
  • the software in block 307 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each type of analysis—with and without clustering—to determine the best set of variables for each type of analysis.
  • the type of analysis having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is given preference in determining the best set of variables for use in later analysis. There are four possible outcomes from this analysis as shown in Table 25. TABLE 25 1. Best model has no clustering 2. Best model has temporal clustering, no variable clustering 3. Best model has variable clustering, no temporal clustering 4. Best model has temporal clustering and variable clustering
  • the software in block 308 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each model to determine the best set of variables for each model.
  • the models having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is given preference in determining the best set of variables.
  • the best set of variables contain: the item variables, item performance indicators and composite variables that correlate most strongly with changes in the components of value.
  • the best set of variables will hereinafter be referred to as the “value drivers”. Eliminating low correlation factors from the initial configuration of the vector creation algorithms increases the efficiency of the next stage of system processing. Other error algorithms alone or in combination may be substituted for the mean squared error algorithm.
  • the software in block 308 tests the independence of the value drivers at the enterprise, element and sub-element level before processing advances to a block 309 .
  • the software in block 309 checks the bot date table ( 149 ) and deactivates any causal model bots with creation dates before the current system date.
  • the software in block 309 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the component of value definition table ( 156 ) and the element variables table ( 158 ) in order to initialize causal model bots for each enterprise, element of value and sub-element of value in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform. In the case of causal model bots, their primary task is to refine the item variable, item performance indicator and composite variable selection to reflect only causal variables. (Note: these variables are grouped together to represent an element vector when they are dependent).
  • a series of causal model bots are initialized at this stage because it is impossible to know in advance which causal model will produce the “best” vector for the best fit variables from each model.
  • the series for each model includes five causal model bot types: Tetrad, M M L, LaGrange, Bayesian and path analysis.
  • the software in block 309 generates this series of causal model bots for each set of variables stored in the element variables table ( 158 ) in the previous stage in processing.
  • Every causal model bot activated in this block contains the information shown in Table 26.
  • TABLE 26 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Component or subcomponent of value 6. Enterprise, Element or Sub-Element ID 7. Variable set 8. Causal model type
  • the causal model bots After the causal model bots are initialized by the software in block 309 , the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, they retrieve the element variable information for each model from the element variables table ( 158 ) and sub-divides the variables into two sets, one for training and one for testing. The same set of training data is used by each of the different types of bots for each model.
  • the software in block 309 uses a model selection algorithm to identify the model that best fits the data for each enterprise, element or sub-element being analyzed. For the system of the present invention, a cross validation algorithm is used for model selection.
  • the software in block 309 saves the best fit causal factors in the vector table ( 159 ) in the application database ( 50 ) and processing advances to a block 312 .
  • the software in block 312 tests the value drivers or vectors to see if there are “missing” value drivers that are influencing the results. If the software in block 312 does not detect any missing value drivers, then system processing advances to a block 323 . Alternatively, if missing value drivers are detected by the software in block 312 , then processing advances to a software block 321 .
  • variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each model and cluster to determine the best set of variables for each model.
  • the models having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is given preference in determining the best set of variables.
  • the best set of variables contain: the item variables, item performance indicators and composite variables that correlate most strongly with changes in the components of value.
  • the best set of variables will hereinafter be referred to as the “value drivers”.
  • Eliminating low correlation factors from the initial configuration of the vector creation algorithms increases the efficiency of the next stage of system processing.
  • Other error algorithms alone or in combination may be substituted for the mean squared error algorithm.
  • the software in block 311 checks the bot date table ( 149 ) and deactivates any causal model bots with creation dates before the current system date.
  • the software in block 311 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the component of value definition table ( 156 ) and the element variables table ( 158 ) in order to initialize causal model bots for each enterprise, element of value and sub-element of value at every level in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is to refine the item variable, item performance indicator and composite variable selection to reflect only causal variables. (Note: these variables are grouped together to represent a single element vector when they are dependent). In some cases it may be possible to skip the correlation step before selecting causal the item variable, item performance indicator and composite variables.
  • a series of causal model bots are initialized at this stage because it is impossible to know in advance which causal model will produce the “best” vector for the best fit variables from each model.
  • the series for each model includes four causal model bot types: Tetrad, LaGrange, Bayesian and path analysis.
  • the software in block 311 generates this series of causal model bots for each set of variables stored in the element variables table ( 158 ) in the previous stage in processing. Every causal model bot activated in this block contains the information shown in Table 27.
  • Table 27 TABLE 27 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Component or subcomponent of value 6. Cluster (ID) and/or Regime (ID) 7. Enterprise, Element or Sub-Element ID 8. Variable set 9. Causal model type
  • the causal model bots After the causal model bots are initialized by the software in block 311 , the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, they retrieve the element variable information for each model from the element variable table ( 158 ) and sub-divides the variables into two sets, one for training and one for testing. The same set of training data is used by each of the different types of bots for each model.
  • the software in block 311 uses a model selection algorithm to identify the model that best fits the data for each enterprise, element or sub-element being analyzed. For the system of the present invention, a cross validation algorithm is used for model selection.
  • the software in block 311 saves the best fit causal factors in the vector table ( 159 ) in the application database ( 50 ) and processing advances to block 312 .
  • the software in block 312 tests the value drivers or vectors to see if there are “missing” value drivers that are influencing the results. If the software in block 312 doesn't detect any missing value drivers, then system processing advances to a block 323 . Alternatively, if missing value drivers are detected by the software in block 312 , then processing advances to a software block 321 .
  • the software in block 321 prompts the user ( 20 ) via the variable identification window ( 710 ) to adjust the specification(s) for the affected enterprise, element of value or subelement of value.
  • system processing advances to a software block 323 .
  • the software in block 323 checks the in the system settings table ( 140 ) and/or the element of value definition table ( 155 ) to see if there any changes in structure. If there have been changes in the structure, then processing advances to a block 205 and the system processing described previously is repeated. Alternatively, if there are no changes in structure, then processing advances to a block 325 .
  • the software in block 325 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new one. If the calculation is new, then processing advances to a software block 326 . Alternatively, if the calculation is not a new calculation, then processing advances to a software block 333 .
  • the software in block 326 checks the bot date table ( 149 ) and deactivates any vector generation bots with creation dates before the current system date.
  • the software in block 326 then initializes bots for each element and sub-element of value for the enterprise.
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ), retrieve the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the component of value definition table ( 156 ) and the element variables table ( 158 ) in order to initialize vector generation bots for each enterprise, element of value and sub-element of value in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is to produce formulas, (hereinafter, vectors) that summarize the relationship between the item variables, item performance indicators and composite variables for the element or sub-element and changes in the component or sub-component of value being examined. (Note: these variables are simply grouped together to represent an element vector when they are dependent).
  • vectors formulas
  • a series of vector generation bots are initialized at this stage because it is impossible to know in advance which vector generation algorithm will produce the “best” vector for the best fit variables from each model.
  • the series for each model includes four vector generation bot types: data fusion, polynomial, induction and LaGrange. Other vector generation algorithms can be used to the same effect.
  • the software in block 326 generates this series of vector generation bots for each set of variables stored in the element variables table ( 158 ). Every vector generation bot contains the information shown in Table 28. TABLE 28 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Maximum number of regimes 6. Enterprise or Industry 7. Factor 1 . . . to 7 + n. Factor n
  • the software in block 327 checks the bot date table ( 149 ) and deactivates any temporal clustering bots with creation dates before the current system date.
  • the software in block 327 then initializes bots for market value factors for each enterprise with a market price and for the industry.
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ), retrieve the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the sentiment factors table ( 169 ) in order and define regimes for the market value factor data before saving the resulting regime information in the application database ( 50 ).
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary tasks are to identify the best market value indicator (price, relative price, yield or first derivative of price change) to use for market factor analysis and then to segment the market value factors into distinct time regimes that share similar characteristics.
  • the temporal clustering bots select the best value indicator by grouping the universe of stocks using each of the four value indicators and then comparing the clusters to the known groupings of the S&P 500. The temporal clustering bots then use the identified value indicator in the analysis of temporal clustering.
  • the bots assign a unique id number to each “regime” it identifies and stores the unique id numbers in the cluster id table ( 157 ). Every time period with data is assigned to one of the regimes,. The cluster id for each regime is also saved in the data record for each market value factor in the table where it resides.
  • the market value factors are segmented into a number of regimes less than or equal to the maximum specified by the user ( 20 ) in the system settings table ( 140 ). The factors are segmented using a competitive regression algorithm that identifies an overall, global model before splitting the data and creating new models for the data in each partition. If the error from the two models is greater than the error from the global model, then there is only one regime in the data.
  • Every temporal clustering bot contains the information shown in Table 29. TABLE 29 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Maximum number of regimes 6. Enterprise or Industry 7. Value indicator (price, relative price, yield, derivative, etc.) 8. Factor 1 . . . to 8 + n. Factor n
  • the software in block 328 checks the bot date table ( 149 ) and deactivates any causal factor bots with creation dates before the current system date.
  • the software in block 328 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the element of value definition table ( 155 ) and the sentiment factors table ( 169 ) in order to initialize causal market value factor bots for the enterprise and for the industry in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is to identify the item variables, item performance indicators, composite variables and market value factors that are causal factors for stock price movement. (Note: these variables are grouped together when they are dependent).
  • the causal factors are those that drive changes in the value indicator identified by the temporal clustering bots.
  • a series of causal factor bots are initialized at this stage because it is impossible to know in advance which causal factors will produce the “best” model for each enterprise and industry.
  • the series for each model includes five causal model bot types: Tetrad, LaGrange, M M L, Bayesian and path analysis. Other causal models can be used to the same effect.
  • the software in block 328 generates this series of causal model bots for each set of variables stored in the element variables table ( 158 ) in the previous stage in processing. Every causal factor bot activated in this block contains the information shown in Table 30.
  • Table 30 contains the information shown in Table 30.
  • TABLE 30 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 6. Enterprise or Industry 7. Regime 8. Value indicator (price, relative price, yield, derivative, etc.) 9. Causal model type
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, they retrieve the required information from the element of value definition table ( 155 ) and the sentiment factors table ( 169 ) and sub-divide the data into two sets, one for training and one for testing. The same set of training data is used by each of the different types of bots for each model.
  • the software in block 328 uses a model selection algorithm to identify the model that best fits the data for each enterprise or industry. For the system of the present invention, a cross validation algorithm is used for model selection.
  • the software in block 328 saves the best fit causal factors in the sentiment factors table ( 169 ) in the application database ( 50 ) and processing advances to a block 329 .
  • the software in block 329 tests to see if there are “missing” causal market value factors that are influencing the results. If the software in block 329 does not detect any missing market value factors, then system processing advances to a block 330 . Alternatively, if missing market value factors are detected by the software in block 329 , then processing returns to software block 321 and the processing described in the preceding section is repeated.
  • the software in block 330 checks the bot date table ( 149 ) and deactivates any industry rank bots with creation dates before the current system date.
  • the software in block 330 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the vector table ( 159 ) and the sentiment factors table ( 169 ) in order to initialize industry rank bots for the enterprise if it has a public stock market price and for the industry in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform. In the case of industry rank bots, their primary task is to determine the relative position of the enterprise being evaluated on the causal attributes identified in the previous processing step. (Note: these variables are grouped together when they are dependent).
  • the industry rank bots use Data Envelopement Analysis (hereinafter, DEA) to determine the relative industry ranking of the enterprise being examined.
  • DEA Data Envelopement Analysis
  • the software in block 330 generates industry rank bots for the enterprise being evaluated. Every industry rank bot activated in this block contains the information shown in Table 31. TABLE 31 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, they retrieve the item variables, item performance indicators, composite variables and market value factors for the enterprise from the application database ( 50 ) and sub-divides the factors into two sets, one for training and one for testing.
  • the software in block 330 saves the industry ranks in the vector table ( 159 ) in the application database ( 50 ) and processing advances to a block 331 .
  • the software in block 331 checks the bot date table ( 149 ) and deactivates any option bots with creation dates before the current system date.
  • the software in block 331 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the basic financial system database ( 143 ), the external database table ( 146 ) and the advanced finance system table ( 147 ) in order to initialize option bots for the industry and the enterprise.
  • Bots are independent components of the application that have specific tasks to perform. In the case of option bots, their primary tasks are to calculate the discount rate to be used for valuing the real options and to value the real options for the industry and the enterprise.
  • the discount rate for enterprise real options is calculated by adding risk factors for each causal soft asset to a base discount rate.
  • the risk factor for each causal soft asset is determined by a two step process. The first step in the process divides the maximum real option discount rate (specified by the user in system settings) by the number of causal soft assets. The second step in the process determines if the enterprise is highly rated on the causal soft assets and determines an appropriate risk factor. If the enterprise is highly ranked on the soft asset, then the discount rate is increased by a relatively small amount for that causal soft asset.
  • the discount rate for industry options is calculated using a weighted average total cost of capital approach in a manner that is well known.
  • the base discount rate for enterprise options is calculated using a total average cost of capital (TACC) approach shown below.
  • TACC cost of debt ⁇ (debt value/total value)+cost of equity ⁇ (equity value/total value)+cost of insurance ⁇ (insurance value/total value)
  • each real option is calculated using Black Scholes algorithms in a manner that is well known.
  • the real option can be valued using other algorithms including binomial, neural network or dynamic programming algorithms.
  • the software in block 331 values option bots for the industy and the enterprise. Industry option bots utilize the industry cost of capital for all calculations.
  • Option bots contain the information shown in Table 33. TABLE 33 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Industry or Enterprise ID 6. Real option type (Industry or Enterprise) 7. Real option 8. Allocation percentage (if applicable)
  • the option bots After the option bots are initialized, they activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information for the industry and the enterprise from the basic financial system database ( 143 ), the external database table ( 146 ) and the advanced finance system table ( 147 ) in order to complete the option valuation. After the discount has been determined the value of the real option is calculated using Black Schole's algorithms in a manner that is well known. The resulting values are then saved in the real option value table ( 162 ) in the application database ( 50 ) before processing advances to a block 332 .
  • the software in block 332 uses the results of the DEA analysis in the prior processing block and the percentage of industry real options controlled by the enterprise to determine the allocation percentage for industry options. The more dominant the enterprise, as indicated by the industry rank for the intangible element indicators, the greater the allocation of industry real options.
  • processing advances to a block 333 .
  • the software in block 333 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation, a value analysis or a structure change, then processing advances to a software block 341 . Alternatively, if the calculation is new a value analysis or a structure change, then processing advances to a software block 343 .
  • the software in block 341 checks the bot date table ( 149 ) and deactivates any cash flow bots with creation dates before the current system date.
  • the software in the block then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the component of value definition table ( 156 ) in order to initialize cash flow bots for the enterprise in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary tasks are to calculate the cash flow for the enterprise for every time period where data are available and to forecast a steady state cash flow for the enterprise.
  • Cash flow is calculated using a well known formula where cash flow equals period revenue minus period expense plus the period change in capital plus non-cash depreciation/amortization for the period.
  • the steady state cash flow is calculated for the enterprise using forecasting methods identical to those disclosed previously in U.S. Pat. 5,615,109 to forecast revenue, expenses, capital changes and depreciation separately before calculating the cash flow.
  • the software in block 334 initializes cash flow bots for the enterprise.
  • Every cash flow bot contains the information shown in Table 34.
  • TABLE 34 Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise ID 6. Components of value
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated the bots retrieve the component of value information for the enterprise from the component of value definition table ( 156 ). The cash flow bots then complete the calculation and forecast of cash flow for the enterprise before saving the resulting values by period in the cash flow table ( 161 ) in the application database ( 50 ) before processing advances to a block 342 .
  • the software in block 342 checks the bot date table ( 149 ) and deactivates any element life bots with creation dates before the current system date.
  • the software in block 341 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the element of value definition table ( 155 ) in order to initialize element life bots for each element and sub-element of value in the enterprise being examined.
  • Bots are independent components of the application that have specific tasks to perform. In the case of element life bots, their primary task is to determine the expected life of each element and sub-element of value. There are three methods for evaluating the expected life of the elements and sub-elements of value. Elements of value that are defined by a population of members or items (such as: channel partners, customers, employees and vendors) will have their lives estimated by analyzing and forecasting the lives of the members of the population. The forecasting of member lives will be determined by the “best” fit solution from competing life estimation methods including the Iowa type survivor curves, Weibull distribution survivor curves, Gompertz-Makeham survivor curves, polynomial equations and the forecasting methodology disclosed in U.S. Pat.
  • Every element life bot contains the information shown in Table 35. TABLE 35 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Element or Sub-Element of value 6. Life estimation method (item analysis, date calculation or relative CAP)
  • the element life bots are initialized, they are activated in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information for each element and sub-element of value from the element of value definition table ( 155 ) in order to complete the estimate of element life. The resulting values are then saved in the element of value definition table ( 155 ) in the application database ( 50 ) before processing advances to a block 343 .
  • the software in block 343 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation, a value analysis or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 402 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 345 .
  • the software in block 345 checks the bot date table ( 149 ) and deactivates any component capitalization bots with creation dates before the current system date.
  • the software in block 341 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the component of value definition table ( 156 ) in order to initialize component capitalization bots for the enterprise.
  • F fx Forecast revenue, expense or capital requirements for year x after valuation date (from advanced finance system)
  • N Number of years in CAP (from prior calculation)
  • K Total average cost of capital - % per year (from prior calculation)
  • g Forecast growth rate during CAP - % per year (from advanced financial system)
  • Every component capitalization bot contains the information shown in Table 37.
  • TABLE 37 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise ID 6. Component of value (revenue, expense or capital change) 7. Sub component of value
  • the component capitalization bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information for each component and sub-component of value from the advanced finance system table ( 147 ) and the component of value definition table ( 156 ) in order to calculate the capitalized value of each component. The resulting values are then saved in the component of value definition table ( 156 ) in the application database ( 50 ) before processing advances to a block 347 .
  • the software in block 347 checks the bot date table ( 149 ) and deactivates any element valuation bots with creation dates before the current system date.
  • the software in block 347 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) in order to initialize valuation bots for each element and sub-element of value.
  • Bots are independent components of the application that have specific tasks to perform.
  • their task is to calculate the contribution of every element of value and sub-element of value in the enterprise using the overall procedure outlined in Table 5.
  • the first step in completing the calculation in accordance with the procedure outlined in Table 5, is determining the relative contribution of element and sub-element of value by using a series of predictive models to find the best fit relationship between:
  • the system of the present invention uses 12 different types of predictive models to determine relative contribution: neural network; CART; projection pursuit regression; generalized additive model (GAM); GARCH; MMDR; redundant regression network; boosted Na ⁇ ve Bayes Regression; the support vector method; MARS; linear regression; and stepwise regression to determine relative contribution.
  • the model having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is the best fit model.
  • the “relative contribution algorithm” used for completing the analysis varies with the model that was selected as the “best-fit”. For example, if the “best-fit” model is a neural net model, then the portion of revenue attributable to each input vector is determined by the formula shown in Table 38.
  • the resulting values are stored in the element of value definition table ( 155 ) for each element and sub-element of value of the enterprise.
  • Every valuation bot contains the information shown in Table 40.
  • TABLE 40 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Element of value or sub-element of value 6. Element of value ID
  • the valuation bots After the valuation bots are initialized by the software in block 347 they activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information from the element of value definition table ( 155 ) and the component of value definition table ( 156 ) in order to complete the valuation. The resulting values are then saved in the element of value definition table ( 155 ) in the application database ( 50 ) before processing advances to a block 351 .
  • the software in block 351 checks the bot date table ( 149 ) and deactivates any residual bots with creation dates before the current system date.
  • the software in block 351 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the element of value definition table ( 155 ) in order to initialize residual bots for the enterprise.
  • Every residual bot contains the information shown in Table 42. TABLE 42 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise ID
  • the residual bots After the residual bots are initialized they activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information from the element of value definition table ( 155 ) and the component of value definition table ( 156 ) in order to complete the residual calculation for the enterprise. After the calculation is complete, the resulting values are then saved in the element of value definition table ( 155 ) in the application database ( 50 ) before processing advances to a block 352 .
  • the software in block 352 checks the bot date table ( 149 ) and deactivates any sentiment calculation bots with creation dates before the current system date.
  • the software in block 352 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the external database table ( 146 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) and the real option value table ( 162 ) in order to initialize sentiment calculation bots for the enterprise.
  • Every sentiment calculation bot contains the information shown in Table 44. TABLE 44 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise ID
  • the sentiment calculation bots After the sentiment calculation bots are initialized they activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information from the external database table ( 146 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) and the real option value table ( 162 ) in order to complete the sentiment calculation for each enterprise. After the calculation is complete, the resulting values are then saved in the enterprise sentiment table ( 166 ) in the application database ( 50 ) before processing advances to a block 353 .
  • the software in block 353 checks the bot date table ( 149 ) and deactivates any sentiment analysis bots with creation dates before the current system date.
  • the software in block 353 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the external database table ( 146 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ), the real option value table ( 162 ), the enterprise sentiment table ( 166 ) and the sentiment factors table ( 169 ) in order to initialize sentiment analysis bots for the enterprise.
  • Every sentiment analysis bot contains the information shown in Table 46. TABLE 46 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise ID
  • the sentiment analysis bots After the sentiment analysis bots are initialized, they activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the enterprise sentiment table ( 166 ) and the sentiment factors table ( 169 ) in order to analyze sentiment. The resulting breakdown of sentiment is then saved in the enterprise sentiment table ( 169 ) in the application database ( 50 ) before processing advances to a block 402 .
  • the flow diagram in FIG. 7 details the processing that is completed by the portion of the application software ( 400 ) that analyzes and develops a risk reduction strategy for the commercial enterprise using the system.
  • System processing in this portion of the application software ( 400 ) begins in a block 402 .
  • the software in block 402 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 412 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 403 .
  • the software in block 403 checks the bot date table ( 149 ) and deactivates any statistical bots with creation dates before the current system date.
  • the software in block 403 then retrieves the information from the system settings table ( 140 ), the external database table ( 146 ), the element of value definition table ( 155 ), the element variables table ( 158 ) and the sentiment factor table ( 169 ) in order to initialize statistical bots for each causal value driver and market value factor.
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary tasks are to calculate and store statistics such as mean, median, standard deviation, slope, average period change, maximum period change, variance and covariance for each causal value driver and market value factor for every regime. Covariance with the market as a whole is also calculated for each value driver and market value factor. Every statistical bot contains the information shown in Table 47. TABLE 47 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Regime 6. Value Driver or Market Value Factor
  • the software in block 404 checks the bot date table ( 149 ) and deactivates any risk reduction activity bots with creation dates before the current system date.
  • the software in block 404 then retrieves the information from the system settings table ( 140 ), the external database table ( 146 ), the element of value definition table ( 155 ), the element variables table ( 158 ), the sentiment factor table ( 169 ) and the statistics table ( 170 ) in order to initialize risk reduction activity bots for each causal value driver and market value factor.
  • Bots are independent components of the application that have specific tasks to perform. In the case of risk reduction activity bots, their primary tasks are to identify actions that can be taken by the enterprise to reduce risk. For example, if one customer presents a significant risk to the enterprise, then the risk reduction bot might identify a reduction in the credit line for that customer to reduce the risk. Every risk reduction activity bot contains the information shown in Table 48. TABLE 48 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Value driver or Market value factor
  • the software in block 405 checks the bot date table ( 149 ) and deactivates any extreme value bots with creation dates before the current system date.
  • the software in block 405 then retrieves the information from the system settings table ( 140 ), the external database table ( 146 ), the element of value definition table ( 155 ), the element variables table ( 158 ) and the sentiment factor table ( 169 ) in order to initialize extreme value bots in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform. In the case of extreme value bots, their primary task is to identify the extreme values for each causal value driver and market value factor. The extreme value bots use the Blocks method and the peak over threshold method to identify extreme values. Other extreme value algorithms can be used to the same effect. Every extreme value bot activated in this block contains the information shown in Table 49. TABLE 49 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Method 6. Value driver or Market value factor
  • the extreme value bots After the extreme value bots are initialized, they activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, they retrieve the required information from the system settings table ( 140 ), the external database table ( 146 ), the element of value definition table ( 155 ), the element variables table ( 158 ) and the sentiment factor table ( 169 ) and determine the extreme value range for each value driver or market value factor. The bot saves the extreme values for each causal value driver and market value factor in the statistics table ( 170 ) in the application database ( 50 ) and processing advances to a block 409 .
  • the software in block 409 checks the bot date table ( 149 ) and deactivates any scenario bots with creation dates before the current system date.
  • the software in block 409 then retrieves the information from the system settings table ( 140 ), the operation system table ( 144 ), the external database table ( 146 ), the advanced finance system table ( 147 ), the element of value definition table ( 155 ), the sentiment factors table ( 169 ) and the statistics table ( 170 ) in order to initialize scenario bots in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is to identify likely scenarios for the evolution of the causal value drivers and market value factors.
  • the scenario bots use information from the advanced finance system and external databases to obtain forecasts for individual causal factors before using the covariance information stored in the statistics table ( 170 ) to develop forecasts for the other causal value drivers and factors under normal conditions. They also use the extreme value information calculated by the previous bots and stored in the statistics table ( 170 ) to calculate extreme scenarios. Every scenario bot activated in this block contains the information shown in Table 50.
  • TABLE 50 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Type: Normal or Extreme 5. Enterprise
  • scenario bots After the scenario bots are initialized, they activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, they retrieve the required information and develop a variety of scenarios as described previously. After the scenario bots complete their calculations they save the resulting scenarios in the scenarios table ( 171 ) in the application database ( 50 ) and processing advances to a block 410 .
  • the software in block 410 checks the bot date table ( 149 ) and deactivates any simulation bots with creation dates before the current system date.
  • the software in block 410 then retrieves the information from the system settings table ( 140 ), the operation system table ( 144 ), the advanced finance system table ( 147 ), the element of value definition table ( 155 ), the external database table ( 156 ), the sentiment factors table ( 169 ), the statistics table ( 170 ), the scenarios table ( 171 ) and the generic risk table ( 178 ) in order to initialize simulation bots in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform. In the case of simulation bots, their primary task is to run three different types of simulations for the enterprise.
  • the simulation bots run simulations of organizational financial performance and valuation using: the two types of scenarios generated by the scenario bots—normal and extreme, they also run an unconstrained genetic algorithm simulation that evolves to the most negative scenario.
  • the bots simulate the impact of generic risks like fire, earthquakes, floods and other weather-related pheonomenal that are un-correlated with the economic scenarios. Every simulation bot activated in this block contains the information shown in Table 51. TABLE 51 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Type: Normal, Extreme or Genetic Algorithm 6. Enterprise
  • simulation bots After the simulation bots are initialized, they activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, they retrieve the required information and simulate the financial performance and value impact of the different scenarios. After the simulation bots complete their calculations, the resulting forecasts are saved in the simulations table ( 168 ) and the summary xml table ( 177 ) in the application database ( 50 ) and processing advances to a block 411 .
  • the software in block 411 continually runs an analysis to define the optimal risk reduction strategy for each of the identified normal and extreme scenarios. It does this by first retrieving from the system settings table ( 140 ), the operation system table ( 144 ), the external database table ( 146 ), the advanced finance system table ( 147 ), the element of value definition table ( 155 ), the sentiment factors table ( 169 ), the statistics table ( 170 ), the scenario table ( 171 ), the risk reduction products table ( 173 ) and the risk reduction activity table ( 179 ) which is the information required to initialize the optimization algorithm.
  • the software in the block determines the optimal mix of risk reduction products (derivative purchase, insurance purchase, etc.) and risk reduction activities (reducing credit limits for certain customers, shifting production from high risk to lower risk countries, etc.) for the company under each scenario given the confidence interval established by the user ( 20 ) in the system settings using a linear programming optimization algorithm.
  • a multi criteria optimization determines the best mix for reducing risk under both normal and extreme scenarios.
  • Other optimization algorithms can be used at this point and all optimizations consider the effect of changes in the cost of capital on the optimal solution.
  • the resulting product and activity mix for each set of scenarios and the combined analysis is saved in the optimal mix table ( 175 ) and the xml summary table ( 177 ) in the application database ( 50 ) and the revised simulations are saved in the simulations table ( 168 ) before processing passes to a software block 412 .
  • the shadow prices from these optimizations are also stored in the risk reduction products table ( 173 ) and the xml summary table ( 177 ) for use in identifying new risk reduction products that the company may wish to purchase and/or new risk reduction activities the company may wish to develop.
  • the software in block 412 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new, calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 502 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 413 .
  • the software in block 413 checks the bot date table ( 149 ) and deactivates any impact bots with creation dates before the current system date.
  • the software in block 413 then retrieves the information from the system settings table ( 140 ), the operation system table ( 144 ), the external database table ( 146 ), the advanced finance system table ( 147 ), the element of value definition table ( 155 ), the simulations table ( 168 ), the sentiment factors table ( 169 ), the statistics table ( 170 ), the scenario table ( 171 ) and the optimal mix table ( 175 ) in order to initialize value impact bots in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is to determine the value impact of each risk reduction product and activity—those included in the optimal mix and those that aren't—on the different scenarios.
  • Every impact bot contains the information shown in Table 52. TABLE 52 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (date, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise 6. Risk reduction product or activity
  • the value impact bots are initialized by the software in block 413 , they activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information in order to revise the simulations of enterprise performance and determine the risk reduction impact of each product on each simulation. The resulting forecast of value impacts are then saved in the risk reduction products table ( 173 ) or the risk reduction activity table ( 179 ) as appropriate in the application database ( 50 ) before processing advances to a block 414 .
  • the software in block 414 prepares and displays a listing from highest impact to lowest impact for each risk reduction product under the normal scenarios, the extreme scenarios and the combined (multi-criteria) analysis using the prioritized listing display window ( 706 ).
  • the optimal mix for the normal and extreme scenarios are determined by calculating the weighted average sum of the different scenarios where the weighting is determined by the relative likelihood of the scenario.
  • the display identifies the optimal mix from the combined analysis as the recommended solution for enterprise risk reduction.
  • the user ( 20 ) is given the option of:
  • any changes are saved in the optimal mix table ( 175 ) in the application database ( 50 ) and processing advances to a software block 502 .
  • the processing of the risk reduction bot segment can, with very minor changes, also be used to analyze the impact of value enhancing changes on the enterprise. This could include a value maximization analysis and/or a multi-criteria maximum value, minimum risk optimization.
  • the flow diagram in FIG. 8 details the processing that is completed by the portion of the application software ( 500 ) that generates a summary of the risk, liquidity and foreign exchange position of the company, places orders to purchase the optimal mix of risk reduction products and optionally prints management reports. Processing in this portion of the application starts in software block 502 .
  • the software in block 502 checks the optimal mix table ( 175 ) in the application database ( 50 ) to determine which risk reduction activities have been included in the optimal mix. If risk reduction activities have been included in the optimal mix, then the software in this block prepares summaries of the changes and transmits them to the affected financial, operational and/or soft asset management system(s). For example, if the option to reduce the credit line for a certain customer has been accepted, then the customer relationship management system and the accounts receivable system will be updated with the new credit limit information by a transmission from the software in this block. Alternatively, if there are no risk reduction activities in the optimal mix, then processing advances directly to a software block 503 .
  • the software in block 503 retrieves information from the system settings table ( 140 ) and the advanced finance system table ( 147 ) that is required to calculate the minimum amount of cash that will be available for investment in risk reduction during the next 36 month period.
  • the system settings table ( 140 ) contains the minimum amount of cash and available securities that the user ( 20 ) indicated win order for enterprise operation while the advanced finance system table ( 147 ) contains a forecast of the cash balance for the enterprise for each period during the next 36 months.
  • a summary of the available cash and cash deficits by currency, by month, by enterprise for the next 36 months is stored in a summary xml format in the xml summary table ( 177 ) during this stage of processing.
  • processing advances to a software block 504 .
  • the software in block 504 assembles the previously developed summaries of cash position, foreign exchange requirements, risks, scenarios and statistics into a xml summary profile of the enterprise. This summary profile is transferred via the network ( 45 ) to an exchange or other risk transfer provider ( 600 ).
  • the software in block 514 analyzes the mix of risk reduction products and swaps recommended by an exchange or other risk transfer provider ( 600 ) to determine the percentage reduction in financial performance volatility that their purchase will produce for the enterprise. If the previously completed sentiment analysis indicated that financial performance volatility was a driver of market value, then the software in block 514 will retrieve the required information from the sentiment factors table ( 169 ) and estimate the value increase that will be produced by the decreased volatility. The software in block 514 also confirms that the products and/or swaps recommended by the exchange or other risk transfer provider ( 600 ) can be purchased using available cash for a total expenditure, counting both prior purchases and planned purchases, that is less than or equal to the maximum investment amount established by the user ( 20 ) in system settings table ( 140 ).
  • the software If the planned purchases are within the guidelines established by the user ( 20 ), then the software generates a purchase order for the additional risk reduction products and/or swaps. Alternatively, if there isn't available cash or if the planned purchase exceeds the expenditure guideline established by the user ( 20 ), then a message indicating the problem(s) is prepared. In any event, the software in block 514 displays the resulting message or purchase order to the user ( 20 ) via the purchase review data window ( 711 ). The purchase review data window ( 711 ) also displays the estimate of value increase, if any, that the implementation of the risk reduction program will provide. The user ( 20 ) can optionally edit or confirm the purchase order, increase the amount that can be spent on risk reduction or chose to purchase a mix that is not the optimal mix.
  • the software in block 514 transmits any orders to purchase the risk reduction products that were approved via the network ( 45 ).
  • the software at this point could, of course, initialize one or more bots to search the various web sites and exchanges to get the best price for the company using the system of the present invention.
  • the details of the purchase transaction and confirmation are then saved in the risk reduction purchase table ( 165 ) before processing advances to block 515 .
  • the software in block 515 displays the report selection window ( 705 ) to the user ( 20 ).
  • the user ( 20 ) optionally selects reports for printing. If the user ( 20 ) selects any reports for printing, then the information regarding the reports selected is saved in the reports table ( 164 ). After the user ( 20 ) has finished selecting reports, processing advances to a software block 516 .
  • the software in block 516 checks the reports tables ( 164 ) to determine if any reports have been designated for printing. If reports have been designated for printing, then processing advances to a block 525 .
  • the software in block 525 sends the designated reports to the printer ( 118 ). After the reports have been sent to the printer ( 118 ), processing advances to a software block 527 . Alternatively, if no reports were designated for printing, then processing advances directly from block 516 to block 527 .
  • the software in block 527 checks the system settings table ( 140 ) to determine if the system is operating in a continuous run mode. If the system is operating in a continuous run mode, then processing returns to block 205 and the processing described previously is repeated. Alternatively, if the system is not running in continuous mode, then the processing advances to a block 528 where the system stops.

Abstract

An automated method and system (100) for identifying and measuring the value and risk associated with tangible elements of value, intangible elements of value and external factors and using said measurements to optimize financial performance, risk transfer and business activities.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS AND PATENTS
  • This application is a continutation of U.S. patent application Ser. No. 09/688,983 filed Oct. 17, 2000 the disclosure of which is incorporated herein by reference. The subject matter of this application is also related to the subject matter of U.S. patent application Ser. No. 09/940,450 filed Aug. 29, 2001, U.S. patent application Ser. No. 10/746,673 filed Dec. 24, 2003 and U.S. Pat. No. 5,615,109 for “Method of and System for Generating Feasible, Profit Maximizing Requisition Sets”, by Jeff S. Eder, the disclosures of which are incorporated herein by reference.[0001]
  • BACKGROUND OF THE INVENTION
  • This invention relates to a method of and system for identifying and measuring the value and risk associated with tangible elements of value, intangible elements of value and/or external factors and using said measurements to optimize financial performance, risk transfer and associated business activities for an organization. [0002]
  • SUMMARY OF THE INVENTION
  • It is a general object of the present invention to identify and measure the value and risk associated with tangible elements of value, intangible elements of value and external factors and using said measurements to support the optimization of business activities for an organization. [0003]
  • A preferable object to which the present invention is applied is quantifying and then satisfying the risk reduction needs for a commercial business. Comprehensive quantification of enterprise financial status is enabled by: [0004]
  • 1) Systematically analyzing and valuing contingent liabilities using real option algorithms in order to ensure that the most current information regarding the magnitude of potential liabilities is included in all analyses; [0005]
  • 2) Developing an improved understanding of the variability and risk associated with all elements of enterprise value—tangible and intangible; [0006]
  • 3) Incorporating insights from the analyses of performance by asset management systems (i.e. Customer Relationship Management, Supply Chain Management, Brand Management, etc.) and the analyses of risk by asset risk management systems (credit risk, currency risk, etc.) for individual assets; [0007]
  • 4) Integrating or fusing the information from the first three items in order to develop a view of the risk and opportunities faced by the company; [0008]
  • 5) Clearly identifying the liquidity and foreign exchange position of the enterprise; and [0009]
  • 6) Developing the optimal risk reduction program for the company within the constraints specified by the user. [0010]
  • The system of the present invention also calculates and displays an optimal value enhancement program for the commercial enterprise using the system. Because information on liquidity and foreign exchange needs is developed and transmitted along with the risk information, the system of the present invention is also capable of functioning as an automated, on-line liquidity transfer system, alone or in combination with the risk transfer system. [0011]
  • In addition to enabling the just in time provision of financial services, the present invention has the added benefit of eliminating a great deal of time-consuming and expensive effort by automating the extraction of data from the databases, tables, and files of existing computer-based corporate finance, operations, human resource, supply chain, web-site and “soft” asset management system databases in order to operate the system. In accordance with the invention, the automated extraction, aggregation and analysis of data from a variety of existing computer-based systems significantly increases the scale and scope of the analysis that can be completed. The system of the present invention further enhances the efficiency and effectiveness of the business valuation by automating the retrieval, storage and analysis of information useful for valuing elements of value from external databases, external publications and the internet. Uncertainty over which method is being used for completing the valuation and the resulting inability to compare different valuations is eliminated by the present invention by consistently utilizing the same set of valuation methodologies for valuing the different elements of enterprise value as shown in Table 1. [0012]
    TABLE 1
    Enterprise Element of Value Valuation Methodology
    Excess Cash & Marketable Securities GAAP
    Market Sentiment Market Value* −
    (COPTOT + ΣReal
    option Values)
    Total current-operation value (COPTOT): Income Valuation
    Financial Assets: Cash & Marketable GAAP
    Securities (CASH)
    Financial Assets: Accounts Receivable GAAP
    (AR)
    Financial Assets: Inventory (IN) GAAP
    Financial Assets: Prepaid Expenses GAAP
    (PE)
    Financial Assets: Other Assets (OA) Lower of GAAP or
    liquidation value
    Elements of Production If calculated value >
    Value: Equipment (PEQ) liquidation value,
    then use system
    calculated value,
    else use liqui-
    dation value
    Elements of Intangible Elements System calculated
    Value: (IE): Customers, value for each IE
    Employees, Vendors,
    Strategic Partner-
    ships, Brands,
    Other Intangibles
    Elements of General Going GCV = COPTOT −
    Value: Concern Value CASH − AR − IN −
    (GCV) PE − PEQ − OA −
    ΣIE
    Real Options Real option algorithms
    & industry real
    option allocation
    each based on
    relative strength
    of intangible
    elements
    Contingent Liabilities Real option algorithms
  • The market value of the enterprise is calculated by combining the market value of all debt and equity as shown in Table2. [0013]
    TABLE 2
    Enterprise Market Value =
    Σ Market value of enterprise equity
    Σ Market value of company debt
  • Consultants from McKinsey & Company recently completed a three year study of companies in 10 industry segments in 12 countries that confirmed the importance of intangible elements of value as enablers of new business expansion and profitable growth. The results of the study, published in the book [0014] The Alchemy of Growth, revealed three common characteristics of the most successful businesses in the current economy:
  • 1. They consistently utilize “soft” or intangible assets like brands, customers and employees to support business expansion; [0015]
  • 2. They systematically generate and harvest real options for growth; and [0016]
  • 3. Their management focuses on three distinct “horizons”—short term (1-3 years), growth (3-5 years out) and options (beyond 5 years). [0017]
  • The experience of several of the most important companies in the U.S. economy, e.g. IBM, General Motors and DEC, in the late 1980s and early 1990s illustrate the problems that can arise when intangible asset information is omitted from corporate financial statements and companies focus only on the short term horizon. All three companies were showing large profits using current accounting systems while their businesses were deteriorating. If they had been forced to take write-offs when the declines in intangible assets were occurring, the problems would have been visible to the market and management would have been forced to act to correct the problems much more quickly than they actually did. These deficiencies of traditional accounting systems are particularly noticeable in high technology companies that are highly valued for their intangible assets and their options to enter growing markets rather than their tangible assets. [0018]
  • The utility of the valuations produced by the system of the present invention are further enhanced by explicitly calculating the expected purchase longevity of the different customers and different elements of value in order to improve the accuracy and usefulness of the valuations. [0019]
  • As shown in Table 1, real options and contingent liabilities are valued using real option algorithms. Because real option algorithms explicitly recognize whether or not an investment is reversible and/or if it can be delayed, the values calculated using these algorithms are more realistic than valuations created using more traditional approaches like Net Present Value. The use of real option analysis for valuing growth opportunities and contingent liabilities (hereinafter, real options) gives the present invention a distinct advantage over traditional approaches to risk management. [0020]
  • The innovative system has the added benefit of providing a large amount of detailed information to the enterprise and central exchange users concerning both tangible and intangible elements of value. Because intangible elements are by definition not tangible, they can not be measured directly. They must instead be measured by the impact they have on their surrounding environment. There are analogies in the physical world. For example, electricity is an “intangible” that is measured by the impact it has on the surrounding environment. Specifically, the strength of the magnetic field generated by the flow of electricity through a conductor is used to determine the amount of electricity that is being consumed. The system of the present invention measures intangible elements of value by identifying the attributes that, like the magnetic field, reflect the strength of the element in driving components of value (revenue, expense and change in capital), real options and market price for company equity and are easy to measure. Once the attributes related to the impact of each element are identified, they can be summarized into a single expression (a composite variable or vector). The vectors for all elements are then evaluated using a series of models to determine the relative contribution of each element to driving the components of value and market value. The system of the present invention then calculates the product of the relative element contributions and the value of the components of value, real options and market value to determine the net value impact of each element (see Table 5). [0021]
  • The method for tracking all the elements of value for a business enterprise provided by the present invention eliminates many of the limitations associated with current systems for risk management that were described previously. To facilitate its use as a tool for managing risk for a commercial enterprise, the system of the present invention produces reports in formats that are similar to the reports provided by traditional accounting systems. Incorporating information regarding all the elements of value is just one of the ways the system of the present invention overcomes the limitations of existing systems. Other advances include: [0022]
  • 1. The integrated analysis of all risks, [0023]
  • 2. The automated analysis of both “normal” risks and extreme risks, and [0024]
  • 3. The preparation of an xml summary of enterprise risk that enable the automated delivery of risk management products and services. [0025]
  • By eliminating many of the gaps in information available to personnel in the enterprise and the central exchange, the system of the present invention enables the just-in-time provision of financial services that are tailored to the exact needs of the enterprise. The electronic linkage also eliminates the time lag that prevents many from companies from obtaining the risk reduction products they need [0026]
  • BRIEF DESCRIPTION OF DRAWINGS
  • These and other objects, features and advantages of the present invention will be more readily apparent from the following description of one embodiment of the invention in which: [0027]
  • FIG. 1 is a block diagram showing the major processing steps of the present invention; [0028]
  • FIG. 2 is a diagram showing the files or tables in the application database ([0029] 50) of the
  • present invention that are utilized for data storage and retrieval during the processing in the innovative risk transfer system; [0030]
  • FIG. 3 is a block diagram of an implementation of the present invention; [0031]
  • FIG. 4 is a diagram showing the data windows that are used for receiving information from and transmitting information to the user ([0032] 20) during system processing;
  • FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F are block diagrams showing the sequence of steps in the present invention used for specifying system settings and for initializing and operating the data bots that extract, aggregate, store and manipulate information utilized in system processing from: user input, the basic financial system database, the operation management system database, the web site transaction log database, the human resource information system database, risk management system database, external databases, the advanced finance system database, soft asset management system databases, the supply chain system database and the internet; [0033]
  • FIG. 6A, FIG. 6B and FIG. 6C are block diagrams showing the sequence of steps in the present invention that are utilized for initializing and operating the analysis bots; [0034]
  • FIG. 7 is a block diagram showing the sequence of steps in the present invention used for developing the optimal risk reduction strategy for each enterprise; and [0035]
  • FIG. 8 is a block diagram showing the sequence of steps in the present invention used in communicating the summary information, printing reports, and receiving information concerning swaps and coverage from an exchange or other risk transfer provider ([0036] 600).
  • DETAILED DESCRIPTION OF ONE EMBODIMENT
  • FIG. 1 provides an overview of the processing completed by the innovative system for business activity management. Processing starts in this system ([0037] 100) with the specification of system settings and the initialization and activation of software data “bots” (200) that extract, aggregate, manipulate and store the data and user (20) input required for completing system processing. This information is extracted via a network (45) from: a basic financial system database (5), an operation management system database (10), a web site transaction log database (12), a human resource information system database (15), a risk management system database (17), an external database (25), an advanced financial system database (30), a soft asset management system database (35), a supply chain system database (37) and the internet (40). These information extractions and aggregations may be influenced by a user (20) through interaction with a user-interface portion of the application software (700) that mediates the display, transmission and receipt of all information to and from browser software (800) such as the Microsoft Internet Explorer in an access device (90) such as a phone or personal computer that the user (20) interacts with. While only one database of each type (5, 10, 12, 15, 17, 25, 30, 35 and 37) is shown in FIG. 1, it is to be understood that the system (100) can extract data from multiple databases of each type via the network (45). It also to be understood that the user (20) and the exchange operator (21) can operate separate access devices (90). One embodiment of the present invention contains a soft asset management system for each element of value being analyzed. Automating the extraction and analysis of data from each soft asset management system ensures that each soft asset is considered within the overall financial models for the enterprise. It should also be understood that it is possible to complete a bulk extraction of data from each database (5, 10, 12, 15, 17, 25, 30, 35 and 37) via the network (45) using data extraction applications such as Data Transformation Services from Microsoft or Aclue from Decisionism before initializing the data bots. The data extracted in bulk could be stored in a single datamart or data warehouse where the data bots could operate on the aggregated data.
  • All extracted information is stored in a file or table (hereinafter, table) within an application database ([0038] 50) as shown in FIG. 2 or an exchange database (51) as shown in FIG. 10. The application database (50) contains tables for storing user input, extracted information and system calculations including a system settings table (140), a metadata mapping table (141), a conversion rules table (142), a basic financial system table (143), an operation system table (144), a human resource system table (145), an external database table (146), an advanced finance system table (147), a soft asset system table (148), a bot date table (149), a keyword table (150), a classified text table (151), a geospatial measures table (152), a composite variables table (153), an industry ranking table (154), an element of value definition table (155), a component of value definition table (156), a cluster ID table (157), an element variables table (158), a vector table (159), a bot table (160), a cash flow table (161), a real option value table (162), an enterprise vector table (163), a report table (164), an risk reduction purchase table (165), an enterprise sentiment table (166), a value driver change table (167), a simulation table (168), a sentiment factors table (169), an statistics table (170), a scenarios table (171), a web log data table (172), a risk reduction products table (173), a supply chain system table (174), an optimal mix table (175), a risk system table (176), an xml summary table (177), a generic risk table (178) and a risk reduction activity table (179). The application database (50) can optionally exist as a datamart, data warehouse or departmental warehouse. The system of the present invention has the ability to accept and store supplemental or primary data directly from user input, a data warehouse or other electronic files in addition to receiving data from the databases described previously. The system of the present invention also has the ability to complete the necessary calculations without receiving data from one or more of the specified databases. However, in one embodiment all required information is obtained from the specified data sources (5, 10, 12,15,17, 25, 30, 35, 37 and 40).
  • As shown in FIG. 3, one embodiment of the present invention is a computer system ([0039] 100) illustratively comprised of a user-interface personal computer (110) connected to an application-server personal computer (120) via a network (45). The application server personal computer (120) is in turn connected via the network (45) to a database-server personal computer (130). The user interface personal computer (110) is also connected via the network (45) to an internet browser appliance (90) that contains browser software (800) such as Microsoft Internet Explorer or Netscape Navigator.
  • The database-server personal computer ([0040] 130) has a read/write random access memory (131), a hard drive (132) for storage of the application database (50), a keyboard (133), a communications bus (134), a display (135), a mouse (136), a CPU (137) and a printer (138).
  • While only one database server personal computer is shown in FIG. 3, it is to be understood that the exchange-server personal computer ([0041] 140) can be networked to one thousand or more database server personal computers (130) via the network (45).
  • The application-server personal computer ([0042] 120) has a read/write random access memory (121), a hard drive (122) for storage of the non-user-interface portion of the enterprise portion of the application software (200, 300, 400 and 500) of the present invention, a keyboard (123), a communications bus (124), a display (125), a mouse (126), a CPU (127) and a printer (128). While only one client personal computer is shown in FIG. 3, it is to be understood that the application-server personal computer (120) can be networked to fifty or more client personal computers (110) via the network (45). The application-server personal computer (120) can also be networked to fifty or more server, personal computers (130) via the network (45). It is to be understood that the diagram of FIG. 3 is merely illustrative of one embodiment of the present invention.
  • The user-interface personal computer ([0043] 110) has a read/write random access memory (111), a hard drive (112) for storage of a client data-base (49) and the user-interface portion of the application software (700), a keyboard (113), a communications bus (114), a display (115), a mouse (116), a CPU (117) and a printer (118).
  • The application software ([0044] 200, 300, 400, 500 and 700) controls the performance of the central processing unit (127) as it completes the calculations required to support the enterprise portion of the risk transfer system. In the embodiment illustrated herein, the application software program (200, 300, 400, 500, 600 and 700) is written in a combination of C++ and Visual Basic®. The application software (200, 300, 400, 500 and 700) can use Structured Query Language (SQL) for extracting data from the databases and the internet (5, 10, 12, 15, 17, 25, 30, 35, 37 and 40). The user (20) can optionally interact with the user-interface portion of the application software (700) using the browser software (800) in the browser appliance (90) to provide information to the application software (200, 300, 400, 500 and 700) for use in determining which data will be extracted and transferred to the application database (50) by the data bots.
  • User input is initially saved to the client database ([0045] 49) before being transmitted to the communication bus (124) and on to the hard drive (122) of the application-server computer via the network (45). Following the program instructions of the application software, the central processing unit (127) accesses the extracted data and user input by retrieving it from the hard drive (122) using the random access memory (121) as computation workspace in a manner that is well known.
  • The computers ([0046] 110, 120 and 130) shown in FIG. 3 illustratively are IBM PCs or clones or any of the more powerful computers or workstations that are widely available. Typical memory configurations for client personal computers (110) used with the present invention should include at least 512 megabytes of semiconductor random access memory (111) and at least a 100 gigabyte hard drive (112). Typical memory configurations for the application-server personal computer (120) used with the present invention should include at least 2056 megabytes of semiconductor random access memory (121) and at least a 250 gigabyte hard drive (122). Typical memory configurations for the database-server personal computer (130) used with the present invention should include at least 4112 megabytes of semiconductor random access memory (131) and at least a 500 gigabyte hard drive (132). Typical memory configurations for the exchange-server personal computer (140) used with the present invention should include at least 8224 megabytes of semiconductor random access memory (145) and at least a 750 gigabyte hard drive (141).
  • Using the system described above, enterprise activity is analyzed, a comprehensive risk management program is developed and implemented for each enterprise after element of value within the enterprise is analyzed using the formulas and data listed in Table 1. As shown in Table 1, the value of the current-operation will be calculated using an income valuation. An integral part of most income valuation models is the calculation of the present value of the expected cash flows, income or profits associated with the current-operation. The present value of a stream of cash flows is calculated by discounting the cash flows at a rate that reflects the risk associated with realizing the cash flow. For example, the present value (PV) of a cash flow of ten dollars ($10) per year for five (5) years would vary depending on the rate used for discounting future cash flows as shown below. [0047]
    Discount rate = 25%
    PV = 10 + 10 + 10 + 10 + 10 = 26.89
    {overscore (1.25)} {overscore ((1.25))}2 {overscore ((1.25))}3 {overscore ((1.25))}4 {overscore ((1.25))}5
    Discount rate = 35%
    PV = 10 + 10 + 10 + 10 + 10 = 22.20
    {overscore (1.35)} {overscore ((1.35))}2 {overscore ((1.35))}3 {overscore ((1.35))}4 {overscore ((1.35))}5
  • One of the first steps in evaluating the elements of current-operation value is extracting the data required to complete calculations in accordance with the formula that defines the value of the current-operation as shown in Table 4. [0048]
    TABLE 4
    Value of current-operation =
    (R) Value of forecast revenue from current-operation (positive)
    +
    (E) Value of forecast expense for current-operation (negative)
    +
    (C)* Value of current operation capital change forecast
  • The three components of current-operation value will be referred to as the revenue value (R), the expense value (E) and the capital value (C). Examination of the equation in Table 4 shows that there are three ways to increase the value of the current-operation—increase the revenue, decrease the expense or decrease the capital requirements (note: this statement ignores a fourth way to increase value—decrease the interest rate used for discounting future cash flows). [0049]
  • In one embodiment, the revenue, expense and capital requirement forecasts for the current operation, the real options and the contingent liabilities are obtained from an advanced financial planning system database ([0050] 30) derived from an advanced financial planning system similar to the one disclosed in U.S. Pat. No. 5,615,109. The extracted revenue, expense and capital requirement forecasts are used to calculate a cash flow for each period covered by the forecast for the enterprise by subtracting the expense and change in capital for each period from the revenue for each period. A steady state forecast for future periods is calculated after determining the steady state growth rate that best fits the calculated cash flow for the forecast time period. The steady state growth rate is used to calculate an extended cash flow forecast. The extended cash flow forecast is used to determine the Competitive Advantage Period (CAP) implicit in the enterprise market value.
  • While it is possible to use analysis bots to sub-divide each of the components of current operation value into a number of sub-components for analysis, one embodiment has a pre-determined number of sub-components for each component of value for the enterprise. The revenue value is not subdivided. In one embodiment, the expense value is subdivided into five sub-components: the cost of raw materials, the cost of manufacture or delivery of service, the cost of selling, the cost of support and the cost of administration. The capital value is subdivided into six sub-components: cash, non-cash financial assets, production equipment, other assets (non financial, non production assets), financial liabilities and equity. The production equipment and equity sub-components are not used directly in evaluating the elements of value. [0051]
  • The components and sub-components of current-operation value will be used in valuing the elements and sub-elements of value. An element of value will be defined as “an identifiable entity or group of items that as a result of past transactions and other data has provided and/or is expected to provide economic benefit to an enterprise”. An item will be defined as a single member of the group that defines an element of value. For example, an individual salesman would be an “item” in the “element of value” sales staff. The data associated with performance of an individual item will be referred to as “item variables”. [0052]
  • Analysis bots are used to determine element of value lives and the percentage of: the revenue value, the expense value, and the capital value that are attributable to each element of value. The resulting values are then added together to determine the valuation for different elements as shown by the example in Table 5. [0053]
    TABLE 5
    Element
    Gross Value Percentage Life/CAP* Net Value
    Revenue value = $120 M 20% 80% Value = $19.2 M
    Expense value = ($80 M) 10% 80% Value = ($6.4) M
    Capital value = ($5 M)  5% 80% Value = ($0.2) M
    Total value = $35 M
    Net value for this element: Value = $12.6 M
  • The risk reduction program development using the approach outlined above is completed in five distinct stages. As shown in FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F the first stage of processing (block [0054] 200 from FIG. 1) programs bots to continually extract, aggregate, manipulate and store the data from user input and databases and the internet (5, 10, 12, 15, 17, 25, 30, 35, 37 and 40) in order for the analysis of business value. Bots are independent components of the application that have specific tasks to perform. As shown in FIG. 6A, FIG. 6B and FIG. 6C the second stage of processing (block 300 from FIG. 1) programs analysis bots that continually:
  • 1. Identify the item variables, item performance indicators and composite variables for each element of value and sub-element of value that drive the components of value (revenue, expense and changes in capital) and the market price of company equity, [0055]
  • 2. Create vectors that summarize the performance of the item variables and item performance indicators for each element of value and sub-element of value, [0056]
  • 3. Determine the appropriate discount rate on the basis of relative causal element strength and value the enterprise real options and contingent liabilities; [0057]
  • 4. Determine the appropriate discount rate, value and allocate the industry real options to the enterprise on the basis of relative causal element strength; [0058]
  • 5. Determine the expected life of each element of value and sub-element of value; [0059]
  • 6. Calculate the enterprise current operation value and value the revenue, expense and capital components of said current operations using the information prepared in the previous stage of processing; [0060]
  • 7. Specify and optimize predictive models to determine the relationship between the vectors determined in step 2 and the revenue, expense and capital component values determined in step 6, [0061]
  • 8. Combine the results of the fifth, sixth and seventh stages of processing to determine the value of each element and sub-element (as shown in Table 5); and [0062]
  • 9. Determine the causal factors for company stock price movement, calculate market sentiment and analyze the causes of market sentiment. [0063]
  • The third stage of processing (block [0064] 400 from FIG. 1) analyzes the risks faced by the enterprise in normal and extreme conditions in order to develop a comprehensive risk management program for the enterprise. The fourth stage of processing (block 500 from FIG. 1) implements the risk reduction program by communicating with the exchange, purchasing the required risk reduction and/or by updating soft asset, finance and operation management systems to implement risk reduction programs. The fifth and final stage of processing (block 600 from FIG. 1) analyzes the risks from all the enterprises using the exchange, sets prices and communicates with each enterprise in order to complete risk reduction program transactions.
  • System Setting and Data Bots
  • The flow diagrams in FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F detail the processing that is completed by the portion of the application software ([0065] 200) that extracts, aggregates, transforms and stores the information required for system operation from the: basic financial system database (5), operation management system database (10), the web site transaction log database (12), human resource information system database (15), risk management system database (17), external database (25), advanced financial system database (30), soft asset management system database (35), the supply chain system database (37), the internet (40) and the user (20). A brief overview of the different databases will be presented before reviewing each step of processing completed by this portion (200) of the application software.
  • Corporate financial software systems are generally divided into two categories, basic and advanced. Advanced financial systems utilize information from the basic financial systems to perform financial analysis, financial planning and financial reporting functions. Virtually every commercial enterprise uses some type of basic financial system as they are required to use these systems to maintain books and records for income tax purposes. An increasingly large percentage of these basic financial systems are resident in microcomputer and workstation systems. Basic financial systems include general-ledger accounting systems with associated accounts receivable, accounts payable, capital asset, inventory, invoicing, payroll and purchasing subsystems. These systems incorporate worksheets, files, tables and databases. These databases, tables and files contain information about the company operations and its related accounting transactions. As will be detailed below, these databases, tables and files are accessed by the application software of the present invention in order to extract the information required for completing a business valuation. The system is also capable of extracting the required information from a data warehouse (or datamart) when the required information has been pre-loaded into the warehouse. [0066]
  • General ledger accounting systems generally store only valid accounting transactions. As is well known, valid accounting transactions consist of a debit component and a credit component where the absolute value of the debit component is equal to the absolute value of the credit component. The debits and the credits are posted to the separate accounts maintained within the accounting system. Every basic accounting system has several different types of accounts. The effect that the posted debits and credits have on the different accounts depends on the account type as shown in Table 6. [0067]
    TABLE 6
    Account Type: Debit Impact: Credit Impact:
    Asset Increase Decrease
    Revenue Decrease Increase
    Expense Increase Decrease
    Liability Decrease Increase
    Equity Decrease Increase
  • General ledger accounting systems also require that the asset account balances equal the sum of the liability account balances and equity account balances at all times. [0068]
  • The general ledger system generally maintains summary, dollar only transaction histories and balances for all accounts while the associated subsystems, accounts payable, accounts receivable, inventory, invoicing, payroll and purchasing, maintain more detailed historical transaction data and balances for their respective accounts. It is common practice for each subsystem to maintain the detailed information shown in Table 7 for each transaction. [0069]
    TABLE 7
    Subsystem Detailed Information
    Accounts Vendor, Item(s), Transaction Date, Amount Owed,
    Payable Due Date, Account Number
    Accounts Customer, Transaction Date, Product Sold,
    Receivable Quantity, Price, Amount Due, Terms, Due Date,
    Account Number
    Capital Asset ID, Asset Type, Date of Purchase, Purchase
    Assets Price, Useful Life, Depreciation Schedule,
    Salvage Value
    Inventory Item Number, Transaction Date, Transaction Type,
    Transaction Qty, Location, Account Number
    Invoicing Customer Name, Transaction Date, Product(s) Sold,
    Amount Due, Due Date, Account Number
    Payroll Employee Name, Employee Title, Pay Frequency,
    Pay Rate, Account Number
    Purchasing Vendor, Item(s), Purchase Quantity, Purchase
    Price(s), Due Date, Account Number
  • As is well known, the output from a general ledger system includes income statements, balance sheets and cash flow statements in well defined formats which assist management in measuring the financial performance of the firm during the prior periods when data input and system processing have been completed. [0070]
  • While basic financial systems are similar between firms, operation management systems vary widely depending on the type of company they are supporting. These systems typically have the ability to not only track historical transactions but to forecast future performance. For manufacturing firms, operation management systems such as Enterprise Resource Planning Systems (ERP), Material Requirement Planning Systems (MRP), Purchasing Systems, Scheduling Systems and Quality Control Systems are used to monitor, coordinate, track and plan the transformation of materials and labor into products. Systems similar to the one described above may also be useful for distributors to use in monitoring the flow of products from a manufacturer. [0071]
  • Operation Management Systems in manufacturing firms may also monitor information relating to the production rates and the performance of individual production workers, production lines, work centers, production teams and pieces of production equipment including the information shown in Table 8. [0072]
    TABLE 8
    Operation Management System - Production Information
    1. ID number (employee id/machine id)
    2. Actual hours - last batch
    3. Standard hours - last batch
    4. Actual hours - year to date
    5. Actual/Standard hours - year to date %
    6. Actual setup time - last batch
    7. Standard setup time - last batch
    8. Actual setup hours - year to date
    9. Actual/Standard setup hrs - yr to date %
    10. Cumulative training time
    11. Job(s) certifications
    12. Actual scrap - last batch
    13. Scrap allowance - last batch
    14. Actual scrap/allowance - year to date
    15. Rework time/unit last batch
    16. Rework time/unit year to date
    17. QC rejection rate - batch
    18. QC rejection rate - year to date
  • Operation management systems are also useful for tracking requests for service to repair equipment in the field or in a centralized repair facility. Such systems generally store information similar to that shown below in Table 9. [0073]
    TABLE 9
    Operation Management System - Service Call Information
    1. Customer name
    2. Customer number
    3. Contract number
    4. Service call number
    5. Time call received
    6. Product(s) being fixed
    7. Serial number of equipment
    8. Name of person placing call
    9. Name of person accepting call
    10. Promised response time
    11. Promised type of response
    12. Time person dispatched to call
    13. Name of person handling call
    14. Time of arrival on site
    15. Time of repair completion
    16. Actual response type
    17. Part(s) replaced
    18. Part(s) repaired
    19. 2nd call required
    20. 2nd call number
  • Web site transaction log databases keep a detailed record of every visit to a web site, they can be used to trace the path of each visitor to the web site and upon further analysis can be used to identify patterns that are most likely to result in purchases and those that are most likely to result in abandonment. This information can also be used to identify which promotion would generate the most value for the company using the system. Web site transaction logs generally contain the information shown in Table 10. [0074]
    TABLE 10
    Web Site Transaction Log Database
    1. Customer's URL
    2. Date and time of visit
    3. Pages visited
    4. Length of page visit (time)
    5. Type of browser used
    6. Referring site
    7. URL of site visited next
    8. Downloaded file volume and type
    9. Cookies
    10. Transactions
  • Computer based human resource systems may some times be packaged or bundled within enterprise resource planning systems such as those available from SAP, Oracle and Peoplesoft. Human resource systems are increasingly used for storing and maintaining corporate records concerning active employees in sales, operations and the other functional specialties that exist within a modern corporation. Storing records in a centralized system facilitates timely, accurate reporting of overall manpower statistics to the corporate management groups and the various government agencies that require periodic updates. In some cases human resource systems include the company payroll system as a subsystem. In one embodiment of the present invention, the payroll system is part of the basic financial system. These systems can also be used for detailed planning regarding future manpower requirements. Human resource systems typically incorporate worksheets, files, tables and databases that contain information about the current and future employees. As will be detailed below, these databases, tables and files are accessed by the application software of the present invention in order to extract the information required for completing a business valuation. It is common practice for human resource systems to store the information shown in Table 11 for each employee. [0075]
    TABLE 11
    Human Resource System Information
    1. Employee name
    2. Job title
    3. Job code
    4. Rating
    5. Division
    6. Department
    7. Employee No./(Social Security Number)
    8. Year to date - hours paid
    9. Year to date - hours worked
    10. Employee start date - company
    11. Employee start date - department
    12. Employee start date - current job
    13. Training courses completed
    14. Cumulative training expenditures
    15. Salary history
    16. Current salary
    17. Educational background
    18. Current supervisor
  • Risk management systems databases ([0076] 17) contain statistical data about the past behavior and forecasts of likely future behavior of interest rates, currency exchange rates and commodity prices. They also contain information about the current mix of risk reduction products (derivatives, insurance, etc.) the enterprise has purchased. Some companies also use risk management systems to evaluate the desirability of extending or increasing credit lines to customers. The information from these systems can be used to supplement the risk information developed by the system of the present invention.
  • External databases can be used for obtaining information that enables the definition and evaluation of a variety of things including elements of value, market value factors, industry real options and composite variables. In some cases information from these databases can be used to supplement information obtained from the other databases and the internet ([0077] 5, 10, 12, 15, 17, 30, 35, 37 and 40). In the system of the present invention, the information extracted from external databases (25) can be in the forms listed in Table 12.
    TABLE 12
    Types of information
    1) numeric information such as that found in the SEC Edgar database
    and the databases of financial infomediaries such as FirstCall,
    IBES and Compustat,
    2) text information such as that found in the Lexis Nexis database
    and databases containing past issues from specific publications,
    3) risk management products such as derivatives and standardized
    insurance contracts that can be purchased on line,
    4) geospatial data;
    5) multimedia information such as video and audio clips, and
    6) generic risk data including information about the likelihood of
    earthquake and weather damage by geospatial location
  • The system of the present invention uses different “bot” types to process each distinct data type from external databases ([0078] 25). The same “bot types” are also used for extracting each of the different types of data from the internet (40). The system of the present invention must have access to at least one external database (25) that provides information regarding the equity prices for the enterprise and the equity prices and financial performance of competitors.
  • Advanced financial systems may also use information from external databases ([0079] 25) and the internet (40) in completing their processing. Advanced financial systems include financial planning systems and activity based costing systems. Activity based costing systems may be used to supplement or displace the operation of the expense component analysis segment of the present invention as disclosed previously. Financial planning systems generally use the same format used by basic financial systems in forecasting income statements, balance sheets and cash flow statements for future periods. Management uses the output from financial planning systems to highlight future financial difficulties with a lead time sufficient to permit effective corrective action and to identify problems in company operations that may be reducing the profitability of the business below desired levels. These systems are most often developed by individuals within companies using two and three dimensional spreadsheets such as Lotus 1-2-3®, Microsoft Excel® and Quattro Pro®. In some cases, financial planning systems are built within an executive information system (EIS) or decision support system (DSS). For one embodiment of the present invention, the advanced finance system database is similar to the financial planning system database detailed in U.S. Pat. No. 5,165,109 for “Method of and System for Generating Feasible, Profit Maximizing Requisition Sets”, by Jeff S. Eder, the disclosure of which is incorporated herein by reference.
  • While advanced financial planning systems have been around for some time, soft asset management systems are a relatively recent development. Their appearance is further proof of the increasing importance of “soft” assets. Soft asset management systems include: alliance management systems, brand management systems, customer relationship management systems, channel management systems, intellectual property management systems, process management systems and vendor management systems. Soft asset management systems are similar to operation management systems in that they generally have the ability to forecast future events as well as track historical occurrences. Customer relationship management systems are the most well established soft asset management systems at this point and will be the focus of the discussion regarding soft asset management system data. In firms that sell customized products, the customer relationship management system is generally integrated with an estimating system that tracks the flow of estimates into quotations, orders and eventually bills of lading and invoices. In other firms that sell more standardized products, customer relationship management systems generally are used to track the sales process from lead generation to lead qualification to sales call to proposal to acceptance (or rejection) and delivery. All customer relationship management systems would be expected to track all of the customer's interactions with the enterprise after the first sale and store information similar to that shown below in Table 13. [0080]
    TABLE 13
    Customer Relationship Management System - Information
    1. Customer/Potential customer name
    2. Customer number
    3. Address
    4. Phone number
    5. Source of lead
    6. Date of first purchase
    7. Date of last purchase
    8. Last sales call/contact
    9. Sales call history
    10. Sales contact history
    11. Sales history: product/qty/price
    12. Quotations: product/qty/price
    13. Custom product percentage
    14. Payment history
    15. Current A/R balance
    16. Average days to pay
  • Supply chain management system databases ([0081] 37) contain information that may have been in operation management system databases (10) in the past. These systems provide enhanced visibility into the availability of goods and promote improved coordination between customers and their suppliers. All supply chain management systems would be expected to track all of the items ordered by the enterprise after the first purchase and store information similar to that shown below in Table 14.
    TABLE 14
    Supply Chain Management System Information
    1. Stock Keeping Unit (SKU)
    2. Vendor
    3. Total Quantity on Order
    4. Total Quantity in Transit
    5. Total Quantity on Back Order
    6. Total Quantity in Inventory
    7. Quantity available today
    8. Quantity available next 7 days
    9. Quantity available next 30 days
    10. Quantity available next 90 days
    11. Quoted lead time
    12. Actual average lead time
  • System processing of the information from the different databases ([0082] 5, 10, 12, 15, 17, 25, 30, 35 and 37) and the internet (40) described above starts in a block 201, FIG. 5A, which immediately passes processing to a software block 202. The software in block 202 prompts the user (20) via the system settings data window (701) to provide system setting information. The system setting information entered by the user (20) is transmitted via the network (45) back to the application server (120) where it is stored in the system settings table (140) in the application database (50) in a manner that is well known. The specific inputs the user (20) is asked to provide at this point in processing are shown in Table 15.
    TABLE 15
    1. New run or structure revision?
    2. Continuous, If yes, frequency? (hourly, daily, weekly,
    monthly or quarterly)
    3. Structure of enterprise (department, etc.)
    4. Enterprise checklist
    5. Base account structure
    6. Metadata standard (XML, MS OIM, MDC)
    7. Location of basic financial system database and metadata
    8. Location of advanced finance system database and metadata
    9. Location of human resource information system database and
    metadata
    10. Location of operation management system database and
    metadata
    11. Location of soft asset management system databases and
    metadata
    12. Location of external databases and metadata
    13. Location of web site transaction log database and metadata
    14. Location of supply chain management system database and
    metadata
    15. Location of risk management system database and metadata
    16. Location of account structure
    17. Base currency
    18. Location of database and metadata for equity information
    19. Location of database and metadata for debt information
    20. Location of database and metadata for tax rate information
    21. Location of database and metadata for currency conversion
    rate information
    22. Geospatial data? If yes, identity of geocoding service.
    23. The maximum number of generations to be processed without
    improving fitness
    24. Default clustering algorithm (selected from list) and maximum
    cluster number
    25. Amount of cash and marketable securities required for day
    to day operations
    26. Total cost of capital (weighted average cost of equity,
    debt and risk capital)
    27. Number of months a product is considered new after it is
    first produced
    28. Enterprise industry segments (SIC Code)
    29. Primary competitors by industry segment
    30. Management report types (text, graphic, both)
    31. Default reports
    32. Default Missing Data Procedure
    33. Maximum time to wait for user input
    34. Maximum discount rate for new projects (real option valuation)
    35. Maximum number of sub-elements
    36. Maximum amount to be spent on risk reduction per year
    37. Confidence interval for risk reduction programs
    38. On line account information for risk reduction products
  • The enterprise checklists are used by a “rules” engine (such as the one available from Neuron Data) in [0083] block 202 to influence the number and type of items with pre-defined metadata mapping for each category of value. For example, if the checklists indicate that the enterprise is focused on branded, consumer markets, then additional brand related factors will be pre-defined for mapping. The application of these system settings will be further explained as part of the detailed explanation of the system operation.
  • The software in [0084] block 202 uses the current system date to determine the time periods (months) that require data to complete the current operation and the real option valuations. After the date range is calculated it is stored in the system settings table (140). In one embodiment the valuation of the current operation by the system utilizes basic financial, advanced financial, soft asset management, supply chain, web-site transaction, external database and human resource data for the three year period before and the three year forecast period after the current date. The user (20) also has the option of specifying the data periods that will be used for completing system calculations.
  • After the storage of system setting data is complete, processing advances to a [0085] software block 203. The software in block 203 prompts the user (20) via the metadata and conversion rules window (702) to map metadata using the standard specified by the user (20) (XML, Microsoft Open Information Model or the Metadata Coalitions specification) from the basic financial system database (5), the operation management system database (10), the web site transaction log database (12), the human resource information system database (15), the risk management system database (17), the external database (25), the advanced financial system database (30), the soft asset management system database (35) and the supply chain system database (37) to the enterprise hierarchy stored in the system settings table (140) and to the pre-specified fields in the metadata mapping table (141). Pre-specified fields in the metadata mapping table include, the revenue, expense and capital components and sub-components for the enterprise and pre-specified fields for expected value drivers. Because the bulk of the information being extracted is financial information, the metadata mapping often takes the form of specifying the account number ranges that correspond to the different fields in the metadata mapping table (141). Table 16 shows the base account number structure that the account numbers in the other systems must align with. For example, using the structure shown below, the revenue component for the enterprise could be specified as enterprise 01, any department number, accounts 400 to 499 (the revenue account range) with any sub-account.
    TABLE 16
    Account Number
    01 - 902 (any) - 477- 86 (any)
    Segment Enterprise Department Account Sub-account
    Subgroup Workstation Marketing Revenue Singapore
    Position 4 3 2 1
  • As part of the metadata mapping process, any database fields that are not mapped to pre-specified fields are defined by the user ([0086] 20) as component of value elements of value or non-relevant attributes and umapped” in the metadata mapping table (141) to the corresponding fields in each database in a manner identical to that described above for the pre-specified fields. After all fields have been mapped to the metadata mapping table (141), the software in block 203 prompts the user (20) via the metadata and conversion rules window (702) to provide conversion rules for each metadata field for each data source. Conversion rules will include information regarding currency conversions and conversion for units of measure that may be required to accurately and consistently analyze the data. The inputs from the user (20) regarding conversion rules are stored in the conversion rules table (142) in the application database (50). When conversion rules have been stored for all fields from every data source, then processing advances to a software block 204.
  • The software in [0087] block 204 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 212. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 207.
  • The software in [0088] block 207 checks the bot date table (149) and deactivates any basic financial system data bots with creation dates before the current system date and retrieves information from the system settings table (140), metadata mapping table (141) and conversion rules table (142). The software in block 207 then initializes data bots for each field in the metadata mapping table (141) that mapped to the basic financial system database (5) in accordance with the frequency specified by user (20) in the system settings table (140). Bots are independent components of the application that have specific tasks to perform. In the case of data acquisition bots, their tasks are to extract and convert data from a specified source and then store it in a specified location. Each data bot initialized by software block 207 will store its data in the basic financial system table (143). Every data acquisition bot for every data source contains the information shown in Table 17.
    TABLE 17
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. The data source location
    3. Mapping information
    4. Timing of extraction
    5. Conversion rules (if any)
    6. Storage Location (to allow for tracking of source and destination
    events)
    7. Creation date (date, hour, minute, second)
  • After the software in [0089] block 207 initializes all the bots for the basic financial system database, processing advances to a block 208. In block 208, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the basic financial system database (5), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the basic financial system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the basic financial system table (143). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211. The software in block 211 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data are stored in the basic financial system table (143). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database (50) continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing passes on to software block 212.
  • The software in [0090] block 212 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 228. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 221.
  • The software in [0091] block 221 checks the bot date table (149) and deactivates any operation management system data bots with creation dates before the current system date and retrieves information from the system settings table (140), metadata mapping table (141) and conversion rules table (142). The software in block 221 then initializes data bots for each field in the metadata mapping table (141) that mapped to the operation management system database (10) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 221 will store its data in the operation system table (144).
  • After the software in [0092] block 221 initializes all the bots for the operation management system database, processing advances to a block 222. In block 222, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the operation management system database (10), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the operation management system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the operation system table (144). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211. The software in block 211 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data are stored in the operation system table (144). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database (50) continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to a software block 225.
  • The software in [0093] block 225 checks the bot date table (149) and deactivates any web site transaction log data bots with creation dates before the current system date and retrieves information from the system settings table (140), metadata mapping table (141) and conversion rules table (142). The software in block 225 then initializes data bots for each field in the metadata mapping table (141) that mapped to the web site transaction log database (12) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 225 will store its data in the web log data table (172).
  • After the software in [0094] block 225 initializes all the bots for the web site transaction log database, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the web site transaction log database (12), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the web site transaction log metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the web log data table (172). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211. The software in block 211 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data are stored in the web log data table (172). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database (50) continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to a software block 226.
  • The software in [0095] block 226 checks the bot date table (149) and deactivates any human resource information system data bots with creation dates before the current system date and retrieves information from the system settings table (140), metadata mapping table (141) and conversion rules table (142). The software in block 226 then initializes data bots for each field in the metadata mapping table (141) that mapped to the human resource information system database (15) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 226 will store its data in the human resource system table (145).
  • After the software in [0096] block 226 initializes all the bots for the human resource information system database, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the human resource information system database (15), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the human resource information system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the human resource system table (145). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211. The software in block 211 prompts the user (20).via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data are stored in the human resource system table (145). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database (50) continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to software block 228.
  • The software in [0097] block 228 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 248. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 241.
  • The software in [0098] block 241 checks the bot date table (149) and deactivates any external database data bots with creation dates before the current system date and retrieves information from the system settings table (140), metadata mapping table (141) and conversion rules table (142). The software in block 241 then initializes data bots for each field in the metadata mapping table (141) that mapped to the external database (25) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 241 will store its data in the external database table (146).
  • After the software in [0099] block 241 initializes all the bots for the external database, processing advances to a block 242. In block 242, the bots extract and convert data in accordance with their preprogrammed instructions. As each bot extracts and converts data from the external database (25), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the external database metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the external database table (146). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211. The software in block 211 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data are stored in the external database table (146). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database (50) continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to a software block 245.
  • The software in [0100] block 245 checks the bot date table (149) and deactivates any advanced financial system data bots with creation dates before the current system date and retrieves information from the system settings table (140), metadata mapping table (141) and conversion rules table (142). The software in block 245 then initializes data bots for each field in the metadata mapping table (141) that mapped to the advanced financial system database (30) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 245 will store its data in the advanced finance system database table (147).
  • After the software in [0101] block 245 initializes all the bots for the advanced finance system database, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the advanced financial system database (30), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the advanced finance system database metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the advanced finance system database table (147). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211. The software in block 211 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data are stored in the advanced finance system database table (147). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database (50) continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to software block 246.
  • The software in [0102] block 246 checks the bot date table (149) and deactivates any soft asset management system data bots with creation dates before the current system date and retrieves information from the system settings table (140), metadata mapping table (141) and conversion rules table (142). The software in block 246 then initializes data bots for each field in the metadata mapping table (141) that mapped to a soft asset management system database (35) in accordance with the frequency specified by user (20) in the system settings table (140). Extracting data from each soft asset management system ensures that the management of each soft asset is considered and prioritized within the overall financial models for the each enterprise. Each data bot initialized by software block 246 will store its data in the soft asset system table (148).
  • After the software in [0103] block 246 initializes bots for all soft asset management system databases, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the soft asset management system databases (35), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the metadata for the soft asset management system databases to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the soft asset system table (148). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211. The software in block 211 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data are stored in the soft asset system table (148). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database (50) continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to software block 248.
  • The software in [0104] block 248 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 264. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 261.
  • The software in [0105] block 261 checks the bot date table (149) and deactivates any risk management system data bots with creation dates before the current system date and retrieves information from the system settings table (140), metadata mapping table (141) and conversion rules table (142). The software in block 261 then initializes data bots for each field in the metadata mapping table (141) that mapped to a risk management system database (17) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 261 will store its data in the risk system table (176).
  • After the software in [0106] block 261 initializes bots for all risk management system databases, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the risk management system databases (17), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the metadata for the risk management system database (17) to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the risk management system table (174). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211. The software in block 211 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data are stored in the risk management system table (174). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database (50) continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to software block 262.
  • The software in [0107] block 262 checks the bot date table (149) and deactivates any supply chain system data bots with creation dates before the current system date and retrieves information from the system settings table (140), metadata mapping table (141) and conversion rules table (142). The software in block 262 then initializes data bots for each field in the metadata mapping table (141) that mapped to a supply chain system database (37) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 262 will store its data in the supply chain system table (174).
  • After the software in [0108] block 262 initializes bots for all supply chain system databases, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the supply chain system databases (37), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the metadata for the supply chain system database (37) to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data are stored in the supply chain system table (174). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 211. The software in block 211 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data are stored in the supply chain system table (174). It is worth noting at this point that the activation and operation of bots where all the fields have been mapped to the application database (50) continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to software block 264.
  • The software in [0109] block 264 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 276. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 265.
  • The software in [0110] block 265 prompts the user (20) via the identification and classification rules window (703) to identify keywords such as company names, brands, trademarks and competitors for pre-specified fields in the metadata mapping table (141). The user (20) also has the option of mapping keywords to other fields in the metadata mapping table (141). After specifying the keywords, the user (20) is prompted to select and classify descriptive terms for each keyword. The input from the user (20) is stored in the keyword table (150) in the application database before processing advances to a software block 267.
  • The software in [0111] block 267 checks the bot date table (149) and deactivates any internet text and linkage bots with creation dates before the current system date and retrieves information from the system settings table (140), the metadata mapping table (141) and the keyword table (150). The software in block 267 then initializes internet text and linkage bots for each field in the metadata mapping table (141) that mapped to a keyword in accordance with the frequency specified by user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of text and linkage bots, their tasks are to locate, count and classify keyword matches and linkages from a specified source and then store their findings in a specified location. Each text and linkage bot initialized by [0112] software block 267 will store the location, count and classification data it discovers in the classified text table (151). Multimedia data can be processed using bots with essentially the same specifications if software to translate and parse the multimedia content is included in each bot. Every internet text and linkage bot contains the information shown in Table 18.
    TABLE 18
    1. Unique ID number (based on date, hour, minute,
    second of creation)
    2. Creation date (date, hour, minute, second)
    3. Storage location
    4. Mapping information
    5. Home URL
    6. Keyword
    7. Descriptive term 1
    To
    7 + n. Descriptive term n
  • After being initialized, the text and linkage bots locate and classify data from the internet ([0113] 40) in accordance with their programmed instructions with the frequency specified by user (20) in the system settings table (140). As each text bot locates and classifies data from the internet (40) processing advances to a software block 268 before the bot completes data storage. The software in block 268 checks to see if all linkages are identified and all keyword hits are associated with descriptive terms that have been classified. If the software in block 268 doesn't find any unclassified “hits” or “links”, then the address, counts and classified text are stored in the classified text table (151). Alternatively, if there are terms that haven't been classified or links that haven't been identified, then processing advances to a block 269. The software in block 269 prompts the user (20) via the identification and classification rules window (703) to provide classification rules for each new term. The information regarding the new classification rules is stored in the keyword table (150) while the newly classified text and linkages are stored in the classified text table (151). It is worth noting at this point that the activation and operation of bots where all fields map to the application database (50) continues. Only bots with unclassified fields will “wait” for user input before completing data storage. The new classification rules will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to a software block 270.
  • The software in [0114] block 270 checks the bot date table (149) and deactivates any external database bots with creation dates before the current system date and retrieves information from the system settings table (140), the metadata mapping table (141) and the keyword table (150). The software in block 270 then initializes external database bots for each field in the metadata mapping table (141) that mapped to a keyword in accordance with the frequency specified by user (20) in the system settings table (140). Every bot initialized by software block 270 will store the location, count and classification of data it discovers in the classified text table (151). Every external database bot contains the information shown in Table 19.
    TABLE 19
    1. Unique ID number (based on date, hour, minute,
    second of creation)
    2. Creation date (date, hour, minute, second)
    3. Storage location
    4. Mapping information
    5. Data source
    6. Keyword
    7. Storage location
    8. Descriptive term 1
    To
    8 + n. Descriptive term n
  • After being initialized the bots locate data from the external database ([0115] 25) in accordance with its programmed instructions with the frequency specified by user (20) in the system settings table (140). As each bot locates and classifies data from the external database (25) processing advances to a software block 268 before the bot completes data storage. The software in block 268 checks to see if all keyword hits are associated with descriptive terms that have been classified. If the software in block 268 doesn't find any unclassified units”, then the address, count and classified text are stored in the classified text table (151) or the external database table (146) as appropriate. Alternatively, if there are terms that haven't been classified, then processing advances to a block 269. The software in block 269 prompts the user (20) via the identification and classification rules window (703) to provide classification rules for each new term. The information regarding the new classification rules is stored in the keyword table (150) while the newly classified text is stored in the classified text table (151). It is worth noting at this point that the activation and operation of bots where all fields map to the application database (50) continues. Only bots with unclassified fields “wait” for user input before completing data storage. The new classification rules will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to software block 276.
  • The software in [0116] block 276 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 291. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 277.
  • The software in [0117] block 277 checks the system settings table (140) to see if there is geocoded data in the application database (50) and to determine which on-line geocoding service (Centrus™ from QM Soft or MapMarker™ from MapInfo) is being used. If geospatial data are not being used, then processing advances to a block 291. Alternatively, if the software in block 277 determines that geospatial data are being used, processing advances to a software block 278.
  • The software in [0118] block 278 prompts the user (20) via the geospatial measure definitions window (709) to define the measures that will be used in evaluating the elements of value. After specifying the measures, the user (20) is prompted to select the geospatial locus for each measure from the data already stored in the application database (50). The input from the user (20) is stored in the geospatial measures table (152) in the application database before processing advances to a software block 279.
  • The software in [0119] block 279 checks the bot date table (149) and deactivates any geospatial bots with creation dates before the current system date and retrieves information from the system settings table (140), the metadata mapping table (141) and the geospatial measures table (152). The software in block 279 then initializes geospatial bots for each field in the metadata mapping table (141) that mapped to geospatial data in the application database (50) in accordance with the frequency specified by user (20) in the system settings table (140) before advancing processing to a software block 280.
  • Bots are independent components of the application that have specific tasks to perform. In the case of geospatial bots, their tasks are to calculate user specified measures using a specified geocoding service and then store the measures in a specified location. Each geospatial bot initialized by [0120] software block 279 will store the measures it calculates in the application database table where the geospatial data was found. Tables that could include geospatial data include: the basic financial system table (143), the operation system table (144), the human resource system table (145), the external database table (146), the advanced finance system table (147) and the soft asset system table (148). Every geospatial bot contains the information shown in Table 20.
    TABLE 20
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Geospatial locus
    6. Geospatial measure
    7. Geocoding service
  • In [0121] block 280 the geospatial bots locate data and complete measurements in accordance with their programmed instructions with the frequency specified by the user (20) in the system settings table (140). As each geospatial bot retrieves data and calculates the geospatial measures that have been specified, processing advances to a block 281 before the bot completes data storage. The software in block 281 checks to see if all geospatial data located by the bot has been measured. If the software in block 281 doesn't find any unmeasured data, then the measurement is stored in the application database (50). Alternatively, if there are data elements that haven't been measured, then processing advances to a block 282. The software in block 282 prompts the user (20) via the geospatial measure definition window (709) to provide measurement rules for each new term. The information regarding the new measurement rules is stored in the geospatial measures table (152) while the newly calculated measurement is stored in the appropriate table in the application database (50). It is worth noting at this point that the activation and operation of bots that don't have unmeasured fields continues. Only the bots with unmeasured fields “wait” for user input before completing data storage. The new measurement rules will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to a software block 291.
  • The software in [0122] block 291 checks: the basic financial system table (143), the operation system table (144), the human resource system table (145), the external database table (146), the advanced finance system table (147), the soft asset system table (148), the classified text table (151) and the geospatial measures table (152) to see if data are missing from any of the periods required for system calculation. The range of required dates was previously calculated by the software in block 202. If there are no data missing from any period, then processing advances to a software block 293. Alternatively, if there are missing data for any field for any period, then processing advances to a block 292.
  • The software in [0123] block 292, prompts the user (20) via the missing data window (704) to specify the method to be used for filling the blanks for each item that is missing data. Options the user (20) can choose from for filling the blanks include: the average value for the item over the entire time period, the average value for the item over a specified period, zero, the average of the preceding item and the following item values and direct user input for each missing item. If the user (20) doesn't provide input within a specified interval, then the default missing data procedure specified in the system settings table (140) is used. When all the blanks have been filled and stored for all of the missing data, system processing advances to a block 293.
  • The software in [0124] block 293 calculates attributes by item for each numeric data field in the basic financial system table (143), the operation system table (144), the human resource system table (145), the external database table (146), the advanced finance system table (147) and the soft asset system table (148). The attributes calculated in this step include: cumulative total value, the period-to-period rate of change in value, the rolling average value and a series of time lagged values. In a similar fashion the software in block 293 calculates attributes for each date field in the specified tables including time since last occurrence, cumulative time since first occurrence, average frequency of occurrence and the rolling average frequency of occurrence. The numbers derived from numeric and date fields are collectively referred to as “item performance indicators”. The software in block 293 also calculates pre-specified combinations of variables called composite variables for measuring the strength of the different elements of value. The item performance indicators are stored in the table where the item source data was obtained and the composite variables are stored in the composite variables table (153) before processing advances to a block 294.
  • The software in [0125] block 294 uses attribute derivation algorithms such as the AQ program to create combinations of the variables that weren't pre-specified for combination. While the AQ program is used in one embodiment of the present: invention, other attribute derivation algorithms, such as the LINUS algorithms, may be used to the same effect. The software creates these attributes using both item variables that were specified as 37 element” variables and item variables that were not. The resulting composite variables are stored in the composite variables table (153) before processing advances to a block 295.
  • The software in [0126] block 295 derives market value factors by enterprise for each numeric data field with data in the sentiment factors table (169). Market value factors include: the ratio of enterprise earnings to expected earnings, commodity prices not captured in process valuations, inflation rate, growth in g.d.p., volatility, volatility vs. industry average volatility, interest rates, increases in interest rates, insider trading direction and levels, consumer confidence and the unemployment rate that have an impact on the market price of the equity for an enterprise and/or an industry. The market value factors derived in this step include: cumulative totals, the period to period rate of change, the rolling average value and a series of time lagged values. In a similar fashion the software in block 295 calculates market value factors for each date field in the specified table including time since last occurrence, cumulative time since first occurrence, average frequency of occurrence and the rolling average frequency of occurrence. The numbers derived from numeric and date fields are collectively referred to as “market performance indicators”. The software in block 295 also calculates pre-specified combinations of variables called composite factors for measuring the strength of the different market value factors. The market performance indicators and the composite factors are stored in the sentiment factors table (169) before processing advances to a block 296.
  • The software in [0127] block 296 uses attribute derivation algorithms, such as the Linus algorithm, to create combinations of the factors that were not pre-specified for combination. While the Linus algorithm is used in one embodiment of the present invention, other attribute derivation algorithms, such as the AQ program, may be used to the same effect. The software creates these attributes using both market value factors that were included in “composite factors” and market value factors that were not. The resulting composite variables are stored in the sentiment factors table (169) before processing advances to a block 297.
  • The software in [0128] block 297 uses pattern-matching algorithms to assign pre-designated data fields for different elements of value to pre-defined groups with numerical values. This type of analysis is useful in classifying purchasing patterns and/or communications patterns as “heavy”, “light”, “moderate” or “sporadic”. The classification and the numeric value associated with the classification are stored in the application database (50) table where the data field is located before processing advances to a block 298.
  • The software in [0129] block 298 retrieves data from the metadata mapping table (141), creates and then stores the definitions for the pre-defined components of value in the components of value definition table (155). As discussed previously, the revenue component of value is not divided into sub-components, the expense value is divided into five sub-components: the cost of raw materials, the cost of manufacture or delivery of service, the cost of selling, the cost of support and the cost of administration and the capital value is divided into six sub-components: cash, non-cash financial assets, production equipment, other assets, financial liabilities and equity in one embodiment. Different subdivisions of the components of value can be used to the same effect. When data storage is complete, processing advances to a software block 302 to begin the analysis of the extracted data using analysis bots.
  • Analysis Bots
  • The flow diagrams in FIG. 6A, FIG. 6B and FIG. 6C detail the processing that is completed by the portion of the application software ([0130] 300) that programs analysis bots to:
  • 1. Identify the item variables, item performance indicators and composite variables for each enterprise, element of value and sub-element of value that drive the components of value (revenue, expense and changes in capital), [0131]
  • 2. Create vectors that use item variables, item performance indicators and composite variables to summarize the performance of each enterprise, element of value and sub-element of value, [0132]
  • 3. Determine the causal factors for industry value, determine the appropriate interest rate, value and allocate the industry real options to each enterprise on the basis of relative element strength; [0133]
  • 4. Determine the appropriate interest rate on the basis of relative causal element strength and value the enterprise real options; [0134]
  • 5. Determine the expected life of each element of value and sub-element of value; [0135]
  • 6. Calculate the enterprise current operation value and value the revenue, expense and capital components using the information prepared in the previous stage of processing; [0136]
  • 7. Specify and optimize predictive causal models to determine the relationship between the vectors determined in step 2 and the revenue, expense and capital values determined in step 6, [0137]
  • 8. Combine the results of the fifth, sixth and seventh stages of processing to determine the value of each, enterprise contribution, element and sub-element (as shown in Table 5); [0138]
  • 9. Calculate the market sentiment by subtracting the current operation value, the total value of real options and the allocated industry options from market value for the enterprise (if it has a public stock market price); and [0139]
  • 10. Analyze the sources of market sentiment. [0140]
  • Each analysis bot generally normalizes the data being analyzed before processing begins. [0141]
  • Processing in this portion of the application begins in [0142] software block 302. The software in block 302 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 314. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 303.
  • The software in [0143] block 303 retrieves data from the meta data mapping table (141) and the soft asset system table (148) and then assigns item variables, item performance indicators and composite variables to each element of value using a two-step process. First, item variables and item performance indicators are assigned to elements of value based on the soft asset management system they correspond to (for example, all item variables from a brand management system and all item performance indicators derived from brand management system variables are assigned to the brand element of value). Second, pre-defined composite variables are assigned to the element of value they were assigned to measure in the metadata mapping table (141). After the assignment of variables and indicators to elements is complete, the resulting assignments are saved to the element of value definition table (155) and processing advances to a block 304.
  • The software in [0144] block 304 checks the bot date table (149) and deactivates any temporal clustering bots with creation dates before the current system date. The software in block 304 then initializes bots in order for each component of value. The bots: activate in accordance with the frequency specified by the user (20) in the system settings table (140), retrieve the information from the system settings table (140), the metadata mapping table (141) and the component of value definition table (156) in order and define segments for the component of value data before saving the resulting cluster information in the application database (50).
  • Bots are independent components of the application that have specific tasks to perform. In the case of temporal clustering bots, their primary task is to segment the component and sub-component of value variables into distinct time regimes that share similar characteristics. The temporal clustering bot assigns a unique identification (id) number to each “regime” it identifies and stores the unique id numbers in the cluster id table ([0145] 157). Every time period with data are assigned to one of the regimes. The cluster id for each regime is saved in the data record for each item variable in the table where it resides. The item variables are segmented into a number of regimes less than or equal to the maximum specified by the user (20) in the system settings. The data are segmented using a competitive regression algorithm that identifies an overall, global model before splitting the data and creating new models for the data in each partition. If the error from the two models is greater than the error from the global model, then there is only one regime in the data. Alternatively, if the two models produce lower error than the global model, then a third model is created. If the error from three models is lower than from two models then a fourth model is added. The process continues until adding a new model does not improve accuracy. Other temporal clustering algorithms may be used to the same effect. Every temporal clustering bot contains the information shown in Table 21.
    TABLE 21
    1. Unique ID number (based on date, hour, minute,
    second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Maximum number of clusters
    6. Variable 1
    .
    .
    .
    6 + n. Variable n
  • When bots in [0146] block 304 have identified and stored regime assignments for all time periods with data, processing advances to a software block 305.
  • The software in [0147] block 305 checks the bot date table (149) and deactivates any variable clustering bots with creation dates before the current system date. The software in block 305 then initializes bots in order for each element of value. The bots: activate in accordance with the frequency specified by the user (20) in the system settings table (140), retrieve the information from the system settings table (140), the metadata mapping table (141) and the element of value definition table (155) in order and define segments for the element of value data before saving the resulting cluster information in the application database (50).
  • Bots are independent components of the application that have specific tasks to perform. In the case of variable clustering bots, their primary task is to segment the element of value variables into distinct clusters that share similar characteristics. The clustering bot assigns a unique id number to each “cluster” it identifies and stores the unique id numbers in the cluster id table ([0148] 157). Every item variable for every element of value is assigned to one of the unique clusters. The cluster id for each variable is saved in the data record for each item variable in the table where it resides. The item variables are segmented into a number of clusters less than or equal to the maximum specified by the user (20) in the system settings table (140). The data are segmented using the “default” clustering algorithm the user (20) specified in the system settings. The system of the present invention provides the user (20) with the choice of several clustering algorithms including: an unsupervised “Kohonen” neural network, neural network, decision tree, support vector method, K-nearest neighbor, expectation maximization (EM) and the segmental K-means algorithm. For algorithms that normally require the number of clusters to be specified, the bot will iterate the number of clusters until it finds the cleanest segmentation for the data. Every variable clustering bot contains the information shown in Table 22.
    TABLE 22
    1. Unique ID number (based on date, hour, minute,
    second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Element of value
    6. Clustering algorithm type
    7. Maximum number of clusters
    8. Variable 1
    . . . to
    8 + n. Variable n
  • When bots in [0149] block 305 have identified and stored cluster assignments for the item variables associated with each component and subcomponent of value, processing advances to a software block 306.
  • The software in [0150] block 306 checks the bot date table (149) and deactivates any predictive model bots with creation dates before the current system date. The software in block 306 then retrieves the information from the system settings table (140), the metadata mapping table (141), the element of value definition table (155) and the component of value definition table (156) required to initialize predictive model bots for each component of value.
  • Bots are independent components of the application that have specific tasks to perform. In the case of predictive model bots, their primary task is to determine the relationship between the item variables, item performance indicators and composite variables (collectively hereinafter, “the variables”) and the components of value (and sub-components of value). Predictive model bots are initialized for each component and sub-component of value. They are also initialized for each cluster and regime of data in accordance with the cluster and regime assignments specified by the bots in [0151] blocks 304 and 305. A series of predictive model bots is initialized at this stage because it is impossible to know in advance which predictive model type will produce the “best” predictive model for the data from each commercial enterprise. The series for each model includes 12 predictive model bot types: neural network; CART; GARCH, projection pursuit regression; generalized additive model (GAM), redundant regression network; rough-set analysis, boosted Naïve Bayes Regression; MARS; linear regression; support vector method and stepwise regression. Additional predictive model types can be used to the same effect. The software in block 306 generates this series of predictive model bots for the levels of the enterprise shown in Table 23.
    TABLE 23
    Predictive models by enterprise level
    Enterprise:
    Element variables relationship to enterprise revenue
    component of value
    Element variables relationship to enterprise expense
    subcomponents of value
    Element variables relationship to enterprise capital
    change subcomponents of value
    Element of Value:
    Sub-element of value variables relationship to element of value
  • Every predictive model bot contains the information shown in Table 24. [0152]
    TABLE 24
    1. Unique ID number (based on date, hour, minute, second of
    creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Component or subcomponent of value
    6. Global or Cluster (ID) and/or Regime (ID)
    7. Element or Sub-Element ID
    8. Predictive Model Type
    9. Variable 1
    . . . to
    9 + n. Variable n
  • After predictive model bots are initialized, the bots activate in accordance with the frequency specified by the user ([0153] 20) in the system settings table (140). Once activated, the bots retrieve the required data from the appropriate table in the application database (50) and randomly partition the item variables, item performance indicators and composite variables into a training set and a test set. The software in block 306 uses “bootstrapping” where the different training data sets are created by re-sampling with replacement from the original training set so data records may occur more than once. The same sets of data will be used to train and then test each predictive model bot. When the predictive model bots complete their training and testing, processing advances to a block 307.
  • The software in [0154] block 307 determines if clustering improved the accuracy of the predictive models generated by the bots in software block 306. The software in block 307 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each type of analysis—with and without clustering—to determine the best set of variables for each type of analysis. The type of analysis having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is given preference in determining the best set of variables for use in later analysis. There are four possible outcomes from this analysis as shown in Table 25.
    TABLE 25
    1. Best model has no clustering
    2. Best model has temporal clustering, no variable clustering
    3. Best model has variable clustering, no temporal clustering
    4. Best model has temporal clustering and variable clustering
  • If the software in [0155] block 307 determines that clustering improves the accuracy of the predictive models, then processing advances to a software block 310. Alternatively, if clustering doesn't improve the overall accuracy of the predictive models, then processing advances to a software block 308.
  • The software in [0156] block 308 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each model to determine the best set of variables for each model. The models having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is given preference in determining the best set of variables. As a result of this processing, the best set of variables contain: the item variables, item performance indicators and composite variables that correlate most strongly with changes in the components of value. The best set of variables will hereinafter be referred to as the “value drivers”. Eliminating low correlation factors from the initial configuration of the vector creation algorithms increases the efficiency of the next stage of system processing. Other error algorithms alone or in combination may be substituted for the mean squared error algorithm. After the best set of variables have been selected and stored in the element variables table (158) for all models at all levels, the software in block 308 tests the independence of the value drivers at the enterprise, element and sub-element level before processing advances to a block 309.
  • The software in [0157] block 309 checks the bot date table (149) and deactivates any causal model bots with creation dates before the current system date. The software in block 309 then retrieves the information from the system settings table (140), the metadata mapping table (141), the component of value definition table (156) and the element variables table (158) in order to initialize causal model bots for each enterprise, element of value and sub-element of value in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of causal model bots, their primary task is to refine the item variable, item performance indicator and composite variable selection to reflect only causal variables. (Note: these variables are grouped together to represent an element vector when they are dependent). A series of causal model bots are initialized at this stage because it is impossible to know in advance which causal model will produce the “best” vector for the best fit variables from each model. The series for each model includes five causal model bot types: Tetrad, M M L, LaGrange, Bayesian and path analysis. The software in [0158] block 309 generates this series of causal model bots for each set of variables stored in the element variables table (158) in the previous stage in processing. Every causal model bot activated in this block contains the information shown in Table 26.
    TABLE 26
    1. Unique ID number (based on date, hour, minute, second
    of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Component or subcomponent of value
    6. Enterprise, Element or Sub-Element ID
    7. Variable set
    8. Causal model type
  • After the causal model bots are initialized by the software in [0159] block 309, the bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). Once activated, they retrieve the element variable information for each model from the element variables table (158) and sub-divides the variables into two sets, one for training and one for testing. The same set of training data is used by each of the different types of bots for each model. After the causal model bots complete their processing for each model, the software in block 309 uses a model selection algorithm to identify the model that best fits the data for each enterprise, element or sub-element being analyzed. For the system of the present invention, a cross validation algorithm is used for model selection. The software in block 309 saves the best fit causal factors in the vector table (159) in the application database (50) and processing advances to a block 312. The software in block 312 tests the value drivers or vectors to see if there are “missing” value drivers that are influencing the results. If the software in block 312 does not detect any missing value drivers, then system processing advances to a block 323. Alternatively, if missing value drivers are detected by the software in block 312, then processing advances to a software block 321.
  • If software in [0160] block 307 determines that clustering improves predictive model accuracy, then processing advances to block 310 as described previously. The software in block 310 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each model and cluster to determine the best set of variables for each model. The models having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is given preference in determining the best set of variables. As a result of this processing, the best set of variables contain: the item variables, item performance indicators and composite variables that correlate most strongly with changes in the components of value. The best set of variables will hereinafter be referred to as the “value drivers”. Eliminating low correlation factors from the initial configuration of the vector creation algorithms increases the efficiency of the next stage of system processing. Other error algorithms alone or in combination may be substituted for the mean squared error algorithm. After the best set of variables have been selected and stored in the element variables table (158) for all models at all levels, the software in block 310 tests the independence of the value drivers at the enterprise, element and sub-element level before processing advances to a block 311.
  • The software in [0161] block 311 checks the bot date table (149) and deactivates any causal model bots with creation dates before the current system date. The software in block 311 then retrieves the information from the system settings table (140), the metadata mapping table (141), the component of value definition table (156) and the element variables table (158) in order to initialize causal model bots for each enterprise, element of value and sub-element of value at every level in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of causal model bots, their primary task is to refine the item variable, item performance indicator and composite variable selection to reflect only causal variables. (Note: these variables are grouped together to represent a single element vector when they are dependent). In some cases it may be possible to skip the correlation step before selecting causal the item variable, item performance indicator and composite variables. A series of causal model bots are initialized at this stage because it is impossible to know in advance which causal model will produce the “best” vector for the best fit variables from each model. The series for each model includes four causal model bot types: Tetrad, LaGrange, Bayesian and path analysis. The software in [0162] block 311 generates this series of causal model bots for each set of variables stored in the element variables table (158) in the previous stage in processing. Every causal model bot activated in this block contains the information shown in Table 27.
    TABLE 27
    1. Unique ID number (based on date, hour, minute, second
    of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Component or subcomponent of value
    6. Cluster (ID) and/or Regime (ID)
    7. Enterprise, Element or Sub-Element ID
    8. Variable set
    9. Causal model type
  • After the causal model bots are initialized by the software in [0163] block 311, the bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). Once activated, they retrieve the element variable information for each model from the element variable table (158) and sub-divides the variables into two sets, one for training and one for testing. The same set of training data is used by each of the different types of bots for each model. After the causal model bots complete their processing for each model, the software in block 311 uses a model selection algorithm to identify the model that best fits the data for each enterprise, element or sub-element being analyzed. For the system of the present invention, a cross validation algorithm is used for model selection. The software in block 311 saves the best fit causal factors in the vector table (159) in the application database (50) and processing advances to block 312. The software in block 312 tests the value drivers or vectors to see if there are “missing” value drivers that are influencing the results. If the software in block 312 doesn't detect any missing value drivers, then system processing advances to a block 323. Alternatively, if missing value drivers are detected by the software in block 312, then processing advances to a software block 321.
  • The software in [0164] block 321 prompts the user (20) via the variable identification window (710) to adjust the specification(s) for the affected enterprise, element of value or subelement of value. After the input from the user (20) is saved in the system settings table (140) and/or the element of value definition table (155), system processing advances to a software block 323. The software in block 323 checks the in the system settings table (140) and/or the element of value definition table (155) to see if there any changes in structure. If there have been changes in the structure, then processing advances to a block 205 and the system processing described previously is repeated. Alternatively, if there are no changes in structure, then processing advances to a block 325.
  • The software in [0165] block 325 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new one. If the calculation is new, then processing advances to a software block 326. Alternatively, if the calculation is not a new calculation, then processing advances to a software block 333.
  • The software in [0166] block 326 checks the bot date table (149) and deactivates any vector generation bots with creation dates before the current system date. The software in block 326 then initializes bots for each element and sub-element of value for the enterprise. The bots activate in accordance with the frequency specified by the user (20) in the system settings table (140), retrieve the information from the system settings table (140), the metadata mapping table (141), the component of value definition table (156) and the element variables table (158) in order to initialize vector generation bots for each enterprise, element of value and sub-element of value in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of vector generation bots, their primary task is to produce formulas, (hereinafter, vectors) that summarize the relationship between the item variables, item performance indicators and composite variables for the element or sub-element and changes in the component or sub-component of value being examined. (Note: these variables are simply grouped together to represent an element vector when they are dependent). A series of vector generation bots are initialized at this stage because it is impossible to know in advance which vector generation algorithm will produce the “best” vector for the best fit variables from each model. The series for each model includes four vector generation bot types: data fusion, polynomial, induction and LaGrange. Other vector generation algorithms can be used to the same effect. The software in [0167] block 326 generates this series of vector generation bots for each set of variables stored in the element variables table (158). Every vector generation bot contains the information shown in Table 28.
    TABLE 28
    1. Unique ID number (based on date, hour, minute, second
    of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Maximum number of regimes
    6. Enterprise or Industry
    7. Factor 1
    . . . to
    7 + n. Factor n
  • When bots in [0168] block 326 have identified and stored vectors for all time periods with data, processing advances to a software block 327.
  • The software in [0169] block 327 checks the bot date table (149) and deactivates any temporal clustering bots with creation dates before the current system date. The software in block 327 then initializes bots for market value factors for each enterprise with a market price and for the industry. The bots activate in accordance with the frequency specified by the user (20) in the system settings table (140), retrieve the information from the system settings table (140), the metadata mapping table (141) and the sentiment factors table (169) in order and define regimes for the market value factor data before saving the resulting regime information in the application database (50).
  • Bots are independent components of the application that have specific tasks to perform. In the case of temporal clustering bots for market value factors, their primary tasks are to identify the best market value indicator (price, relative price, yield or first derivative of price change) to use for market factor analysis and then to segment the market value factors into distinct time regimes that share similar characteristics. The temporal clustering bots select the best value indicator by grouping the universe of stocks using each of the four value indicators and then comparing the clusters to the known groupings of the [0170] S&P 500. The temporal clustering bots then use the identified value indicator in the analysis of temporal clustering. The bots assign a unique id number to each “regime” it identifies and stores the unique id numbers in the cluster id table (157). Every time period with data is assigned to one of the regimes,. The cluster id for each regime is also saved in the data record for each market value factor in the table where it resides. The market value factors are segmented into a number of regimes less than or equal to the maximum specified by the user (20) in the system settings table (140). The factors are segmented using a competitive regression algorithm that identifies an overall, global model before splitting the data and creating new models for the data in each partition. If the error from the two models is greater than the error from the global model, then there is only one regime in the data. Alternatively, if the two models produce lower error than the global model, then a third model is created. If the error from three models is lower than from two models then a fourth model is added. The process continues until adding a new model does not improve accuracy. Other temporal clustering algorithms may be used to the same effect. Every temporal clustering bot contains the information shown in Table 29.
    TABLE 29
    1. Unique ID number (based on date, hour, minute, second
    of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Maximum number of regimes
    6. Enterprise or Industry
    7. Value indicator (price, relative price, yield, derivative, etc.)
    8. Factor 1
    . . . to
    8 + n. Factor n
  • When bots in [0171] block 327 have identified and stored regime assignments for all time periods with data, processing advances to a software block 328.
  • The software in [0172] block 328 checks the bot date table (149) and deactivates any causal factor bots with creation dates before the current system date. The software in block 328 then retrieves the information from the system settings table (140), the metadata mapping table (141), the element of value definition table (155) and the sentiment factors table (169) in order to initialize causal market value factor bots for the enterprise and for the industry in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of causal factor bots, their primary task is to identify the item variables, item performance indicators, composite variables and market value factors that are causal factors for stock price movement. (Note: these variables are grouped together when they are dependent). For each enterprise and industry the causal factors are those that drive changes in the value indicator identified by the temporal clustering bots. A series of causal factor bots are initialized at this stage because it is impossible to know in advance which causal factors will produce the “best” model for each enterprise and industry. The series for each model includes five causal model bot types: Tetrad, LaGrange, M M L, Bayesian and path analysis. Other causal models can be used to the same effect. The software in [0173] block 328 generates this series of causal model bots for each set of variables stored in the element variables table (158) in the previous stage in processing. Every causal factor bot activated in this block contains the information shown in Table 30.
    TABLE 30
    1. Unique ID number (based on date, hour, minute, second
    of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    6. Enterprise or Industry
    7. Regime
    8. Value indicator (price, relative price, yield, derivative, etc.)
    9. Causal model type
  • After the causal factor bots are initialized by the software in [0174] block 328, the bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). Once activated, they retrieve the required information from the element of value definition table (155) and the sentiment factors table (169) and sub-divide the data into two sets, one for training and one for testing. The same set of training data is used by each of the different types of bots for each model. After the causal factor bots complete their processing for the enterprise and/or industry, the software in block 328 uses a model selection algorithm to identify the model that best fits the data for each enterprise or industry. For the system of the present invention, a cross validation algorithm is used for model selection. The software in block 328 saves the best fit causal factors in the sentiment factors table (169) in the application database (50) and processing advances to a block 329. The software in block 329 tests to see if there are “missing” causal market value factors that are influencing the results. If the software in block 329 does not detect any missing market value factors, then system processing advances to a block 330. Alternatively, if missing market value factors are detected by the software in block 329, then processing returns to software block 321 and the processing described in the preceding section is repeated.
  • The software in [0175] block 330 checks the bot date table (149) and deactivates any industry rank bots with creation dates before the current system date. The software in block 330 then retrieves the information from the system settings table (140), the metadata mapping table (141), the vector table (159) and the sentiment factors table (169) in order to initialize industry rank bots for the enterprise if it has a public stock market price and for the industry in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of industry rank bots, their primary task is to determine the relative position of the enterprise being evaluated on the causal attributes identified in the previous processing step. (Note: these variables are grouped together when they are dependent). The industry rank bots use Data Envelopement Analysis (hereinafter, DEA) to determine the relative industry ranking of the enterprise being examined. The software in [0176] block 330 generates industry rank bots for the enterprise being evaluated. Every industry rank bot activated in this block contains the information shown in Table 31.
    TABLE 31
    1. Unique ID number (based on date, hour, minute, second
    of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise
  • After the industry rank bots are, initialized by the software in [0177] block 330, the bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). Once activated, they retrieve the item variables, item performance indicators, composite variables and market value factors for the enterprise from the application database (50) and sub-divides the factors into two sets, one for training and one for testing. After the industry rank bots complete their processing for the enterprise the software in block 330 saves the industry ranks in the vector table (159) in the application database (50) and processing advances to a block 331.
  • The software in [0178] block 331 checks the bot date table (149) and deactivates any option bots with creation dates before the current system date. The software in block 331 then retrieves the information from the system settings table (140), the metadata mapping table (141), the basic financial system database (143), the external database table (146) and the advanced finance system table (147) in order to initialize option bots for the industry and the enterprise.
  • Bots are independent components of the application that have specific tasks to perform. In the case of option bots, their primary tasks are to calculate the discount rate to be used for valuing the real options and to value the real options for the industry and the enterprise. The discount rate for enterprise real options is calculated by adding risk factors for each causal soft asset to a base discount rate. The risk factor for each causal soft asset is determined by a two step process. The first step in the process divides the maximum real option discount rate (specified by the user in system settings) by the number of causal soft assets. The second step in the process determines if the enterprise is highly rated on the causal soft assets and determines an appropriate risk factor. If the enterprise is highly ranked on the soft asset, then the discount rate is increased by a relatively small amount for that causal soft asset. Alternatively, if the enterprise has a low ranking on a causal soft asset, then the discount rate is increased by a relatively large amount for that causal soft asset as shown below in Table 32. [0179]
    TABLE 32
    Maximum discount rate = 50%, Causal soft assets = 5
    Maximum risk factor/soft asset = 50%/5 = 10%
    Industry Rank on Soft Asset % of Maximum
    1  0%
    2 25%
    3 50%
    4 75%
    5 or higher 100% 
    Causal Soft Asset: Relative Rank Risk Factor
    Brand
    1  0%
    Channel 3  5%
    Manufacturing Process 4 7.5% 
    Strategic Alliances 5 10%
    Vendors 2 2.5% 
    Subtotal
    25%
    Base Rate
    12%
    Discount Rate
    37%
  • The discount rate for industry options is calculated using a weighted average total cost of capital approach in a manner that is well known. The base discount rate for enterprise options is calculated using a total average cost of capital (TACC) approach shown below. [0180]
  • TACC=cost of debt×(debt value/total value)+cost of equity×(equity value/total value)+cost of insurance×(insurance value/total value)
  • After the appropriate discount rates are determined, the value of each real option is calculated using Black Scholes algorithms in a manner that is well known. The real option can be valued using other algorithms including binomial, neural network or dynamic programming algorithms. The software in [0181] block 331 values option bots for the industy and the enterprise. Industry option bots utilize the industry cost of capital for all calculations.
  • Option bots contain the information shown in Table 33. [0182]
    TABLE 33
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Industry or Enterprise ID
    6. Real option type (Industry or Enterprise)
    7. Real option
    8. Allocation percentage (if applicable)
  • After the option bots are initialized, they activate in accordance with the frequency specified by the user ([0183] 20) in the system settings table (140). After being activated, the bots retrieve information for the industry and the enterprise from the basic financial system database (143), the external database table (146) and the advanced finance system table (147) in order to complete the option valuation. After the discount has been determined the value of the real option is calculated using Black Schole's algorithms in a manner that is well known. The resulting values are then saved in the real option value table (162) in the application database (50) before processing advances to a block 332.
  • The software in [0184] block 332 uses the results of the DEA analysis in the prior processing block and the percentage of industry real options controlled by the enterprise to determine the allocation percentage for industry options. The more dominant the enterprise, as indicated by the industry rank for the intangible element indicators, the greater the allocation of industry real options. When the allocation of options has been determined and the resulting values stored in the real option value table (162) in the application database (50), processing advances to a block 333.
  • The software in [0185] block 333 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation, a value analysis or a structure change, then processing advances to a software block 341. Alternatively, if the calculation is new a value analysis or a structure change, then processing advances to a software block 343.
  • The software in [0186] block 341 checks the bot date table (149) and deactivates any cash flow bots with creation dates before the current system date. The software in the block then retrieves the information from the system settings table (140), the metadata mapping table (141) and the component of value definition table (156) in order to initialize cash flow bots for the enterprise in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of cash flow bots, their primary tasks are to calculate the cash flow for the enterprise for every time period where data are available and to forecast a steady state cash flow for the enterprise. Cash flow is calculated using a well known formula where cash flow equals period revenue minus period expense plus the period change in capital plus non-cash depreciation/amortization for the period. The steady state cash flow is calculated for the enterprise using forecasting methods identical to those disclosed previously in U.S. Pat. 5,615,109 to forecast revenue, expenses, capital changes and depreciation separately before calculating the cash flow. The software in [0187] block 334 initializes cash flow bots for the enterprise.
  • Every cash flow bot contains the information shown in Table 34. [0188]
    TABLE 34
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise ID
    6. Components of value
  • After the cash flow bots are initialized, the bots activate in accordance with the frequency specified by the user ([0189] 20) in the system settings table (140). After being activated the bots retrieve the component of value information for the enterprise from the component of value definition table (156). The cash flow bots then complete the calculation and forecast of cash flow for the enterprise before saving the resulting values by period in the cash flow table (161) in the application database (50) before processing advances to a block 342.
  • The software in [0190] block 342 checks the bot date table (149) and deactivates any element life bots with creation dates before the current system date. The software in block 341 then retrieves the information from the system settings table (140), the metadata mapping table (141) and the element of value definition table (155) in order to initialize element life bots for each element and sub-element of value in the enterprise being examined.
  • Bots are independent components of the application that have specific tasks to perform. In the case of element life bots, their primary task is to determine the expected life of each element and sub-element of value. There are three methods for evaluating the expected life of the elements and sub-elements of value. Elements of value that are defined by a population of members or items (such as: channel partners, customers, employees and vendors) will have their lives estimated by analyzing and forecasting the lives of the members of the population. The forecasting of member lives will be determined by the “best” fit solution from competing life estimation methods including the Iowa type survivor curves, Weibull distribution survivor curves, Gompertz-Makeham survivor curves, polynomial equations and the forecasting methodology disclosed in U.S. Pat. No. 5,615,109. Elements of value (such as some parts of Intellectual Property i.e. patents) that have legally defined lives will have their lives calculated using the time period between the current date and the expiration date of the element or sub-element. Finally, elements of value and sub-element of value (such as brand names, information technology and processes) that may not have defined lives and that may not consist of a collection of members will have their lives estimated by comparing the relative strength and stability of the element vectors with the relative stability of the enterprise Competitive Advantage Period (CAP) estimate. The resulting values are stored in the element of value definition table ([0191] 155) for each element and sub-element of value.
  • Every element life bot contains the information shown in Table 35. [0192]
    TABLE 35
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Element or Sub-Element of value
    6. Life estimation method (item analysis, date calculation or relative
    CAP)
  • After the element life bots are initialized, they are activated in accordance with the frequency specified by the user ([0193] 20) in the system settings table (140). After being activated, the bots retrieve information for each element and sub-element of value from the element of value definition table (155) in order to complete the estimate of element life. The resulting values are then saved in the element of value definition table (155) in the application database (50) before processing advances to a block 343.
  • The software in [0194] block 343 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation, a value analysis or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 402. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 345.
  • The software in [0195] block 345 checks the bot date table (149) and deactivates any component capitalization bots with creation dates before the current system date. The software in block 341 then retrieves the information from the system settings table (140), the metadata mapping table (141) and the component of value definition table (156) in order to initialize component capitalization bots for the enterprise.
  • Bots are independent components of the application that have specific tasks to perform. In the case of component capitalization bots, their task is to determine the capitalized value of the components and subcomponents of value, forecast revenue, expense or capital requirements for the enterprise in accordance with the formula shown in Table 36. [0196]
    TABLE 36
    Value = Ff1/(1 + K) + Ff2/(1 + K)2 + Ff3/(1 + K)3 +
    Ff4/(1 + K)4 + (Ff4 × (1 + g))/(1 + K)5) +
    (Ff4 × (1 + g)2)/(1 + K)6) . . . + (Ff4 × (1 + g)N)/(1 + K)N+4)
    Where:
    Ffx = Forecast revenue, expense or capital requirements for year x
    after valuation date (from advanced finance system)
    N = Number of years in CAP (from prior calculation)
    K = Total average cost of capital - % per year
    (from prior calculation)
    g = Forecast growth rate during CAP - % per year
    (from advanced financial system)
  • After the capitalized value of every component and sub-component of value is complete, the results are stored in the component of value definition table ([0197] 156) in the application database (50).
  • Every component capitalization bot contains the information shown in Table 37. [0198]
    TABLE 37
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise ID
    6. Component of value (revenue, expense or capital change)
    7. Sub component of value
  • After the component capitalization bots are initialized they activate in accordance with the frequency specified by the user ([0199] 20) in the system settings table (140). After being activated, the bots retrieve information for each component and sub-component of value from the advanced finance system table (147) and the component of value definition table (156) in order to calculate the capitalized value of each component. The resulting values are then saved in the component of value definition table (156) in the application database (50) before processing advances to a block 347.
  • The software in [0200] block 347 checks the bot date table (149) and deactivates any element valuation bots with creation dates before the current system date. The software in block 347 then retrieves the information from the system settings table (140), the metadata mapping table (141), the element of value definition table (155), the component of value definition table (156) in order to initialize valuation bots for each element and sub-element of value.
  • Bots are independent components of the application that have specific tasks to perform. In the case of element valuation bots, their task is to calculate the contribution of every element of value and sub-element of value in the enterprise using the overall procedure outlined in Table 5. The first step in completing the calculation in accordance with the procedure outlined in Table 5, is determining the relative contribution of element and sub-element of value by using a series of predictive models to find the best fit relationship between: [0201]
  • 1. The element of value vectors and the enterprise components of value; and [0202]
  • 2. The sub-element of value vectors and the element of value they correspond to. [0203]
  • The system of the present invention uses 12 different types of predictive models to determine relative contribution: neural network; CART; projection pursuit regression; generalized additive model (GAM); GARCH; MMDR; redundant regression network; boosted Naïve Bayes Regression; the support vector method; MARS; linear regression; and stepwise regression to determine relative contribution. The model having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is the best fit model. The “relative contribution algorithm” used for completing the analysis varies with the model that was selected as the “best-fit”. For example, if the “best-fit” model is a neural net model, then the portion of revenue attributable to each input vector is determined by the formula shown in Table 38. [0204]
    TABLE 38
    ( k = 1 k = m j = 1 j = n I j k × O k / j = 1 j = n I ik ) / k = 1 k = m j = 1 j = n I j k × O k
    Figure US20040199445A1-20041007-M00001
  • After the relative contribution of each enterprise, element of value and sub-element of value is determined, the results of this analysis are combined with the previously calculated information regarding element life and capitalized component value to complete the valuation of each: enterprise contribution, element of value and sub-element using the approach shown in Table 39. [0205]
    TABLE 39
    Element
    Gross Value Percentage Life/CAP Net Value
    Revenue value = $120 M 20% 80% Value = $19.2 M
    Expense value = ($80 M) 10% 80% Value = ($6.4) M
    Capital value = ($5 M)  5% 80% Value = ($0.2) M
    Total value = $35 M
    Net value for this element: Value = $12.6 M
  • The resulting values are stored in the element of value definition table ([0206] 155) for each element and sub-element of value of the enterprise.
  • Every valuation bot contains the information shown in Table 40. [0207]
    TABLE 40
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Element of value or sub-element of value
    6. Element of value ID
  • After the valuation bots are initialized by the software in [0208] block 347 they activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information from the element of value definition table (155) and the component of value definition table (156) in order to complete the valuation. The resulting values are then saved in the element of value definition table (155) in the application database (50) before processing advances to a block 351.
  • The software in [0209] block 351 checks the bot date table (149) and deactivates any residual bots with creation dates before the current system date. The software in block 351 then retrieves the information from the system settings table (140), the metadata mapping table (141) and the element of value definition table (155) in order to initialize residual bots for the enterprise.
  • Bots are independent components of the application that have specific tasks to perform. In the case of residual bots, their task is to retrieve data in order from the element of value definition table ([0210] 155) and the component of value definition table (156) and then calculate the residual going concern value for the enterprise in accordance with the formula shown in Table 41.
    TABLE 41
    Residual Going Concern Value = Total Current-Operation Value −
    Σ Financial Asset Values − Σ Elements of Value
  • Every residual bot contains the information shown in Table 42. [0211]
    TABLE 42
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise ID
  • After the residual bots are initialized they activate in accordance with the frequency specified by the user ([0212] 20) in the system settings table (140). After being activated, the bots retrieve information from the element of value definition table (155) and the component of value definition table (156) in order to complete the residual calculation for the enterprise. After the calculation is complete, the resulting values are then saved in the element of value definition table (155) in the application database (50) before processing advances to a block 352.
  • The software in [0213] block 352 checks the bot date table (149) and deactivates any sentiment calculation bots with creation dates before the current system date. The software in block 352 then retrieves the information from the system settings table (140), the metadata mapping table (141), the external database table (146), the element of value definition table (155), the component of value definition table (156) and the real option value table (162) in order to initialize sentiment calculation bots for the enterprise.
  • Bots are independent components of the application that have specific tasks to perform. In the case of sentiment calculation bots, their task is to retrieve data in order from: the external database table ([0214] 146), the element of value definition table (155), the component of value definition table (156) and the real option value table (162) and then calculate the sentiment for the enterprise in accordance with the formula shown in Table 43.
    TABLE 43
    Sentiment = Total Market Value − Total Current-Operation Value −
    Σ Real Option Values
  • Every sentiment calculation bot contains the information shown in Table 44. [0215]
    TABLE 44
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise ID
  • After the sentiment calculation bots are initialized they activate in accordance with the frequency specified by the user ([0216] 20) in the system settings table (140). After being activated, the bots retrieve information from the external database table (146), the element of value definition table (155), the component of value definition table (156) and the real option value table (162) in order to complete the sentiment calculation for each enterprise. After the calculation is complete, the resulting values are then saved in the enterprise sentiment table (166) in the application database (50) before processing advances to a block 353.
  • The software in [0217] block 353 checks the bot date table (149) and deactivates any sentiment analysis bots with creation dates before the current system date. The software in block 353 then retrieves the information from the system settings table (140), the metadata mapping table (141), the external database table (146), the element of value definition table (155), the component of value definition table (156), the real option value table (162), the enterprise sentiment table (166) and the sentiment factors table (169) in order to initialize sentiment analysis bots for the enterprise.
  • Bots are independent components of the application that have specific tasks to perform. In the case of sentiment analysis bots, their primary task is to determine the composition of the calculated sentiment by comparing the portion of overall market return that related to the different elements of value and the calculated valuation for each element of value as shown below in Table 45. [0218]
    TABLE 45
    Total Enterprise Market Value = $100 Billion, 10% related to Brand
    factors
    Implied Brand Value = $100 Billion × 10% = $10 Billion
    Valuation of Brand Element of Value = $6 Billion
    Increase/(Decrease) in Enterprise Real Option Values Due to Brand =
    $1.5 Billion
    Industry Option Allocation Due to Brand = $1.0 Billion
    Brand Sentiment = $10 − $6 − $1.5 − $1.0 = $1.5 Billion
  • Every sentiment analysis bot contains the information shown in Table 46. [0219]
    TABLE 46
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise ID
  • After the sentiment analysis bots are initialized, they activate in accordance with the frequency specified by the user ([0220] 20) in the system settings table (140). After being activated, the bots retrieve information from the system settings table (140), the metadata mapping table (141), the enterprise sentiment table (166) and the sentiment factors table (169) in order to analyze sentiment. The resulting breakdown of sentiment is then saved in the enterprise sentiment table (169) in the application database (50) before processing advances to a block 402.
  • Risk Reduction Bots
  • The flow diagram in FIG. 7 details the processing that is completed by the portion of the application software ([0221] 400) that analyzes and develops a risk reduction strategy for the commercial enterprise using the system.
  • System processing in this portion of the application software ([0222] 400) begins in a block 402. The software in block 402 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 412. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 403.
  • The software in [0223] block 403 checks the bot date table (149) and deactivates any statistical bots with creation dates before the current system date. The software in block 403 then retrieves the information from the system settings table (140), the external database table (146), the element of value definition table (155), the element variables table (158) and the sentiment factor table (169) in order to initialize statistical bots for each causal value driver and market value factor.
  • Bots are independent components of the application that have specific tasks to perform. In the case of statistical bots, their primary tasks are to calculate and store statistics such as mean, median, standard deviation, slope, average period change, maximum period change, variance and covariance for each causal value driver and market value factor for every regime. Covariance with the market as a whole is also calculated for each value driver and market value factor. Every statistical bot contains the information shown in Table 47. [0224]
    TABLE 47
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Regime
    6. Value Driver or Market Value Factor
  • When bots in [0225] block 403 have identified and stored statistics for each causal value driver and market value factor in the statistics table (170), processing advances to a software block 404.
  • The software in [0226] block 404 checks the bot date table (149) and deactivates any risk reduction activity bots with creation dates before the current system date. The software in block 404 then retrieves the information from the system settings table (140), the external database table (146), the element of value definition table (155), the element variables table (158), the sentiment factor table (169) and the statistics table (170) in order to initialize risk reduction activity bots for each causal value driver and market value factor.
  • Bots are independent components of the application that have specific tasks to perform. In the case of risk reduction activity bots, their primary tasks are to identify actions that can be taken by the enterprise to reduce risk. For example, if one customer presents a significant risk to the enterprise, then the risk reduction bot might identify a reduction in the credit line for that customer to reduce the risk. Every risk reduction activity bot contains the information shown in Table 48. [0227]
    TABLE 48
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Value driver or Market value factor
  • When bots in [0228] block 404 have identified and stored risk reduction activities in the risk reduction activity table (179), processing advances to a software block 405.
  • The software in [0229] block 405 checks the bot date table (149) and deactivates any extreme value bots with creation dates before the current system date. The software in block 405 then retrieves the information from the system settings table (140), the external database table (146), the element of value definition table (155), the element variables table (158) and the sentiment factor table (169) in order to initialize extreme value bots in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of extreme value bots, their primary task is to identify the extreme values for each causal value driver and market value factor. The extreme value bots use the Blocks method and the peak over threshold method to identify extreme values. Other extreme value algorithms can be used to the same effect. Every extreme value bot activated in this block contains the information shown in Table 49. [0230]
    TABLE 49
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Method
    6. Value driver or Market value factor
  • After the extreme value bots are initialized, they activate in accordance with the frequency specified by the user ([0231] 20) in the system settings table (140). Once activated, they retrieve the required information from the system settings table (140), the external database table (146), the element of value definition table (155), the element variables table (158) and the sentiment factor table (169) and determine the extreme value range for each value driver or market value factor. The bot saves the extreme values for each causal value driver and market value factor in the statistics table (170) in the application database (50) and processing advances to a block 409.
  • The software in [0232] block 409 checks the bot date table (149) and deactivates any scenario bots with creation dates before the current system date. The software in block 409 then retrieves the information from the system settings table (140), the operation system table (144), the external database table (146), the advanced finance system table (147), the element of value definition table (155), the sentiment factors table (169) and the statistics table (170) in order to initialize scenario bots in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of scenario bots, their primary task is to identify likely scenarios for the evolution of the causal value drivers and market value factors. The scenario bots use information from the advanced finance system and external databases to obtain forecasts for individual causal factors before using the covariance information stored in the statistics table ([0233] 170) to develop forecasts for the other causal value drivers and factors under normal conditions. They also use the extreme value information calculated by the previous bots and stored in the statistics table (170) to calculate extreme scenarios. Every scenario bot activated in this block contains the information shown in Table 50.
    TABLE 50
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Type: Normal or Extreme
    5. Enterprise
  • After the scenario bots are initialized, they activate in accordance with the frequency specified by the user ([0234] 20) in the system settings table (140). Once activated, they retrieve the required information and develop a variety of scenarios as described previously. After the scenario bots complete their calculations they save the resulting scenarios in the scenarios table (171) in the application database (50) and processing advances to a block 410.
  • The software in [0235] block 410 checks the bot date table (149) and deactivates any simulation bots with creation dates before the current system date. The software in block 410 then retrieves the information from the system settings table (140), the operation system table (144), the advanced finance system table (147), the element of value definition table (155), the external database table (156), the sentiment factors table (169), the statistics table (170), the scenarios table (171) and the generic risk table (178) in order to initialize simulation bots in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of simulation bots, their primary task is to run three different types of simulations for the enterprise. The simulation bots run simulations of organizational financial performance and valuation using: the two types of scenarios generated by the scenario bots—normal and extreme, they also run an unconstrained genetic algorithm simulation that evolves to the most negative scenario. In addition to examining the economic factors that were identified in the previous analysis, the bots simulate the impact of generic risks like fire, earthquakes, floods and other weather-related pheonomenal that are un-correlated with the economic scenarios. Every simulation bot activated in this block contains the information shown in Table 51. [0236]
    TABLE 51
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Type: Normal, Extreme or Genetic Algorithm
    6. Enterprise
  • After the simulation bots are initialized, they activate in accordance with the frequency specified by the user ([0237] 20) in the system settings table (140). Once activated, they retrieve the required information and simulate the financial performance and value impact of the different scenarios. After the simulation bots complete their calculations, the resulting forecasts are saved in the simulations table (168) and the summary xml table (177) in the application database (50) and processing advances to a block 411.
  • The software in [0238] block 411 continually runs an analysis to define the optimal risk reduction strategy for each of the identified normal and extreme scenarios. It does this by first retrieving from the system settings table (140), the operation system table (144), the external database table (146), the advanced finance system table (147), the element of value definition table (155), the sentiment factors table (169), the statistics table (170), the scenario table (171), the risk reduction products table (173) and the risk reduction activity table (179) which is the information required to initialize the optimization algorithm. The software in the block determines the optimal mix of risk reduction products (derivative purchase, insurance purchase, etc.) and risk reduction activities (reducing credit limits for certain customers, shifting production from high risk to lower risk countries, etc.) for the company under each scenario given the confidence interval established by the user (20) in the system settings using a linear programming optimization algorithm. A multi criteria optimization determines the best mix for reducing risk under both normal and extreme scenarios. Other optimization algorithms can be used at this point and all optimizations consider the effect of changes in the cost of capital on the optimal solution. In any event, the resulting product and activity mix for each set of scenarios and the combined analysis is saved in the optimal mix table (175) and the xml summary table (177) in the application database (50) and the revised simulations are saved in the simulations table (168) before processing passes to a software block 412. The shadow prices from these optimizations are also stored in the risk reduction products table (173) and the xml summary table (177) for use in identifying new risk reduction products that the company may wish to purchase and/or new risk reduction activities the company may wish to develop.
  • The software in [0239] block 412 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new, calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 502. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 413.
  • The software in [0240] block 413 checks the bot date table (149) and deactivates any impact bots with creation dates before the current system date. The software in block 413 then retrieves the information from the system settings table (140), the operation system table (144), the external database table (146), the advanced finance system table (147), the element of value definition table (155), the simulations table (168), the sentiment factors table (169), the statistics table (170), the scenario table (171) and the optimal mix table (175) in order to initialize value impact bots in accordance with the frequency specified by the user (20) in the system settings table (140).
  • Bots are independent components of the application that have specific tasks to perform. In the case of impact bots, their primary task is to determine the value impact of each risk reduction product and activity—those included in the optimal mix and those that aren't—on the different scenarios. Every impact bot contains the information shown in Table 52. [0241]
    TABLE 52
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (date, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise
    6. Risk reduction product or activity
  • After the value impact bots are initialized by the software in [0242] block 413, they activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information in order to revise the simulations of enterprise performance and determine the risk reduction impact of each product on each simulation. The resulting forecast of value impacts are then saved in the risk reduction products table (173) or the risk reduction activity table (179) as appropriate in the application database (50) before processing advances to a block 414.
  • The software in [0243] block 414 prepares and displays a listing from highest impact to lowest impact for each risk reduction product under the normal scenarios, the extreme scenarios and the combined (multi-criteria) analysis using the prioritized listing display window (706). The optimal mix for the normal and extreme scenarios are determined by calculating the weighted average sum of the different scenarios where the weighting is determined by the relative likelihood of the scenario. The display identifies the optimal mix from the combined analysis as the recommended solution for enterprise risk reduction. At this point, the user (20) is given the option of:
  • 1. Editing (adding or deleting products and activities) from the recommended solution; [0244]
  • 2. Selecting the optimal mix from the normal scenario; [0245]
  • 3. Selecting and then editing the optimal mix from the normal scenarios; [0246]
  • 4. Selecting the optimal mix from the extreme scenario; [0247]
  • 5. Selecting and then editing the optimal mix from the extreme scenarios; or [0248]
  • 6. Leaving the default choice in place. [0249]
  • After the user ([0250] 20) has finished the review and the optional edit of the selected mix, any changes are saved in the optimal mix table (175) in the application database (50) and processing advances to a software block 502. It should be noted that the processing of the risk reduction bot segment can, with very minor changes, also be used to analyze the impact of value enhancing changes on the enterprise. This could include a value maximization analysis and/or a multi-criteria maximum value, minimum risk optimization.
  • Output
  • The flow diagram in FIG. 8 details the processing that is completed by the portion of the application software ([0251] 500) that generates a summary of the risk, liquidity and foreign exchange position of the company, places orders to purchase the optimal mix of risk reduction products and optionally prints management reports. Processing in this portion of the application starts in software block 502.
  • The software in [0252] block 502 checks the optimal mix table (175) in the application database (50) to determine which risk reduction activities have been included in the optimal mix. If risk reduction activities have been included in the optimal mix, then the software in this block prepares summaries of the changes and transmits them to the affected financial, operational and/or soft asset management system(s). For example, if the option to reduce the credit line for a certain customer has been accepted, then the customer relationship management system and the accounts receivable system will be updated with the new credit limit information by a transmission from the software in this block. Alternatively, if there are no risk reduction activities in the optimal mix, then processing advances directly to a software block 503.
  • The software in [0253] block 503 retrieves information from the system settings table (140) and the advanced finance system table (147) that is required to calculate the minimum amount of cash that will be available for investment in risk reduction during the next 36 month period. The system settings table (140) contains the minimum amount of cash and available securities that the user (20) indicated win order for enterprise operation while the advanced finance system table (147) contains a forecast of the cash balance for the enterprise for each period during the next 36 months. A summary of the available cash and cash deficits by currency, by month, by enterprise for the next 36 months is stored in a summary xml format in the xml summary table (177) during this stage of processing. After the amount of available cash for each enterprise is calculated and stored in the risk reduction purchase table (165), processing advances to a software block 504.
  • The software in [0254] block 504 assembles the previously developed summaries of cash position, foreign exchange requirements, risks, scenarios and statistics into a xml summary profile of the enterprise. This summary profile is transferred via the network (45) to an exchange or other risk transfer provider (600).
  • The software in [0255] block 514 analyzes the mix of risk reduction products and swaps recommended by an exchange or other risk transfer provider (600) to determine the percentage reduction in financial performance volatility that their purchase will produce for the enterprise. If the previously completed sentiment analysis indicated that financial performance volatility was a driver of market value, then the software in block 514 will retrieve the required information from the sentiment factors table (169) and estimate the value increase that will be produced by the decreased volatility. The software in block 514 also confirms that the products and/or swaps recommended by the exchange or other risk transfer provider (600) can be purchased using available cash for a total expenditure, counting both prior purchases and planned purchases, that is less than or equal to the maximum investment amount established by the user (20) in system settings table (140). If the planned purchases are within the guidelines established by the user (20), then the software generates a purchase order for the additional risk reduction products and/or swaps. Alternatively, if there isn't available cash or if the planned purchase exceeds the expenditure guideline established by the user (20), then a message indicating the problem(s) is prepared. In any event, the software in block 514 displays the resulting message or purchase order to the user (20) via the purchase review data window (711). The purchase review data window (711) also displays the estimate of value increase, if any, that the implementation of the risk reduction program will provide. The user (20) can optionally edit or confirm the purchase order, increase the amount that can be spent on risk reduction or chose to purchase a mix that is not the optimal mix. After the user (20) completes his or her review and optional edit, the software in block 514 transmits any orders to purchase the risk reduction products that were approved via the network (45). The software at this point could, of course, initialize one or more bots to search the various web sites and exchanges to get the best price for the company using the system of the present invention. In any event, the details of the purchase transaction and confirmation are then saved in the risk reduction purchase table (165) before processing advances to block 515.
  • The software in [0256] block 515 displays the report selection window (705) to the user (20). The user (20) optionally selects reports for printing. If the user (20) selects any reports for printing, then the information regarding the reports selected is saved in the reports table (164). After the user (20) has finished selecting reports, processing advances to a software block 516.
  • The software in [0257] block 516 checks the reports tables (164) to determine if any reports have been designated for printing. If reports have been designated for printing, then processing advances to a block 525. The software in block 525 sends the designated reports to the printer (118). After the reports have been sent to the printer (118), processing advances to a software block 527. Alternatively, if no reports were designated for printing, then processing advances directly from block 516 to block 527.
  • The software in [0258] block 527 checks the system settings table (140) to determine if the system is operating in a continuous run mode. If the system is operating in a continuous run mode, then processing returns to block 205 and the processing described previously is repeated. Alternatively, if the system is not running in continuous mode, then the processing advances to a block 528 where the system stops.
  • While the above description contains many specificity's, these should not be construed as limitations on the scope of the invention, but rather as an exemplification of one embodiment thereof. Accordingly, the scope of the invention should be determined not by the embodiment illustrated, but by the appended claims and their legal equivalents. [0259]

Claims (35)

1. A computer readable medium having sequences of instructions stored therein, which when executed cause the processors in a plurality of computers that have been connected via a network to perform a business activity management method, comprising:
integrating organization related data,
identifying transaction measures with impact on one or more aspects of organization financial performance using at least a portion said data,
modeling organization financial performance using said measures as required to identify changes in transactions that will optimize one or more aspects of organization financial performance, and
implementing changes in business activities that will generate said changes.
2. The computer readable medium of claim 1 where the method further comprises making the list of changes and business activities available for review and use via a paper document or electronic display.
3. The computer readable medium of claim 1 where an organization is a single product, a group of products, a division, a company, a multi company corporation or a value chain.
4. The computer readable medium of claim 1 where data is aggregated using a xml and a common schema.
5. The computer readable medium of claim 1 where organization related data is obtained from the group consisting of advanced financial systems, basic financial systems, web site management systems, alliance management systems, brand management systems, customer relationship management systems, channel management systems, intellectual property management systems, process management systems, vendor management systems, operation management systems, sales management systems, human resource systems, accounts receivable systems, accounts payable systems, capital asset systems, inventory systems, invoicing systems, payroll systems, enterprise resource planning systems (ERP), material requirement planning systems (MRP), scheduling systems, quality control systems, purchasing systems, risk management systems, the Internet, external databases, user input and combinations thereof.
6. The computer readable medium of claim 1 where the transaction measures are selected from the group consisting of transaction ratios, time lagged transaction ratios, transaction trends, time lagged transaction trends, transaction averages, time lagged transaction averages, transaction data, time lagged transaction data, transaction patterns, time lagged transaction patterns, geospatial transaction measures, time lagged geospatial transaction measures, relative rankings, time lagged relative rankings, internet links, time lagged internet links, transaction frequencies, time lagged transaction frequencies, transaction time periods, time lagged transaction time periods, average transaction time periods, time lagged average transaction time periods, cumulative transaction time periods, cumulative transaction time periods, rolling average transaction time period, rolling average transaction time period, cumulative total transactions, time lagged cumulative total transactions, period to period rate of change in transactions, time lagged period to period rate of change in transactions and combinations thereof.
7. The computer readable medium of claim 1 where the transaction measures are identified by element of value where the elements of value are selected from the group consisting of alliances, brands, channels, customers, customer relationships, employees, intellectual capital, intellectual property, partnerships, processes, production equipment, vendors, vendor relationships and combinations thereof.
8. The computer readable medium of claim 1 where the transaction measures are identified by category of value where the categories of value are selected from the group consisting of current operation, real options, market sentiment and combinations thereof.
9. The computer readable medium of claim 1 where the one or more aspects of organization financial performance are selected from the group consisting of revenue, expense, capital change, current operation value, real option value, market sentiment value, market value, alliance value, brand value, channel value, customer value, customer relationship value, employee value, intellectual capital value, intellectual property value, partnership value, process value, production equipment value, vendor value, vendor relationship value, current operation risk, real option risk, market sentiment risk, market risk, alliance risk, brand risk, channel risk, customer risk, customer relationship risk, employee risk, intellectual capital risk, intellectual property risk, partnership risk, process risk, production equipment risk, vendor risk, vendor relationship risk, share price and combinations thereof.
10. The computer readable medium of claim 1 where the changes in business activities are selected from the group consisting of changes in purchase quantities, changes in purchasing mix, changes in vendors, changes in purchase discounts, changes in product discounts, changes in product pricing, changes in service pricing, changes in service discounts, changes in supply chain management, changes in the organization equity holdings, changes in operating limits for organization systems, changes in process management and combinations thereof.
11. A business activity management system, comprising:
a plurality of computers connected by a network each with a processor having circuitry to execute instructions; a storage device available to each processor with sequences of instructions stored therein, which when executed cause the processors to:
integrate organization related data,
identify tangible measures of element and external factor impact on one or more aspects of organization financial performance using at least a portion said data,
model organization financial performance using said measures as required to identify changes by element and external factor that will optimize one or more aspects of organization financial performance,
make the list of changes available for review and optional approval via a paper document or electronic display, and
implement one or more changes in business activities that will generate said changes.
12. The system of claim 11 where the method further comprises making the list of changes and business activities available for review and use via a paper document or electronic display.
13. The system of claim 11 where an enterprise is a single product, a group of products, a division, a company, a multi company corporation or a value chain.
14. The system of claim 11 where data is integrated using xml and a common schema.
15. The system of claim 11 where organization related data is obtained from the group consisting of advanced financial systems, basic financial systems, web site management systems, alliance management systems, brand management systems, customer relationship management systems, channel management systems, intellectual property management systems, process management systems, vendor management systems, operation management systems, sales management systems, human resource systems, accounts receivable systems, accounts payable systems, capital asset systems, inventory systems, invoicing systems, payroll systems, enterprise resource planning systems (ERP), material requirement planning systems (MRP), scheduling systems, quality control systems, purchasing systems, risk management systems, the Internet, external databases, user input and combinations thereof.
16. The system of claim 11 where the measures are selected from the group consisting of transaction ratios, time lagged transaction ratios, transaction trends, time lagged transaction trends, transaction averages, time lagged transaction averages, time lagged transaction data, transaction patterns, time lagged transaction patterns, geospatial transaction measures, time lagged geospatial transaction measures, relative rankings, time lagged relative rankings, internet links, time lagged internet links, transaction frequencies, time lagged transaction frequencies, transaction time periods, time lagged transaction time periods, average transaction time periods, time lagged average transaction time periods, cumulative transaction time periods, cumulative transaction time periods, rolling average transaction time period, rolling average transaction time period, cumulative total transactions, time lagged cumulative total transactions, period to period rate of change in transactions, time lagged period to period rate of change in transactions, composite variables, vectors and combinations thereof.
17. The system of claim 11 where the measures are identified by category of value where categories of value are selected from the group consisting of current operations, real options, market sentiment and combinations thereof.
18. The system of claim 11 where the one or more aspects of organization financial performance are selected from the group consisting of revenue, expense, capital change, current operation value, real option value, market sentiment value, market value, alliance value, brand value, channel value, customer value, customer relationship value, employee value, intellectual capital value, intellectual property value, partnership value, process value, production equipment value, vendor value, vendor relationship value, current operation risk, real option risk, market sentiment risk, market risk, alliance risk, brand risk, channel risk, customer risk, customer relationship risk, employee risk, fire risk, earthquake risk, flood risk, weather risk, contingent liabilities, intellectual capital risk, intellectual property risk, partnership risk, process risk, production equipment risk, vendor risk, vendor relationship risk, share price and combinations thereof.
19. The system of claim 11 where changes in business activities are selected from the group consisting of changes in purchase quantities;, changes in purchasing mix, changes in vendors, changes in purchase discounts, changes in product discounts, changes in product pricing, changes in service pricing, changes in service discounts, changes in supply chain management, changes in the organization equity holdings, changes in operating limits for organization systems, changes in process management, changes in risk transfer purchases and combinations thereof.
20. An interactive financial model that identifies the contribution of business activity and external factors to organization share price.
21. The model of claim 20 where the contribution of business activity is modeled with one or more transaction metrics.
22. The model of claim 21 where the one or more transaction metrics are selected from the group consisting of transaction ratios, time lagged transaction ratios, transaction trends, time lagged transaction trends, transaction averages, time lagged transaction averages, time lagged transaction data, transaction patterns, time lagged transaction patterns, geospatial transaction measures, time lagged geospatial transaction measures, relative rankings, time lagged relative rankings, internet links, time lagged internet links, transaction frequencies, time lagged transaction frequencies, transaction time periods, time lagged transaction time periods, average transaction time periods, time lagged average transaction time periods, cumulative transaction time periods, cumulative transaction time periods, rolling average transaction time period, rolling average transaction time period, cumulative total transactions, time lagged cumulative total transactions, period to period rate of change in transactions, time lagged period to period rate of change in transactions, composite variables, vectors and combinations thereof.
23. The model of claim 21 where the transaction metrics are key performance indicators.
24. The model of claim 20 where the contribution of external factors is determined using one or more tangible measures of external factor impact on aspects of financial performance.
25. The model of claim 20 that identifies the value of each of one or more organization elements of value is determined by its net contribution to organization value.
26. The model of claim 25 where the net contribution of an element to organization value is its direct contribution to organization value net of any contribution to the other elements of value and external factors that impact organization value.
27. The model of claim 25 where the elements of value are selected from the group consisting of alliances, brands, channels, customers, customer relationships, employees, intellectual capital, intellectual property, partnerships, processes, production equipment, vendors, vendor relationships and combinations thereof.
28. The model of claim 27 where brands are selected from the group consisting of a symbol indicating ownership, a symbol indicating source, a device indicating ownership, a device indicating source, mark, hallmark, label, logo, logotype, trade mark, stamp, tag, seal, a distinctive style, model, cut, line, make, pattern, a specific characteristic ascribed to an organization, a specific characteristic ascribed to an organization offering, a specific reputation ascribed to an organization, a specific reputation ascribed to an organization offering, a specific trait ascribed to an organization, a specific trait ascribed to an organization offering and combinations thereof.
29. The model of claim 27 where processes are selected from the group consisting of a series of actions bring about a result, a series changes bringing about a result, a series of functions bringing about a result and combinations thereof.
30. The model of claim 20 that supports the optimization of one or more aspects of organization financial performance where the one or more aspects of financial performance are selected from the group consisting of revenue, expense, capital change, current operation value, real option value, market sentiment value, market value, alliance value, brand value, channel value, customer value, customer relationship value, employee value, intellectual capital value, intellectual property value, partnership value, process value, production equipment value, vendor value, vendor relationship value, current operation risk, real option risk, market sentiment risk, market risk, alliance risk, brand risk, channel risk, customer risk, customer relationship risk, employee risk, fire risk, earthquake risk, flood risk, weather risk, contingent liabilities, intellectual capital risk, intellectual property risk, partnership risk, process risk, production equipment risk, vendor risk, vendor relationship risk and combinations thereof.
31. The model of claim 20 that supports the optimization of business activities where business activities are selected from the group consisting of purchasing, pricing, process management, supply chain management, risk management, sales, stock price management and combinations thereof.
32. The model of claim 31 where purchasing activities are selected from the group consisting of changes in purchase quantities, changes in purchasing mix, changes in vendors, changes in purchase discounts, changes in purchase prices, changes in purchase frequency and combinations thereof.
33. A method for integrating organization systems into an overall financial management system, comprising
integrating data from organization related systems using xml and a common schema,
developing a model of organization share price using at least a portion of said data,
identifying changes in operation that will optimize one or more drivers of organization share price using said model, and
implementing said changes in operation by communicating the changes to one or more organization systems.
34. The method of claim 33 where organization related systems are selected from the group consisting of advanced financial systems, basic financial systems, web site management systems, alliance management systems, brand management systems, customer relationship management systems, channel management systems, intellectual property management systems, process management systems, vendor management systems, operation management systems, sales management systems, human resource systems, accounts receivable systems, accounts payable systems, capital asset systems, inventory systems, invoicing systems, payroll systems, enterprise resource planning systems (ERP), material requirement planning systems (MRP), scheduling systems, quality control systems, purchasing systems, risk management systems, and combinations thereof.
35. The system of claim 33 that where changes in operation are selected from the group consisting of changes in purchasing, changes in pricing, changes in processes, changes in the supply chain, changes in risk management, changes in sales, changes in equity holdings and combinations thereof.
US10/821,504 2000-10-17 2004-04-09 Business activity management system Abandoned US20040199445A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/821,504 US20040199445A1 (en) 2000-10-17 2004-04-09 Business activity management system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US68898300A 2000-10-17 2000-10-17
US10/821,504 US20040199445A1 (en) 2000-10-17 2004-04-09 Business activity management system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US68898300A Continuation 2000-10-17 2000-10-17

Publications (1)

Publication Number Publication Date
US20040199445A1 true US20040199445A1 (en) 2004-10-07

Family

ID=33098506

Family Applications (10)

Application Number Title Priority Date Filing Date
US10/329,172 Pending US20040236673A1 (en) 2000-10-17 2002-12-23 Collaborative risk transfer system
US10/821,504 Abandoned US20040199445A1 (en) 2000-10-17 2004-04-09 Business activity management system
US11/360,087 Abandoned US20060143115A1 (en) 2000-10-17 2006-02-23 Enterprise risk management system
US11/278,423 Abandoned US20060184570A1 (en) 2000-10-17 2006-04-01 Value impact risk transfer products
US11/278,419 Abandoned US20060184449A1 (en) 2000-10-17 2006-04-01 A risk management system for securities
US12/185,093 Abandoned US20080288394A1 (en) 2000-10-17 2008-08-03 Risk management system
US12/271,846 Abandoned US20090070182A1 (en) 2000-10-17 2008-11-15 Organization activity management system
US12/356,505 Expired - Fee Related US8185486B2 (en) 2000-10-17 2009-01-20 Segmented predictive model system
US13/548,095 Expired - Fee Related US8694455B2 (en) 2000-10-17 2012-07-12 Automated risk transfer system
US13/740,223 Abandoned US20130132163A1 (en) 2000-10-17 2013-01-13 Automated risk transfer system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/329,172 Pending US20040236673A1 (en) 2000-10-17 2002-12-23 Collaborative risk transfer system

Family Applications After (8)

Application Number Title Priority Date Filing Date
US11/360,087 Abandoned US20060143115A1 (en) 2000-10-17 2006-02-23 Enterprise risk management system
US11/278,423 Abandoned US20060184570A1 (en) 2000-10-17 2006-04-01 Value impact risk transfer products
US11/278,419 Abandoned US20060184449A1 (en) 2000-10-17 2006-04-01 A risk management system for securities
US12/185,093 Abandoned US20080288394A1 (en) 2000-10-17 2008-08-03 Risk management system
US12/271,846 Abandoned US20090070182A1 (en) 2000-10-17 2008-11-15 Organization activity management system
US12/356,505 Expired - Fee Related US8185486B2 (en) 2000-10-17 2009-01-20 Segmented predictive model system
US13/548,095 Expired - Fee Related US8694455B2 (en) 2000-10-17 2012-07-12 Automated risk transfer system
US13/740,223 Abandoned US20130132163A1 (en) 2000-10-17 2013-01-13 Automated risk transfer system

Country Status (1)

Country Link
US (10) US20040236673A1 (en)

Cited By (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020038217A1 (en) * 2000-04-07 2002-03-28 Alan Young System and method for integrated data analysis and management
US20020188496A1 (en) * 2001-06-08 2002-12-12 International Business Machines Coporation Apparatus, system and method for measuring and monitoring supply chain risk
US20020198750A1 (en) * 2001-06-21 2002-12-26 Innes Bruce Donald Risk management application and method
US20040098300A1 (en) * 2002-11-19 2004-05-20 International Business Machines Corporation Method, system, and storage medium for optimizing project management and quality assurance processes for a project
US20040177335A1 (en) * 2003-03-04 2004-09-09 International Business Machines Corporation Enterprise services application program development model
US20040193503A1 (en) * 2000-10-04 2004-09-30 Eder Jeff Scott Interactive sales performance management system
US20050021380A1 (en) * 2003-07-25 2005-01-27 Taylor Stephen W. Strategic level quality assurance system for business development
US20050097065A1 (en) * 2002-10-11 2005-05-05 Vivecon Corporation System and method for analyzing relationships between sourcing variables
US20050108083A1 (en) * 2003-11-18 2005-05-19 Peterson Gary E. Interactive risk management system and method
US20050108080A1 (en) * 2003-11-18 2005-05-19 Peterson Gary E. Interactive risk management system and method
US20050119922A1 (en) * 1997-01-06 2005-06-02 Eder Jeff S. Method of and system for analyzing, modeling and valuing elements of a business enterprise
US20060095416A1 (en) * 2004-10-28 2006-05-04 Yahoo! Inc. Link-based spam detection
US20060206405A1 (en) * 2005-03-11 2006-09-14 Scott Gambill Gambill stock oscillator
US20060229921A1 (en) * 2005-04-08 2006-10-12 Mr. Patrick Colbeck Business Control System
US20060247943A1 (en) * 2005-04-29 2006-11-02 Millennium Ventures Group System and method for generating and evaluating an innovation
US20070050282A1 (en) * 2005-08-25 2007-03-01 Sas Institute Inc. Financial risk mitigation optimization systems and methods
US20070100724A1 (en) * 2005-11-03 2007-05-03 Hollas Judd E Electronic enterprise capital marketplace and monitoring apparatus and method
US20070192236A1 (en) * 2006-02-02 2007-08-16 Sun Microsystems, Inc. IT risk management framework and methods
US20070198603A1 (en) * 2006-02-08 2007-08-23 Konstantinos Tsioutsiouliklis Using exceptional changes in webgraph snapshots over time for internet entity marking
US20080154700A1 (en) * 2006-12-19 2008-06-26 Celeritasworks, Llc Campaign awareness management systems and methods
US7398271B1 (en) 2001-04-16 2008-07-08 Yahoo! Inc. Using network traffic logs for search enhancement
US20080172370A1 (en) * 2007-01-12 2008-07-17 Microsoft Corporation Providing virtual really simple syndication (rss) feeds
US20080195542A1 (en) * 2007-02-13 2008-08-14 Al Zarawani Sohail Abdul-Rahim System and method for just-in-time capital investment and controlled cost insurance
US20090006357A1 (en) * 2007-06-27 2009-01-01 Alexandrin Popescul Determining quality measures for web objects based on searcher behavior
US20090013033A1 (en) * 2007-07-06 2009-01-08 Yahoo! Inc. Identifying excessively reciprocal links among web entities
US20090030761A1 (en) * 2007-07-09 2009-01-29 Infosys Technologies Ltd. Predicting financial impact of business framework
US20090043637A1 (en) * 2004-06-01 2009-02-12 Eder Jeffrey Scott Extended value and risk management system
US20090222415A1 (en) * 2008-03-03 2009-09-03 Hitachi, Ltd. Evaluating risk of information mismanagement in computer storage
US20090292546A1 (en) * 2008-05-20 2009-11-26 Aleixo Jeffrey A Human Resources Employment Method
US20100049485A1 (en) * 2008-08-20 2010-02-25 International Business Machines Corporation System and method for analyzing effectiveness of distributing emergency supplies in the event of disasters
US20110016058A1 (en) * 2009-07-14 2011-01-20 Pinchuk Steven G Method of predicting a plurality of behavioral events and method of displaying information
US20110178949A1 (en) * 2010-01-20 2011-07-21 International Business Machines Corporation Method and system enabling dynamic composition of heterogenous risk models
US20120110504A1 (en) * 2010-10-29 2012-05-03 Claudio Bartolini Method and system for project and portfolio management
US8407118B1 (en) * 2008-03-31 2013-03-26 Intuit Inc. Method and system for generating an economic indicator using aggregated financial data
US20130282429A1 (en) * 2011-02-25 2013-10-24 Research & Business Foundation Sungkyunkwan University Apparatus and method for context based activity modeling
US8713025B2 (en) 2005-03-31 2014-04-29 Square Halt Solutions, Limited Liability Company Complete context search system
US20140244343A1 (en) * 2013-02-22 2014-08-28 Bank Of America Corporation Metric management tool for determining organizational health
US20140282856A1 (en) * 2013-03-14 2014-09-18 Sas Institute Inc. Rule optimization for classification and detection
US20140358745A1 (en) * 2013-06-04 2014-12-04 LedgerPal Inc. Automated accounting method
US20150154695A1 (en) * 2013-12-03 2015-06-04 Mastercard International Corporation Forecasting lagged current transactions based on prior transactions
US9594907B2 (en) 2013-03-14 2017-03-14 Sas Institute Inc. Unauthorized activity detection and classification
US9990506B1 (en) 2015-03-30 2018-06-05 Quest Software Inc. Systems and methods of securing network-accessible peripheral devices
US10142391B1 (en) 2016-03-25 2018-11-27 Quest Software Inc. Systems and methods of diagnosing down-layer performance problems via multi-stream performance patternization
US10140466B1 (en) 2015-04-10 2018-11-27 Quest Software Inc. Systems and methods of secure self-service access to content
US10146954B1 (en) 2012-06-11 2018-12-04 Quest Software Inc. System and method for data aggregation and analysis
US10157358B1 (en) 2015-10-05 2018-12-18 Quest Software Inc. Systems and methods for multi-stream performance patternization and interval-based prediction
US20190009923A1 (en) * 2014-11-10 2019-01-10 Federal Express Corporation Risk assessment framework
US10218588B1 (en) 2015-10-05 2019-02-26 Quest Software Inc. Systems and methods for multi-stream performance patternization and optimization of virtual meetings
US10242407B1 (en) 2013-09-24 2019-03-26 Innovative Market Analysis, LLC Financial instrument analysis and forecast
US10326748B1 (en) 2015-02-25 2019-06-18 Quest Software Inc. Systems and methods for event-based authentication
TWI664598B (en) * 2017-05-23 2019-07-01 第一商業銀行股份有限公司 Financial service method with point of sale terminal
US10339539B2 (en) 2006-12-19 2019-07-02 Celeritasworks, Llc Campaign awareness management systems and methods
US10346926B2 (en) 2002-09-09 2019-07-09 Xenogenic Development Llc Context search system
US10360527B2 (en) * 2010-11-10 2019-07-23 International Business Machines Corporation Casual modeling of multi-dimensional hierarchical metric cubes
US10417613B1 (en) 2015-03-17 2019-09-17 Quest Software Inc. Systems and methods of patternizing logged user-initiated events for scheduling functions
US10536352B1 (en) 2015-08-05 2020-01-14 Quest Software Inc. Systems and methods for tuning cross-platform data collection
CN111344722A (en) * 2017-05-01 2020-06-26 高盛公司有限责任公司 System and method for scene simulation
TWI699727B (en) * 2018-12-25 2020-07-21 財團法人商業發展研究院 Apparatus and method for estimate fund risk
US10783526B2 (en) 2006-12-19 2020-09-22 Celeritasworks, Llc Campaign awareness management systems and methods
US10803533B2 (en) * 2017-06-27 2020-10-13 Fin Box Technologies, Inc. Methods and systems for efficient delivery of accounting and corporate planning services
US10839321B2 (en) 1997-01-06 2020-11-17 Jeffrey Eder Automated data storage system
US10855625B1 (en) * 2016-05-11 2020-12-01 Workato, Inc. Intelligent, adaptable, and trainable bot that orchestrates automation and workflows across multiple applications
CN113516333A (en) * 2021-03-10 2021-10-19 福建省农村信用社联合社 Performance test method and system based on precision service model
US11216742B2 (en) 2019-03-04 2022-01-04 Iocurrents, Inc. Data compression and communication using machine learning
US11334941B2 (en) * 2013-03-15 2022-05-17 Capital One Services, Llc Systems and computer-implemented processes for model-based underwriting
US11393045B2 (en) * 2017-06-27 2022-07-19 Fin Box Technologies, Inc. Methods and systems for efficient delivery of accounting and corporate planning services
US11461726B2 (en) * 2019-01-21 2022-10-04 Adp, Inc. Business insight generation system
US20220366342A1 (en) * 2021-04-16 2022-11-17 Tata Consultancy Services Limited Method and system for providing intellectual property adoption recommendations to an enterprise
US11661195B2 (en) 2019-03-13 2023-05-30 Federal Express Corporation Mitigating operational risk in aircraft

Families Citing this family (121)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020046143A1 (en) * 1995-10-03 2002-04-18 Eder Jeffrey Scott Method of and system for evaluating cash flow and elements of a business enterprise
US20040236673A1 (en) * 2000-10-17 2004-11-25 Eder Jeff Scott Collaborative risk transfer system
US7415432B1 (en) * 2000-11-17 2008-08-19 D.E. Shaw & Co., Inc. Method and apparatus for the receipt, combination, and evaluation of equity portfolios for execution by a sponsor at passively determined prices
US7720703B1 (en) * 2001-02-05 2010-05-18 Trimble Navigation Limited System and method for tracking and managing construction projects
US7283975B2 (en) * 2001-02-05 2007-10-16 Broughton W Curtis System and method for tracking and managing construction projects
US7739176B2 (en) * 2001-07-10 2010-06-15 The Boeing Company System, method and computer program product for performing a contingent claim valuation of an early-launch option
US7676413B2 (en) * 2001-07-10 2010-03-09 The Boeing Company System, method and computer program product for determining a minimum asset value for exercising a contingent claim of an option
US7676412B2 (en) * 2001-07-10 2010-03-09 The Boeing Company System, method and computer program product for determining a minimum asset value for exercising a contingent claim of an option
US7747504B2 (en) * 2001-07-10 2010-06-29 The Boeing Company System, method and computer program product for determining a minimum asset value for exercising a contingent claim of an option
US7747503B2 (en) 2001-07-10 2010-06-29 The Boeing Company System, method and computer program product for determining a minimum asset value for exercising a contingent claim of an option
US6862579B2 (en) * 2001-07-10 2005-03-01 The Boeing Company Systems, methods and computer program products for performing a generalized contingent claim valuation
US7752113B2 (en) * 2001-07-10 2010-07-06 The Boeing Company System, method and computer program product for performing a contingent claim valuation of a multi-stage option
US20040249642A1 (en) * 2003-06-03 2004-12-09 The Boeing Company Systems, methods and computer program products for modeling uncertain future benefits
US7698189B2 (en) * 2001-07-10 2010-04-13 The Boeing Company System, method and computer program product for determining a minimum asset value for exercising a contingent claim of an option
US7890393B2 (en) 2002-02-07 2011-02-15 Ebay, Inc. Method and system for completing a transaction between a customer and a merchant
US7386528B2 (en) * 2002-05-31 2008-06-10 American Express Travel Related Services Company, Inc. System and method for acquisition, assimilation and storage of information
US7711539B1 (en) * 2002-08-12 2010-05-04 Netapp, Inc. System and method for emulating SCSI reservations using network file access protocols
US7627495B2 (en) * 2003-06-03 2009-12-01 The Boeing Company Systems, methods and computer program products for modeling demand, supply and associated profitability of a good
US7627494B2 (en) 2003-06-03 2009-12-01 The Boeing Company Systems, methods and computer program products for modeling a monetary measure for a good based upon technology maturity levels
US7739166B2 (en) * 2003-06-03 2010-06-15 The Boeing Company Systems, methods and computer program products for modeling demand, supply and associated profitability of a good in a differentiated market
US7769628B2 (en) * 2003-06-03 2010-08-03 The Boeing Company Systems, methods and computer program products for modeling uncertain future demand, supply and associated profitability of a good
WO2005084187A2 (en) * 2004-02-23 2005-09-15 I4 Licensing Llc Verification and authorization of a consumer transaction
US7756790B2 (en) 2004-02-23 2010-07-13 Coventry First Llc Life settlement/settlement with paid-up policy system and method
US7996462B2 (en) * 2004-07-30 2011-08-09 Sap Ag Collaborative agent for a work environment
US8639604B1 (en) 2004-10-26 2014-01-28 Invest N Retire, LLC System and method for managing tax-deferred retirement accounts
US7680752B1 (en) * 2005-01-06 2010-03-16 Parasoft Corporation System and method for predictive process management
US8001040B2 (en) 2005-01-25 2011-08-16 Ebay Inc. Computer-implemented method and system for dynamic consumer rating in a transaction
US8103565B2 (en) * 2005-02-10 2012-01-24 Coventry First Llc Method and system for enabling a life insurance premium loan
US7527195B2 (en) * 2005-04-11 2009-05-05 Bill Me Later, Inc. Method and system for risk management in a transaction
US8756099B2 (en) * 2005-04-11 2014-06-17 Bill Me Later, Inc. Consumer processing system and method
US20060229974A1 (en) * 2005-04-11 2006-10-12 I4 Licensing Llc Method of extending credit to at least one consumer and method of processing a transaction between a consumer and a merchant
US9129290B2 (en) * 2006-02-22 2015-09-08 24/7 Customer, Inc. Apparatus and method for predicting customer behavior
US8275637B1 (en) * 2006-05-02 2012-09-25 Allstate Insurance Company Earnings at risk method and system
US7792731B2 (en) * 2006-05-16 2010-09-07 Financial Industry Regulatory Authority, Inc. Capital-adequacy filing and assessment system and method
US20080052211A1 (en) * 2006-06-14 2008-02-28 Buerger Alan H Method and system for protecting an investment of a life insurance policy
US7844529B2 (en) 2006-07-31 2010-11-30 Insight Catastrophe Solutions Apparatuses, methods, and systems for providing a reconfigurable insurance quote generator user interface
US7844530B2 (en) 2006-07-31 2010-11-30 Insight Catastrophe Solutions Apparatuses, methods, and systems for providing a risk scoring engine user interface
US8090600B2 (en) 2006-07-31 2012-01-03 Insight Catastrophe Solutions Apparatuses, methods, and systems for building a risk evaluation product
US8554669B2 (en) 2007-01-09 2013-10-08 Bill Me Later, Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of sale
US7840464B2 (en) * 2007-02-05 2010-11-23 Jpmorgan Chase Bank, N.A. Creating and trading building block mortality derivatives to transfer and receive mortality risk in a liquid market
US8433648B2 (en) * 2007-02-26 2013-04-30 Bill Me Later, Inc. Method and system for engaging in a transaction between a consumer and a merchant
US20080272188A1 (en) 2007-05-02 2008-11-06 I4 Commerce Inc. Distributed system for commerce
US9064284B1 (en) 2007-09-27 2015-06-23 United Services Automobile Association (Usaa) System and method of providing a financial investment recommendation using a portfolio planner
WO2009065222A1 (en) * 2007-11-20 2009-05-28 Loyaltymatch Inc. Trading platform for rewards earned from multiple loyalty programs
US9058407B2 (en) * 2008-01-22 2015-06-16 Oracle International Corporation Persistent multimedia content versioning
US8719164B2 (en) 2008-06-19 2014-05-06 Bill Me Later, Inc. Method and system for engaging in a transaction between a business entity and a merchant
US9047575B2 (en) * 2009-05-04 2015-06-02 Oracle International Corporation Creative process modeling and tracking system
WO2010141558A2 (en) * 2009-06-03 2010-12-09 Ten-Sixty Asset Management System for modeling investment performance
US20110196808A1 (en) * 2009-08-03 2011-08-11 Kamal Mustafa System and Method for Directors and Officers Risk Assessment
US20120059750A1 (en) * 2009-08-03 2012-03-08 Kamal Mustafa System and Method for Regulatory Assessment of Financial Institutions
US20110047069A1 (en) * 2009-08-03 2011-02-24 Kamal Mustafa System and Method for Risk Assessment
US8768930B2 (en) 2009-10-10 2014-07-01 Oracle International Corporation Product classification in procurement systems
US8438122B1 (en) 2010-05-14 2013-05-07 Google Inc. Predictive analytic modeling platform
US8473431B1 (en) 2010-05-14 2013-06-25 Google Inc. Predictive analytic modeling platform
US20120004946A1 (en) * 2010-07-01 2012-01-05 Bank Of America Corporation Integrated Operational Risk Management
US8719207B2 (en) * 2010-07-27 2014-05-06 Oracle International Corporation Method and system for providing decision making based on sense and respond
US20120046989A1 (en) * 2010-08-17 2012-02-23 Bank Of America Corporation Systems and methods for determining risk outliers and performing associated risk reviews
US8700516B2 (en) * 2011-01-24 2014-04-15 Axioma, Inc. Methods and apparatus for improving factor risk model responsiveness
US8595154B2 (en) 2011-01-26 2013-11-26 Google Inc. Dynamic predictive modeling platform
US8533222B2 (en) * 2011-01-26 2013-09-10 Google Inc. Updateable predictive analytical modeling
US8768812B2 (en) 2011-05-02 2014-07-01 The Boeing Company System, method and computer-readable storage medium for valuing a performance option
US8533224B2 (en) 2011-05-04 2013-09-10 Google Inc. Assessing accuracy of trained predictive models
US9268828B2 (en) * 2011-06-15 2016-02-23 Sas Institute Inc. Computer-implemented systems and methods for extract, transform, and load user interface processing
US20130024395A1 (en) * 2011-07-22 2013-01-24 Thomson Reuters (Markets) Llc System and method for constructing outperforming portfolios relative to target benchmarks
US9092821B2 (en) 2011-10-20 2015-07-28 Ashbury Heights Capital, Llc Method for estimating flows between economic entities
US10803028B2 (en) * 2011-12-21 2020-10-13 Sybase, Inc. Multiphase approach to data availability
US20130297627A1 (en) * 2012-05-07 2013-11-07 Sandeep J. Shah Business intelligence engine
CN102855524A (en) * 2012-08-14 2013-01-02 贵州乌江水电开发有限责任公司 Carry-over storage year-end fluctuating level prediction method and system
US8788439B2 (en) * 2012-12-21 2014-07-22 InsideSales.com, Inc. Instance weighted learning machine learning model
US9460401B2 (en) 2012-08-20 2016-10-04 InsideSales.com, Inc. Using machine learning to predict behavior based on local conditions
US10127292B2 (en) * 2012-12-03 2018-11-13 Ut-Battelle, Llc Knowledge catalysts
US9892178B2 (en) * 2013-09-19 2018-02-13 Workday, Inc. Systems and methods for interest-driven business intelligence systems including event-oriented data
US9407676B2 (en) 2013-11-25 2016-08-02 At&T Intellectual Property I, Lp Method and apparatus for distributing media content
US20150154706A1 (en) * 2013-12-02 2015-06-04 Finmason, Inc. Systems and methods for financial asset analysis
US9558490B2 (en) * 2014-02-21 2017-01-31 Mastercard International Incorporated Systems and methods for predicting a merchant's change of acquirer
US10810671B2 (en) * 2014-06-27 2020-10-20 Chicago Mercantile Exchange Inc. Interest rate swap compression
US10565647B1 (en) * 2014-08-19 2020-02-18 Next Level Derivatives Llc Secure multi-server interest rate based instrument trading system and methods of increasing efficiency thereof
US20160086278A1 (en) * 2014-09-24 2016-03-24 Axioma, Inc. Risk Factor Splitting
US9720939B1 (en) 2014-09-26 2017-08-01 Jpmorgan Chase Bank, N.A. Method and system for implementing categorically organized relationship effects
US20160180262A1 (en) * 2014-12-22 2016-06-23 Tom Brauer System and method for testing enterprise transactions
US10460275B2 (en) 2015-02-27 2019-10-29 International Business Machines Corporation Predictive model search by communicating comparative strength
EP3295386A4 (en) * 2015-05-11 2019-01-16 Olsher, Daniel Joseph Universal task independent simulation and control platform for generating controlled actions using nuanced artificial intelligence
US9946879B1 (en) * 2015-08-27 2018-04-17 Amazon Technologies, Inc. Establishing risk profiles for software packages
US20170111245A1 (en) * 2015-10-14 2017-04-20 International Business Machines Corporation Process traces clustering: a heterogeneous information network approach
US10656979B2 (en) 2016-03-31 2020-05-19 International Business Machines Corporation Structural and temporal semantics heterogeneous information network (HIN) for process trace clustering
US10445839B2 (en) 2016-04-29 2019-10-15 Intuit Inc. Propensity model for determining a future financial requirement
US10373267B2 (en) 2016-04-29 2019-08-06 Intuit Inc. User data augmented propensity model for determining a future financial requirement
US11107027B1 (en) 2016-05-31 2021-08-31 Intuit Inc. Externally augmented propensity model for determining a future financial requirement
US10671952B1 (en) 2016-06-01 2020-06-02 Intuit Inc. Transmission of a message based on the occurrence of a workflow event and the output of an externally augmented propensity model identifying a future financial requirement
US10600748B2 (en) * 2016-06-20 2020-03-24 Samsung Electronics Co., Ltd. Fan-out semiconductor package
WO2017220140A1 (en) * 2016-06-22 2017-12-28 Swiss Reinsurance Company Ltd. Life insurance system with fully automated underwriting process for real-time underwriting and risk adjustment, and corresponding method thereof
US20180040064A1 (en) * 2016-08-04 2018-02-08 Xero Limited Network-based automated prediction modeling
US10540155B1 (en) * 2016-08-11 2020-01-21 Tibco Software Inc. Platform-agnostic predictive models based on database management system instructions
WO2018046102A1 (en) * 2016-09-10 2018-03-15 Swiss Reinsurance Company Ltd. Automated, telematics-based system with score-driven triggering and operation of automated sharing economy risk-transfer systems and corresponding method thereof
US20180260903A1 (en) * 2017-03-10 2018-09-13 Brian Callery Computerized machine learning based recommendations
US10558769B2 (en) 2017-05-01 2020-02-11 Goldman Sachs & Co. LLC Systems and methods for scenario simulation
US10997672B2 (en) * 2017-05-31 2021-05-04 Intuit Inc. Method for predicting business income from user transaction data
US10902533B2 (en) 2017-06-12 2021-01-26 Microsoft Technology Licensing, Llc Dynamic event processing
US10417039B2 (en) 2017-06-12 2019-09-17 Microsoft Technology Licensing, Llc Event processing using a scorable tree
CN109697282B (en) 2017-10-20 2023-06-06 阿里巴巴集团控股有限公司 Sentence user intention recognition method and device
US11861024B1 (en) 2018-01-26 2024-01-02 Wells Fargo Bank, N.A. Systems and methods for data risk assessment
US20200402167A1 (en) * 2018-02-08 2020-12-24 2Bc Innovations, Llc Updating a portfolio of blockchain-encoded rived longevity-contingent instruments
US20200242700A1 (en) * 2018-02-08 2020-07-30 2Bc Innovations, Llc Riving longevity-contingent instruments
US20200364708A1 (en) * 2018-02-08 2020-11-19 2Bc Innovations, Llc Generating a portfolio of blockchain-encoded rived longevity-contingent instruments
US11468339B2 (en) * 2018-06-29 2022-10-11 Sap Se Agnostic data structure for debriefing predictive software
US11156995B2 (en) 2018-08-22 2021-10-26 Ohio State Innovation Foundation Systems and methods for real-time data processing and for emergency planning
US11727020B2 (en) 2018-10-11 2023-08-15 International Business Machines Corporation Artificial intelligence based problem descriptions
US11030709B2 (en) 2018-10-29 2021-06-08 DIGIBILT, Inc. Method and system for automatically creating and assigning assembly labor activities (ALAs) to a bill of materials (BOM)
US10997553B2 (en) 2018-10-29 2021-05-04 DIGIBILT, Inc. Method and system for automatically creating a bill of materials
CN109919767B (en) * 2019-03-07 2023-01-06 腾讯科技(深圳)有限公司 Transaction risk management method, device and equipment
JP6675721B1 (en) * 2019-05-06 2020-04-01 Assest株式会社 Loan credit evaluation program and system
US11308428B2 (en) * 2019-07-09 2022-04-19 International Business Machines Corporation Machine learning-based resource customization to increase user satisfaction
CN110909992A (en) * 2019-11-11 2020-03-24 北京明略软件系统有限公司 Risk prediction method, device and equipment
US11830291B2 (en) * 2020-02-10 2023-11-28 University Of Maryland, College Park System and method for multimodal emotion recognition
US11615366B2 (en) * 2020-04-15 2023-03-28 EMC IP Holding Company LLC Evaluation of product-related data structures using machine-learning techniques
CN111414999B (en) * 2020-04-27 2023-08-22 新奥新智科技有限公司 Method and device for monitoring running state of equipment
US20220092534A1 (en) * 2020-09-18 2022-03-24 International Business Machines Corporation Event-based risk assessment
US11816451B2 (en) * 2021-02-16 2023-11-14 Hcl Technologies Limited Method and system for identifying common requirements from applications
US11669898B2 (en) * 2021-03-16 2023-06-06 S&P Global Inc. System for estimating distance-to-default credit risk
US20230004538A1 (en) * 2021-06-30 2023-01-05 Dell Products L.P. Database gateway with machine learning model
US11695839B1 (en) 2022-05-31 2023-07-04 Bank Of America Corporation Real-time, intelligent pairing and prioritizing of client and server data queues using ultra-wide band

Citations (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5812987A (en) * 1993-08-18 1998-09-22 Barclays Global Investors, National Association Investment fund management method and system with dynamic risk adjusted allocation of assets
US6029139A (en) * 1998-01-28 2000-02-22 Ncr Corporation Method and apparatus for optimizing promotional sale of products based upon historical data
US6131089A (en) * 1998-05-04 2000-10-10 Motorola, Inc. Pattern classifier with training system and methods of operation therefor
US6317787B1 (en) * 1998-08-11 2001-11-13 Webtrends Corporation System and method for analyzing web-server log files
US6381586B1 (en) * 1998-12-10 2002-04-30 International Business Machines Corporation Pricing of options using importance sampling and stratification/ Quasi-Monte Carlo
US6411936B1 (en) * 1999-02-05 2002-06-25 Nval Solutions, Inc. Enterprise value enhancement system and method
US20030176931A1 (en) * 2002-03-11 2003-09-18 International Business Machines Corporation Method for constructing segmentation-based predictive models
US6671773B2 (en) * 2000-12-07 2003-12-30 Spinnaker Networks, Llc Method and system for responding to file system requests
US6684193B1 (en) * 1999-10-05 2004-01-27 Rapt Technologies Corporation Method and apparatus for multivariate allocation of resources
US6757689B2 (en) * 2001-02-02 2004-06-29 Hewlett-Packard Development Company, L.P. Enabling a zero latency enterprise
US6795811B1 (en) * 2000-04-26 2004-09-21 Lee Epstein Method for investing working capital
US6836773B2 (en) * 2000-09-28 2004-12-28 Oracle International Corporation Enterprise web mining system and method
US6876992B1 (en) * 2000-11-28 2005-04-05 Willis North America Inc. Method and system for risk control optimization
US6996811B2 (en) * 2001-01-22 2006-02-07 Hitachi, Ltd. Method for creating a performance model of an application program adjusted with an execution result of the application program
US7006992B1 (en) * 2000-04-06 2006-02-28 Union State Bank Risk assessment and management system
US7080207B2 (en) * 2002-04-30 2006-07-18 Lsi Logic Corporation Data storage apparatus, system and method including a cache descriptor having a field defining data in a cache block
US7092920B2 (en) * 2000-05-26 2006-08-15 Ncr Corporation Method and apparatus for determining one or more statistical estimators of customer behavior
US7162427B1 (en) * 1999-08-20 2007-01-09 Electronic Data Systems Corporation Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business
US7167837B1 (en) * 2001-04-16 2007-01-23 Ft Interactive Data Corporation Fair-value pricing of a financial asset
US7177822B2 (en) * 2000-08-08 2007-02-13 Daimlerchrysler Corporation Common database system for sales and marketing process
US7236940B2 (en) * 2001-05-16 2007-06-26 Perot Systems Corporation Method and system for assessing and planning business operations utilizing rule-based statistical modeling
US7242856B2 (en) * 2001-11-30 2007-07-10 Sony Corporation Data transfer apparatus and data transfer method
US7243081B2 (en) * 1995-10-30 2007-07-10 Efi Actuaries Method of determining optimal asset allocation utilizing asset cash flow simulation
US7246080B2 (en) * 2001-06-08 2007-07-17 International Business Machines Corporation Apparatus, system and method for measuring and monitoring supply chain risk
US7249089B2 (en) * 2000-12-29 2007-07-24 Hartford Fire Insurance Company Method and system for auctioning bankruptcy assets and valuing same
US7249004B2 (en) * 2003-02-28 2007-07-24 3M Innovative Properties Company Mill roll analysis system
US7251582B2 (en) * 2003-01-24 2007-07-31 Rolls-Royce, Plc Fault diagnosis
US7272617B1 (en) * 2001-11-30 2007-09-18 Ncr Corp. Analytic data set creation for modeling in a customer relationship management system
US7272820B2 (en) * 2002-12-12 2007-09-18 Extrapoles Pty Limited Graphical development of fully executable transactional workflow applications with adaptive high-performance capacity
US7283982B2 (en) * 2003-12-05 2007-10-16 International Business Machines Corporation Method and structure for transform regression
US7409357B2 (en) * 2002-12-20 2008-08-05 Accenture Global Services, Gmbh Quantification of operational risks

Family Cites Families (283)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1355511A (en) * 1971-02-16 1974-06-05 Qeleq Ltd Accountancy system simulation apparatus
US3933305A (en) * 1974-08-23 1976-01-20 John Michael Murphy Asset value calculators
US4750121A (en) 1985-10-03 1988-06-07 Halley Gustavo M Pension benefits system
JPS63155671A (en) * 1986-12-18 1988-06-28 Nec Corp Manufacture of semiconductor device
US4839804A (en) 1986-12-30 1989-06-13 College Savings Bank Method and apparatus for insuring the funding of a future liability of uncertain cost
US5193055A (en) * 1987-03-03 1993-03-09 Brown Gordon T Accounting system
US5644727A (en) * 1987-04-15 1997-07-01 Proprietary Financial Products, Inc. System for the operation and management of one or more financial accounts through the use of a digital communication and computation system for exchange, investment and borrowing
US5852811A (en) * 1987-04-15 1998-12-22 Proprietary Financial Products, Inc. Method for managing financial accounts by a preferred allocation of funds among accounts
US4989141A (en) * 1987-06-01 1991-01-29 Corporate Class Software Computer system for financial analyses and reporting
US5377327A (en) * 1988-04-22 1994-12-27 Digital Equipment Corporation Congestion avoidance scheme for computer networks
JPH02155067A (en) * 1988-12-07 1990-06-14 Hitachi Ltd Method for warning inventory and system using such method
US5237496A (en) 1988-12-07 1993-08-17 Hitachi, Ltd. Inventory control method and system
US5237946A (en) * 1989-01-23 1993-08-24 Copson Alex G Apparatus and method for transferring material to subaqueous levels
US6336103B1 (en) 1989-08-02 2002-01-01 Nardin L. Baker Rapid method of analysis for correlation of asset return to future financial liabilities
US5148365A (en) * 1989-08-15 1992-09-15 Dembo Ron S Scenario optimization
CA2031765C (en) * 1989-12-08 1996-02-20 Masahide Nomura Method and system for performing control conforming with characteristics of controlled system
US5191522A (en) * 1990-01-18 1993-03-02 Itt Corporation Integrated group insurance information processing and reporting system based upon an enterprise-wide data structure
JPH0430953A (en) * 1990-05-23 1992-02-03 Fujitsu Ltd Manufacturing/purchasing control process
US5224034A (en) * 1990-12-21 1993-06-29 Bell Communications Research, Inc. Automated system for generating procurement lists
JPH04264957A (en) 1991-02-20 1992-09-21 Toshiba Corp Security sales decision making supporting device
US7142307B1 (en) * 1991-03-01 2006-11-28 Stark Edward W Method and apparatus for optical interactance and transmittance measurements
GB9105367D0 (en) * 1991-03-13 1991-04-24 Univ Strathclyde Computerised information-retrieval database systems
US5802501A (en) * 1992-10-28 1998-09-01 Graff/Ross Holdings System and methods for computing to support decomposing property into separately valued components
US5377116A (en) * 1991-07-01 1994-12-27 Valenite Inc. Method and system for designing a cutting tool
US5406477A (en) * 1991-08-30 1995-04-11 Digital Equipment Corporation Multiple reasoning and result reconciliation for enterprise analysis
JPH05113879A (en) * 1991-10-23 1993-05-07 T A S Tsusho Kk Program creation and data processing method
US5414621A (en) * 1992-03-06 1995-05-09 Hough; John R. System and method for computing a comparative value of real estate
US6134536A (en) * 1992-05-29 2000-10-17 Swychco Infrastructure Services Pty Ltd. Methods and apparatus relating to the formulation and trading of risk management contracts
EP0587290B1 (en) 1992-07-30 2000-01-26 Teknekron Infoswitch Corporation Method and system for monitoring and/or controlling the performance of an organization
DE69308977T2 (en) * 1992-09-25 1997-10-09 Furukawa Electric Co Ltd Semiconductor laser device
US5675746A (en) * 1992-09-30 1997-10-07 Marshall; Paul S. Virtual reality generator for use with financial information
US5361201A (en) * 1992-10-19 1994-11-01 Hnc, Inc. Real estate appraisal using predictive modeling
GB9222884D0 (en) * 1992-10-30 1992-12-16 Massachusetts Inst Technology System for administration of privatization in newly democratic nations
US6112188A (en) * 1992-10-30 2000-08-29 Hartnett; William J. Privatization marketplace
US5794219A (en) * 1996-02-20 1998-08-11 Health Hero Network, Inc. Method of conducting an on-line auction with bid pooling
US5985559A (en) * 1997-04-30 1999-11-16 Health Hero Network System and method for preventing, diagnosing, and treating genetic and pathogen-caused disease
US5951300A (en) * 1997-03-10 1999-09-14 Health Hero Network Online system and method for providing composite entertainment and health information
US5649181A (en) * 1993-04-16 1997-07-15 Sybase, Inc. Method and apparatus for indexing database columns with bit vectors
WO1994025927A2 (en) * 1993-04-30 1994-11-10 Hever For Life For Health For Spirit Ltd. Personalized method and system for storage, communication, analysis and processing of health-related data
JPH06348584A (en) * 1993-06-01 1994-12-22 Internatl Business Mach Corp <Ibm> Data processing system
US5812988A (en) * 1993-12-06 1998-09-22 Investments Analytic, Inc. Method and system for jointly estimating cash flows, simulated returns, risk measures and present values for a plurality of assets
US6154725A (en) * 1993-12-06 2000-11-28 Donner; Irah H. Intellectual property (IP) computer-implemented audit system optionally over network architecture, and computer program product for same
JPH07271697A (en) * 1994-03-30 1995-10-20 Sony Corp Information terminal device and its information transmission method
WO1995027945A1 (en) * 1994-04-06 1995-10-19 Morgan Stanley Group Inc. Data processing system and method for financial debt instruments
EP0686926A3 (en) * 1994-05-24 1996-06-12 Ron S Dembo Method and apparatus for optimal portfolio replication
US5435565A (en) * 1994-07-18 1995-07-25 Benaderet; David M. Board game relating to stress
US5761442A (en) * 1994-08-31 1998-06-02 Advanced Investment Technology, Inc. Predictive neural network means and method for selecting a portfolio of securities wherein each network has been trained using data relating to a corresponding security
US5704045A (en) * 1995-01-09 1997-12-30 King; Douglas L. System and method of risk transfer and risk diversification including means to assure with assurance of timely payment and segregation of the interests of capital
US5742775A (en) * 1995-01-18 1998-04-21 King; Douglas L. Method and apparatus of creating financial instrument and administering an adjustable rate loan system
US5680305A (en) * 1995-02-16 1997-10-21 Apgar, Iv; Mahlon System and method for evaluating real estate
US5768475A (en) * 1995-05-25 1998-06-16 Pavilion Technologies, Inc. Method and apparatus for automatically constructing a data flow architecture
US5887120A (en) * 1995-05-31 1999-03-23 Oracle Corporation Method and apparatus for determining theme for discourse
US5809282A (en) * 1995-06-07 1998-09-15 Grc International, Inc. Automated network simulation and optimization system
US5737581A (en) * 1995-08-30 1998-04-07 Keane; John A. Quality system implementation simulator
US5806047A (en) 1995-09-25 1998-09-08 Metlife Life Insurance Company System for combined pool portfolio
US5774881A (en) 1995-10-30 1998-06-30 Efi Actuaries Method of determining optimal asset allocation utilizing asset cash flow simulation
US5889823A (en) * 1995-12-13 1999-03-30 Lucent Technologies Inc. Method and apparatus for compensation of linear or nonlinear intersymbol interference and noise correlation in magnetic recording channels
US6207936B1 (en) * 1996-01-31 2001-03-27 Asm America, Inc. Model-based predictive control of thermal processing
US5819237A (en) * 1996-02-13 1998-10-06 Financial Engineering Associates, Inc. System and method for determination of incremental value at risk for securities trading
US5875431A (en) * 1996-03-15 1999-02-23 Heckman; Frank Legal strategic analysis planning and evaluation control system and method
US5873096A (en) * 1997-10-08 1999-02-16 Siebel Systems, Inc. Method of maintaining a network of partially replicated database system
US5774873A (en) * 1996-03-29 1998-06-30 Adt Automotive, Inc. Electronic on-line motor vehicle auction and information system
US5812404A (en) * 1996-04-18 1998-09-22 Valmet Corporation Method for overall regulation of the headbox of a paper machine or equivalent
US5825653A (en) * 1997-03-14 1998-10-20 Valmet Corporation Method for overall regulation of a former of a paper machine or equivalent
US6278899B1 (en) * 1996-05-06 2001-08-21 Pavilion Technologies, Inc. Method for on-line optimization of a plant
US5933345A (en) * 1996-05-06 1999-08-03 Pavilion Technologies, Inc. Method and apparatus for dynamic and steady state modeling over a desired path between two end points
US6493596B1 (en) * 1996-05-06 2002-12-10 Pavilion Technologies, Inc. Method and apparatus for controlling a non-linear mill
US5706495A (en) * 1996-05-07 1998-01-06 International Business Machines Corporation Encoded-vector indices for decision support and warehousing
US5792062A (en) * 1996-05-14 1998-08-11 Massachusetts Institute Of Technology Method and apparatus for detecting nonlinearity in an electrocardiographic signal
US6026397A (en) * 1996-05-22 2000-02-15 Electronic Data Systems Corporation Data analysis system and method
EP0958778B1 (en) * 1996-07-16 2002-09-04 Kyoto Daiichi Kagaku Co., Ltd. Distributed inspection/measurement system and distributed health caring system
US6909708B1 (en) * 1996-11-18 2005-06-21 Mci Communications Corporation System, method and article of manufacture for a communication system architecture including video conferencing
US6032119A (en) * 1997-01-16 2000-02-29 Health Hero Network, Inc. Personalized display of health information
US7144699B2 (en) * 1997-03-20 2006-12-05 Affymetrix, Inc. Iterative resequencing
US6249315B1 (en) * 1997-03-24 2001-06-19 Jack M. Holm Strategy for pictorial digital image processing
US6078901A (en) * 1997-04-03 2000-06-20 Ching; Hugh Quantitative supply and demand model based on infinite spreadsheet
JP2002513489A (en) * 1997-05-21 2002-05-08 カイメトリクス・インコーポレーテッド Method of controlled optimization of corporate planning model
US6278981B1 (en) * 1997-05-29 2001-08-21 Algorithmics International Corporation Computer-implemented method and apparatus for portfolio compression
US5991758A (en) * 1997-06-06 1999-11-23 Madison Information Technologies, Inc. System and method for indexing information about entities from different information sources
US6012053A (en) * 1997-06-23 2000-01-04 Lycos, Inc. Computer system with user-controlled relevance ranking of search results
AU8763198A (en) * 1997-08-01 1999-02-22 Ric Marshall Entreprise simulation module
US6173276B1 (en) * 1997-08-21 2001-01-09 Scicomp, Inc. System and method for financial instrument modeling and valuation
US6301584B1 (en) * 1997-08-21 2001-10-09 Home Information Services, Inc. System and method for retrieving entities and integrating data
US6064972A (en) * 1997-09-17 2000-05-16 At&T Corp Risk management technique for network access
US5774761A (en) * 1997-10-14 1998-06-30 Xerox Corporation Machine set up procedure using multivariate modeling and multiobjective optimization
US6324553B1 (en) * 1997-11-26 2001-11-27 International Business Machines Corporation Apparatus and method for the manual selective blocking of images
US6125355A (en) * 1997-12-02 2000-09-26 Financial Engines, Inc. Pricing module for financial advisory system
US6014629A (en) * 1998-01-13 2000-01-11 Moore U.S.A. Inc. Personalized health care provider directory
US6996539B1 (en) * 1998-03-11 2006-02-07 Foliofn, Inc. Method and apparatus for enabling smaller investors or others to create and manage a portfolio of securities or other assets or liabilities on a cost effective basis
US7509277B1 (en) * 1998-04-24 2009-03-24 Starmine Corporation Security analyst estimates performance viewing system and method
US7603308B2 (en) * 1998-04-24 2009-10-13 Starmine Corporation Security analyst estimates performance viewing system and method
US6282531B1 (en) * 1998-06-12 2001-08-28 Cognimed, Llc System for managing applied knowledge and workflow in multiple dimensions and contexts
US6347306B1 (en) * 1998-07-21 2002-02-12 Cybershift.Com, Inc. Method and system for direct payroll processing
US6645124B1 (en) * 1998-09-18 2003-11-11 Athlon Llc Interactive programmable fitness interface system
US6366934B1 (en) * 1998-10-08 2002-04-02 International Business Machines Corporation Method and apparatus for querying structured documents using a database extender
US6249768B1 (en) * 1998-10-29 2001-06-19 International Business Machines Corporation Strategic capability networks
US6546381B1 (en) * 1998-11-02 2003-04-08 International Business Machines Corporation Query optimization system and method
US7031963B1 (en) * 1998-11-09 2006-04-18 Unisys Corporation Green ice printout sorting and delivery program
US6700923B1 (en) * 1999-01-04 2004-03-02 Board Of Regents The University Of Texas System Adaptive multiple access interference suppression
US6219649B1 (en) * 1999-01-21 2001-04-17 Joel Jameson Methods and apparatus for allocating resources in the presence of uncertainty
US6330564B1 (en) * 1999-02-10 2001-12-11 International Business Machines Corporation System and method for automated problem isolation in systems with measurements structured as a multidimensional database
US6513019B2 (en) * 1999-02-16 2003-01-28 Financial Technologies International, Inc. Financial consolidation and communication platform
US6510430B1 (en) * 1999-02-24 2003-01-21 Acumins, Inc. Diagnosis and interpretation methods and apparatus for a personal nutrition program
AU2054000A (en) * 1999-02-26 2000-09-14 Lipomed, Inc. Methods, systems, and computer program products for analyzing and presenting risk assessment results based on nmr lipoprotein analysis of blood
US6584507B1 (en) * 1999-03-02 2003-06-24 Cisco Technology, Inc. Linking external applications to a network management system
US6315735B1 (en) * 1999-03-31 2001-11-13 Pulsion Medical Systems Ag Devices for in-vivo determination of the compliance function and the systemic blood flow of a living being
US7299080B2 (en) * 1999-10-08 2007-11-20 Sensys Medical, Inc. Compact apparatus for noninvasive measurement of glucose through near-infrared spectroscopy
ES2256000T3 (en) * 1999-04-22 2006-07-16 Liposcience, Inc. NMR PROCEDURE TO DETERMINE THE RISK OF DEVELOPING TYPE 2 DIABETES.
US6411939B1 (en) 1999-05-17 2002-06-25 Offshore Benefits, Llc Computer-aided method, machine, and products produced thereby, for illustrating a replacement of a benefit plan that is viable at one location but not viable at the location of the replacement
AU5377900A (en) * 1999-06-02 2000-12-28 Algorithmics International Corp. Risk management system, distributed framework and method
WO2000075819A2 (en) * 1999-06-03 2000-12-14 Algorithmics International Corp. Risk management system and method providing rule-based evolution of a portfolio of instruments
US6591232B1 (en) * 1999-06-08 2003-07-08 Sikorsky Aircraft Corporation Method of selecting an optimum mix of resources to maximize an outcome while minimizing risk
US6654469B1 (en) * 1999-06-28 2003-11-25 Lucent Technologies Inc. Methods and devices for reducing sampling noise in analog signals using linear interpolation
US8577778B2 (en) * 1999-07-21 2013-11-05 Longitude Llc Derivatives having demand-based, adjustable returns, and trading exchange therefor
AU6118800A (en) * 1999-07-23 2001-02-13 Netfolio, Inc. System and method for selecting and purchasing stocks via a global computer network
US6209124B1 (en) * 1999-08-30 2001-03-27 Touchnet Information Systems, Inc. Method of markup language accessing of host systems and data using a constructed intermediary
US6332163B1 (en) * 1999-09-01 2001-12-18 Accenture, Llp Method for providing communication services over a computer network system
US6567786B1 (en) * 1999-09-16 2003-05-20 International Business Machines Corporation System and method for increasing the effectiveness of customer contact strategies
US6654389B1 (en) 1999-11-23 2003-11-25 International Business Machines Corporation System and method for searching patterns in real-time over a shared media
CA2290888A1 (en) * 1999-11-26 2001-05-26 Algorithmics International Corp. Risk management, pricing and portfolio makeup system and method
US6418448B1 (en) * 1999-12-06 2002-07-09 Shyam Sundar Sarkar Method and apparatus for processing markup language specifications for data and metadata used inside multiple related internet documents to navigate, query and manipulate information from a plurality of object relational databases over the web
US6654649B2 (en) * 1999-12-22 2003-11-25 Aspen Technology, Inc. Computer method and apparatus for optimized controller in a non-linear process
DE19963200A1 (en) * 1999-12-27 2001-09-06 Medireha Gmbh Therapy device
US7039608B2 (en) * 1999-12-30 2006-05-02 Ge Capital Commercial Finance, Inc. Rapid valuation of portfolios of assets such as financial instruments
US7003484B2 (en) * 1999-12-30 2006-02-21 Ge Capital Commercial Finance, Inc. Methods and systems for efficiently sampling portfolios for optimal underwriting
US7028005B2 (en) * 1999-12-30 2006-04-11 Ge Capital Commercial Finance, Inc. Methods and systems for finding value and reducing risk
US7346518B1 (en) * 1999-12-30 2008-03-18 At&T Bls Intellectual Property, Inc. System and method for determining the marketability of intellectual property assets
US6757898B1 (en) * 2000-01-18 2004-06-29 Mckesson Information Solutions, Inc. Electronic provider—patient interface system
US7469227B2 (en) * 2000-02-22 2008-12-23 Strategic Analytics, Inc. Retail lending risk related scenario generation
US6671673B1 (en) 2000-03-24 2003-12-30 International Business Machines Corporation Method for integrated supply chain and financial management
US8170935B2 (en) * 2000-03-27 2012-05-01 Nyse Amex Llc Systems and methods for evaluating the integrity of a model portfolio of a financial instrument
JP4054507B2 (en) * 2000-03-31 2008-02-27 キヤノン株式会社 Voice information processing method and apparatus, and storage medium
US20020023034A1 (en) * 2000-03-31 2002-02-21 Brown Roger G. Method and system for a digital automated exchange
US6934931B2 (en) * 2000-04-05 2005-08-23 Pavilion Technologies, Inc. System and method for enterprise modeling, optimization and control
US6826521B1 (en) * 2000-04-06 2004-11-30 Abb Automation Inc. System and methodology and adaptive, linear model predictive control based on rigorous, nonlinear process model
US7006939B2 (en) * 2000-04-19 2006-02-28 Georgia Tech Research Corporation Method and apparatus for low cost signature testing for analog and RF circuits
US7212996B1 (en) * 2000-04-20 2007-05-01 Jpmorgan Chase Bank, N.A. System and method for dynamic, multivariable comparison of financial products
US7356504B2 (en) * 2000-05-01 2008-04-08 The Olsen Group Methods for determining value at risk
US20030069986A1 (en) * 2000-05-23 2003-04-10 Lori Petrone Electronic marketplace system and method using optimization techniques
US6684204B1 (en) * 2000-06-19 2004-01-27 International Business Machines Corporation Method for conducting a search on a network which includes documents having a plurality of tags
US20020016758A1 (en) * 2000-06-28 2002-02-07 Grigsby Calvin B. Method and apparatus for offering, pricing, and selling securities over a network
US7328183B1 (en) 2000-08-15 2008-02-05 Ltcia, Llc Computer program and method for determining the economic impact of long-term care
US6738753B1 (en) * 2000-08-21 2004-05-18 Michael Andrew Hogan Modular, hierarchically organized artificial intelligence entity
US6499843B1 (en) * 2000-09-13 2002-12-31 Bausch & Lomb Incorporated Customized vision correction method and business
US20040236673A1 (en) * 2000-10-17 2004-11-25 Eder Jeff Scott Collaborative risk transfer system
KR20020054245A (en) * 2000-12-27 2002-07-06 오길록 Sensor fusion apparatus and method for optical and magnetic motion capture system
US7536332B2 (en) * 2001-02-02 2009-05-19 Rhee Thomas A Real life implementation of modern portfolio theory (MPT) for financial planning and portfolio management
US6866024B2 (en) * 2001-03-05 2005-03-15 The Ohio State University Engine control using torque estimation
US7496534B2 (en) 2001-03-08 2009-02-24 Olsen Richard B Methods for trade decision making
US6549467B2 (en) * 2001-03-09 2003-04-15 Micron Technology, Inc. Non-volatile memory device with erase address register
US7155510B1 (en) 2001-03-28 2006-12-26 Predictwallstreet, Inc. System and method for forecasting information using collective intelligence from diverse sources
US6732095B1 (en) * 2001-04-13 2004-05-04 Siebel Systems, Inc. Method and apparatus for mapping between XML and relational representations
US7031955B1 (en) * 2001-04-27 2006-04-18 I2 Technologies Us, Inc. Optimization using a multi-dimensional data model
WO2002088989A1 (en) * 2001-04-30 2002-11-07 Goraya Tanvir Y Adaptive dynamic personal modeling system and method
US20020198811A1 (en) * 2001-06-12 2002-12-26 Adam Wizon System and method for monitoring the status of analyses performed on a portfolio of financial instruments
US7376610B2 (en) * 2001-06-14 2008-05-20 International Business Machines Corporation Computerized method and system for score based evaluation of capital market investment decisions and strategies
US7222095B2 (en) 2001-07-06 2007-05-22 Buyside Research Llc Method and system for comparison and evaluation of investment portfolios
US7318038B2 (en) * 2001-07-30 2008-01-08 International Business Machines Corporation Project risk assessment
US20030028267A1 (en) * 2001-08-06 2003-02-06 Hales Michael L. Method and system for controlling setpoints of manipulated variables for process optimization under constraint of process-limiting variables
US7386496B1 (en) * 2001-08-15 2008-06-10 Jones Lang Lasalle Ip, Inc. System and method for evaluating real estate financing structures
US20030046130A1 (en) * 2001-08-24 2003-03-06 Golightly Robert S. System and method for real-time enterprise optimization
US7613640B2 (en) * 2001-08-29 2009-11-03 Ebs Group Limited Electronic trading system
US20030074291A1 (en) * 2001-09-19 2003-04-17 Christine Hartung Integrated program for team-based project evaluation
US6518430B1 (en) * 2001-09-21 2003-02-11 Abbott Laboratories Process for the preparation of 5-(substituted)-10-methoxy-2,2,4-trimethyl-2,5-dihydro-1H-chromeno[3,4-F]quinolines and derivatives thereof
US20030120433A1 (en) * 2001-10-17 2003-06-26 Hiroki Yokota Methods for predicting transcription levels
FR2831301B1 (en) * 2001-10-18 2004-02-13 Eurocopter France METHOD AND DEVICE FOR DETERMINING IN REAL TIME THE BEHAVIOR OF A MOBILE, IN PARTICULAR AN AIRCRAFT
SE520728C2 (en) * 2001-11-12 2003-08-19 Ericsson Telefon Ab L M Non-linear modeling procedure
US7716333B2 (en) * 2001-11-27 2010-05-11 Accenture Global Services Gmbh Service control architecture
CA2364425A1 (en) * 2001-12-05 2003-06-05 Algorithmics International Corp. A system for calculation of operational risk capital
US7395219B2 (en) 2001-12-08 2008-07-01 Kenneth Ray Strech Insurance on demand transaction management system
US7523065B2 (en) * 2001-12-12 2009-04-21 Asset Trust, Inc. Risk transfer supply chain system
US20030115090A1 (en) * 2001-12-17 2003-06-19 Shahid Mujtaba Method to define an optimal integrated action plan for procurement, manufacturing, and marketing
US7158967B1 (en) * 2001-12-21 2007-01-02 Unisys Corporation XML output definition table for transferring internal data into XML document
US7249007B1 (en) * 2002-01-15 2007-07-24 Dutton John A Weather and climate variable prediction for management of weather and climate risk
CA2381689A1 (en) * 2002-04-12 2003-10-12 Algorithmics International Corp. System, method and framework for generating scenarios
WO2003096254A1 (en) * 2002-05-07 2003-11-20 Markov Processes International, Llc A method and system to solve dynamic multi-factor models in finance
GB0210397D0 (en) * 2002-05-07 2002-06-12 Ferring Bv Pharmaceutical formulations
US7395235B2 (en) * 2002-06-13 2008-07-01 Centre For Development Of Advanced Computing Strategy independent optimization of multi objective functions
US20030233310A1 (en) * 2002-06-17 2003-12-18 Boris Stavrovski Method and system for implementing a business transaction over the internet with use and consecutive transformation of information from publicly available databases, actual preferences of potential customers and statistical models of the market situation
US7596523B2 (en) * 2002-09-09 2009-09-29 Barra, Inc. Method and apparatus for network-based portfolio management and risk-analysis
US7747339B2 (en) * 2002-10-03 2010-06-29 Hewlett-Packard Development Company, L.P. Managing procurement risk
JP2004129458A (en) * 2002-10-07 2004-04-22 Canon Inc Controller for vibratory actuator, vibratory actuator system, and control method for vibratory actuator
US7752099B2 (en) * 2002-10-17 2010-07-06 Itg Software Solutions, Inc. Factor risk model based system, method, and computer program product for generating risk forecasts
US7219040B2 (en) * 2002-11-05 2007-05-15 General Electric Company Method and system for model based control of heavy duty gas turbine
US6892155B2 (en) * 2002-11-19 2005-05-10 Agilent Technologies, Inc. Method for the rapid estimation of figures of merit for multiple devices based on nonlinear modeling
US6823253B2 (en) * 2002-11-27 2004-11-23 General Electric Company Methods and apparatus for model predictive control of aircraft gas turbine engines
ATE484011T1 (en) * 2002-12-09 2010-10-15 Rockwell Automation Inc SYSTEM AND METHOD FOR ADAPTIVE CONTROL OF PROCESSES WITH CHANGING DYNAMICS
DE10353868B4 (en) * 2002-12-12 2014-07-24 Heidelberger Druckmaschinen Ag Representation of data in a substrate processing machine
US7337137B2 (en) * 2003-02-20 2008-02-26 Itg, Inc. Investment portfolio optimization system, method and computer program product
US7640201B2 (en) * 2003-03-19 2009-12-29 General Electric Company Methods and systems for analytical-based multifactor Multiobjective portfolio risk optimization
US7347365B2 (en) * 2003-04-04 2008-03-25 Lumidigm, Inc. Combined total-internal-reflectance and tissue imaging systems and methods
US7912738B1 (en) 2003-04-15 2011-03-22 Pentech, Llc Methods for administering loan premiums in a pension insurance program
US7848939B1 (en) 2003-04-15 2010-12-07 Pentech, Llc Methods for validating participants in a pension insurance program
US7716073B1 (en) 2003-04-15 2010-05-11 Pension Benefit Insurance Services, Inc. Methods for administering claims in a pension insurance program
US7080027B2 (en) 2003-04-17 2006-07-18 Targetrx, Inc. Method and system for analyzing the effectiveness of marketing strategies
US7188637B2 (en) * 2003-05-01 2007-03-13 Aspen Technology, Inc. Methods, systems, and articles for controlling a fluid blending system
US7617141B2 (en) * 2003-05-08 2009-11-10 International Business Machines Corporation Software application portfolio management for a client
US8108920B2 (en) * 2003-05-12 2012-01-31 Microsoft Corporation Passive client single sign-on for web applications
US20040243461A1 (en) * 2003-05-16 2004-12-02 Riggle Mark Spencer Integration of causal models, business process models and dimensional reports for enhancing problem solving
CN101410008A (en) * 2003-05-28 2009-04-15 先锋高级育种国际公司 Plant breeding method
US7426423B2 (en) * 2003-05-30 2008-09-16 Liebherr-Werk Nenzing—GmbH Crane or excavator for handling a cable-suspended load provided with optimised motion guidance
US8010387B2 (en) * 2003-06-04 2011-08-30 California Institute Of Technology Method, computer program product, and system for risk management
US7606727B1 (en) * 2003-06-16 2009-10-20 Jpmorgan Chase Bank, N.A. System and method for identifying optimal marketing offers
US7912769B2 (en) * 2003-07-01 2011-03-22 Accenture Global Services Limited Shareholder value tool
US7899723B2 (en) * 2003-07-01 2011-03-01 Accenture Global Services Gmbh Shareholder value tool
WO2005008424A2 (en) * 2003-07-11 2005-01-27 Finanalytica, Inc. Providing optimization of a financial portfolio using a parametric leptokurtic distribution
US7146353B2 (en) * 2003-07-22 2006-12-05 Hewlett-Packard Development Company, L.P. Resource allocation for multiple applications
WO2005013019A2 (en) * 2003-07-25 2005-02-10 Yamaha Motor Co., Ltd Soft computing optimizer of intelligent control system structures
US8175908B1 (en) * 2003-09-04 2012-05-08 Jpmorgan Chase Bank, N.A. Systems and methods for constructing and utilizing a merchant database derived from customer purchase transactions data
US7725374B2 (en) * 2003-10-10 2010-05-25 Julian Van Erlach Asset analysis according to the required yield method
US7657475B1 (en) * 2003-12-31 2010-02-02 Fannie Mae Property investment rating system and method
US20050228730A1 (en) * 2004-01-07 2005-10-13 Thomas Henderson Targeted dividend reinvestment plans and methods of establishing same
US7542932B2 (en) * 2004-02-20 2009-06-02 General Electric Company Systems and methods for multi-objective portfolio optimization
US7778910B2 (en) * 2004-03-02 2010-08-17 Accenture Global Services Gmbh Future value drivers
US20050193739A1 (en) * 2004-03-02 2005-09-08 General Electric Company Model-based control systems and methods for gas turbine engines
US7251638B2 (en) * 2004-03-03 2007-07-31 Yamaha Hatsudoki Kabushiki Kaisha Intelligent robust control system for motorcycle using soft computing optimizer
US7827557B2 (en) * 2004-03-24 2010-11-02 Hewlett-Packard Development Company, L.P. Method and apparatus for allocating resources to applications using a linearized objective function
US7296734B2 (en) 2004-06-02 2007-11-20 Robert Kenneth Pliha Systems and methods for scoring bank customers direct deposit account transaction activity to match financial behavior to specific acquisition, performance and risk events defined by the bank using a decision tree and stochastic process
US8082207B2 (en) 2004-06-17 2011-12-20 Certegy Check Services, Inc. Scored negative file system and method
US7877321B2 (en) * 2004-06-29 2011-01-25 Textura Corporation Method of and system for evaluating financial risk associated with a construction project
US7672889B2 (en) * 2004-07-15 2010-03-02 Brooks Kent F System and method for providing customizable investment tools
US7490356B2 (en) * 2004-07-20 2009-02-10 Reflectent Software, Inc. End user risk management
EP1628492A1 (en) * 2004-08-17 2006-02-22 Dialog Semiconductor GmbH A camera test system
US7711623B2 (en) * 2004-08-20 2010-05-04 Consulting Services Support Corporation Decision assistance platform configured for facilitating financial consulting services
US8160956B2 (en) * 2004-08-31 2012-04-17 Thomas Franklin Comstock Insurance system and method for a high-risk asset purchaser or lessee
US7426487B2 (en) * 2004-09-10 2008-09-16 Chicago Mercantile Exchange, Inc. System and method for efficiently using collateral for risk offset
US7509275B2 (en) 2004-09-10 2009-03-24 Chicago Mercantile Exchange Inc. System and method for asymmetric offsets in a risk management system
US7996339B2 (en) * 2004-09-17 2011-08-09 International Business Machines Corporation Method and system for generating object classification models
US7224761B2 (en) * 2004-11-19 2007-05-29 Westinghouse Electric Co. Llc Method and algorithm for searching and optimizing nuclear reactor core loading patterns
WO2006060481A2 (en) * 2004-11-30 2006-06-08 Michael Dell Orfano System and method for creating electronic real estate registration
US7877283B2 (en) * 2004-12-30 2011-01-25 Sap Ag Multi-perspective business process configuration
US7774293B2 (en) * 2005-03-17 2010-08-10 University Of Maryland System and methods for assessing risk using hybrid causal logic
US7624054B2 (en) * 2005-08-25 2009-11-24 Sas Institute Inc. Financial risk mitigation optimization systems and methods
US7698188B2 (en) * 2005-11-03 2010-04-13 Beta-Rubicon Technologies, Llc Electronic enterprise capital marketplace and monitoring apparatus and method
US7702615B1 (en) * 2005-11-04 2010-04-20 M-Factor, Inc. Creation and aggregation of predicted data
US7561158B2 (en) * 2006-01-11 2009-07-14 International Business Machines Corporation Method and apparatus for presenting feature importance in predictive modeling
US7433809B1 (en) * 2006-01-25 2008-10-07 Sas Institute Inc. System and method for non-linear modeling
EP1999711A4 (en) * 2006-03-01 2009-11-04 Townsend Analytics Ltd Methods and systems for risk management
US7853509B2 (en) 2006-03-23 2010-12-14 Hartford Fire Insurance Company Lifetime income
US7689494B2 (en) 2006-03-23 2010-03-30 Advisor Software Inc. Simulation of portfolios and risk budget analysis
US7788195B1 (en) * 2006-03-24 2010-08-31 Sas Institute Inc. Computer-implemented predictive model generation systems and methods
US8392240B2 (en) * 2006-09-01 2013-03-05 Oracle Financial Services Software Limited System and method for determining outsourcing suitability of a business process in an enterprise
US8589190B1 (en) 2006-10-06 2013-11-19 Liberty Mutual Insurance Company System and method for underwriting a prepackaged business owners insurance policy
US7940899B2 (en) * 2006-10-06 2011-05-10 Pricewaterhousecoopers Llp Fraud detection, risk analysis and compliance assessment
US7949597B2 (en) 2007-02-02 2011-05-24 Zadoorian James A Method of collecting delinquent specialized debt
US7840464B2 (en) 2007-02-05 2010-11-23 Jpmorgan Chase Bank, N.A. Creating and trading building block mortality derivatives to transfer and receive mortality risk in a liquid market
US8108290B2 (en) 2007-02-15 2012-01-31 Chicago Board Options Exchange, Incorporated Market sentiment indicator
US7900259B2 (en) * 2007-03-16 2011-03-01 Prevari Predictive assessment of network risks
JP5405720B2 (en) * 2007-03-30 2014-02-05 株式会社ニデック Eyeglass lens processing equipment
US7877308B1 (en) 2007-04-26 2011-01-25 Klein Decisions, Inc. Method and system for using risk tolerance and life goal preferences and rankings to enhance financial projections
US8566206B2 (en) 2007-05-10 2013-10-22 Pensions First Analytics Limited Pension fund systems
US8005739B1 (en) 2007-06-22 2011-08-23 Stephen David Reddy Pension alternative retirement income system
US7908237B2 (en) * 2007-06-29 2011-03-15 International Business Machines Corporation Method and apparatus for identifying unexpected behavior of a customer in a retail environment using detected location data, temperature, humidity, lighting conditions, music, and odors
US7962321B2 (en) * 2007-07-10 2011-06-14 Palo Alto Research Center Incorporated Modeling when connections are the problem
US7870061B2 (en) 2007-08-13 2011-01-11 Mott Antony R System and method for transferring longevity risk
US7921061B2 (en) * 2007-09-05 2011-04-05 Oracle International Corporation System and method for simultaneous price optimization and asset allocation to maximize manufacturing profits
US8566128B2 (en) 2007-10-24 2013-10-22 Joseph D. Koziol Insurance transaction system and method
US8065209B1 (en) 2007-11-12 2011-11-22 United Services Automobile Association (Usaa) System and method for bundling financial services products with a mortgage in connection with a move event
US8645259B1 (en) * 2008-02-14 2014-02-04 Tyche Technologies LLC Mitigating risk associated with executing limit orders for trading securities
US8041580B1 (en) 2008-02-28 2011-10-18 Intuit Inc. Forecasting consequences of healthcare utilization choices
US7849004B2 (en) 2008-02-29 2010-12-07 American Express Travel Related Services Company, Inc. Total structural risk model
US8095396B1 (en) * 2008-03-27 2012-01-10 Asterisk Financial Group, Inc. Computer system for underwriting a personal guaranty liability by utilizing a risk apportionment system
US8156030B2 (en) * 2008-04-03 2012-04-10 Gravity Investments Llc Diversification measurement and analysis system
US8577712B2 (en) 2008-05-02 2013-11-05 Hewlett-Packard Development Company, L.P. Assessing risk
US8200573B2 (en) 2008-06-05 2012-06-12 Skopos Financial Group, Llc Multi-variable transaction system and method
US8255972B2 (en) 2008-06-06 2012-08-28 International Business Machines Corporation Method to automatically map business function level policies to it management policies
FR2933396B1 (en) * 2008-07-02 2011-07-22 Air Liquide PROCESS FOR MANUFACTURING A TRAPPING STRUCTURE WITH CONTROL OF THE DRYING STEP
US8650108B1 (en) * 2008-07-29 2014-02-11 Bank Of America Corporation User interface for investment decisioning process model
US8332305B1 (en) 2008-09-22 2012-12-11 Optionmonster Holdings, Inc. Automatic strategy grouping for a trading system
US8560359B2 (en) 2008-10-31 2013-10-15 Hewlett-Packard Development Company, L.P. System and methods for modeling consequences of events
US8566219B2 (en) 2009-03-24 2013-10-22 Trading Technologeis International, Inc. System and method for a risk check
US8335732B2 (en) 2009-05-27 2012-12-18 Joshua Farzad Dayanim Security pricing method and system
US8442908B2 (en) * 2009-06-12 2013-05-14 MCMCAP Partners, LLC Systems and methods for asset valuation
US8131571B2 (en) * 2009-09-23 2012-03-06 Watson Wyatt & Company Method and system for evaluating insurance liabilities using stochastic modeling and sampling techniques
US8255346B2 (en) 2009-11-11 2012-08-28 International Business Machines Corporation Methods and systems for variable group selection and temporal causal modeling
US8548934B2 (en) 2009-11-17 2013-10-01 Infozen, Inc. System and method for assessing risk
US8401950B2 (en) * 2010-01-25 2013-03-19 Fair Isaac Corporation Optimizing portfolios of financial instruments
US8473431B1 (en) 2010-05-14 2013-06-25 Google Inc. Predictive analytic modeling platform
US8306849B2 (en) * 2010-09-16 2012-11-06 International Business Machines Corporation Predicting success of a proposed project
US8566222B2 (en) 2010-12-20 2013-10-22 Risconsulting Group Llc, The Platform for valuation of financial instruments
US8626558B2 (en) * 2011-09-07 2014-01-07 Dow Corning Corporation Supply chain risk management method and device
US8583533B2 (en) 2011-09-29 2013-11-12 Direct Swap Inc. System, method, article for facilitating derivatives transactions
US8595845B2 (en) 2012-01-19 2013-11-26 Mcafee, Inc. Calculating quantitative asset risk

Patent Citations (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5812987A (en) * 1993-08-18 1998-09-22 Barclays Global Investors, National Association Investment fund management method and system with dynamic risk adjusted allocation of assets
US7243081B2 (en) * 1995-10-30 2007-07-10 Efi Actuaries Method of determining optimal asset allocation utilizing asset cash flow simulation
US6029139A (en) * 1998-01-28 2000-02-22 Ncr Corporation Method and apparatus for optimizing promotional sale of products based upon historical data
US6131089A (en) * 1998-05-04 2000-10-10 Motorola, Inc. Pattern classifier with training system and methods of operation therefor
US6317787B1 (en) * 1998-08-11 2001-11-13 Webtrends Corporation System and method for analyzing web-server log files
US6381586B1 (en) * 1998-12-10 2002-04-30 International Business Machines Corporation Pricing of options using importance sampling and stratification/ Quasi-Monte Carlo
US6411936B1 (en) * 1999-02-05 2002-06-25 Nval Solutions, Inc. Enterprise value enhancement system and method
US7162427B1 (en) * 1999-08-20 2007-01-09 Electronic Data Systems Corporation Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business
US6684193B1 (en) * 1999-10-05 2004-01-27 Rapt Technologies Corporation Method and apparatus for multivariate allocation of resources
US7006992B1 (en) * 2000-04-06 2006-02-28 Union State Bank Risk assessment and management system
US6795811B1 (en) * 2000-04-26 2004-09-21 Lee Epstein Method for investing working capital
US7092920B2 (en) * 2000-05-26 2006-08-15 Ncr Corporation Method and apparatus for determining one or more statistical estimators of customer behavior
US7177822B2 (en) * 2000-08-08 2007-02-13 Daimlerchrysler Corporation Common database system for sales and marketing process
US6836773B2 (en) * 2000-09-28 2004-12-28 Oracle International Corporation Enterprise web mining system and method
US6876992B1 (en) * 2000-11-28 2005-04-05 Willis North America Inc. Method and system for risk control optimization
US6671773B2 (en) * 2000-12-07 2003-12-30 Spinnaker Networks, Llc Method and system for responding to file system requests
US7249089B2 (en) * 2000-12-29 2007-07-24 Hartford Fire Insurance Company Method and system for auctioning bankruptcy assets and valuing same
US6996811B2 (en) * 2001-01-22 2006-02-07 Hitachi, Ltd. Method for creating a performance model of an application program adjusted with an execution result of the application program
US6757689B2 (en) * 2001-02-02 2004-06-29 Hewlett-Packard Development Company, L.P. Enabling a zero latency enterprise
US7167837B1 (en) * 2001-04-16 2007-01-23 Ft Interactive Data Corporation Fair-value pricing of a financial asset
US7236940B2 (en) * 2001-05-16 2007-06-26 Perot Systems Corporation Method and system for assessing and planning business operations utilizing rule-based statistical modeling
US7246080B2 (en) * 2001-06-08 2007-07-17 International Business Machines Corporation Apparatus, system and method for measuring and monitoring supply chain risk
US7242856B2 (en) * 2001-11-30 2007-07-10 Sony Corporation Data transfer apparatus and data transfer method
US7272617B1 (en) * 2001-11-30 2007-09-18 Ncr Corp. Analytic data set creation for modeling in a customer relationship management system
US20030176931A1 (en) * 2002-03-11 2003-09-18 International Business Machines Corporation Method for constructing segmentation-based predictive models
US7080207B2 (en) * 2002-04-30 2006-07-18 Lsi Logic Corporation Data storage apparatus, system and method including a cache descriptor having a field defining data in a cache block
US7272820B2 (en) * 2002-12-12 2007-09-18 Extrapoles Pty Limited Graphical development of fully executable transactional workflow applications with adaptive high-performance capacity
US7409357B2 (en) * 2002-12-20 2008-08-05 Accenture Global Services, Gmbh Quantification of operational risks
US7251582B2 (en) * 2003-01-24 2007-07-31 Rolls-Royce, Plc Fault diagnosis
US7249004B2 (en) * 2003-02-28 2007-07-24 3M Innovative Properties Company Mill roll analysis system
US7283982B2 (en) * 2003-12-05 2007-10-16 International Business Machines Corporation Method and structure for transform regression

Cited By (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050119922A1 (en) * 1997-01-06 2005-06-02 Eder Jeff S. Method of and system for analyzing, modeling and valuing elements of a business enterprise
US10839321B2 (en) 1997-01-06 2020-11-17 Jeffrey Eder Automated data storage system
US20020038217A1 (en) * 2000-04-07 2002-03-28 Alan Young System and method for integrated data analysis and management
US20040193503A1 (en) * 2000-10-04 2004-09-30 Eder Jeff Scott Interactive sales performance management system
US7398271B1 (en) 2001-04-16 2008-07-08 Yahoo! Inc. Using network traffic logs for search enhancement
US20080270404A1 (en) * 2001-04-16 2008-10-30 Arkady Borkovsky Using Network Traffic Logs for Search Enhancement
US20080270484A1 (en) * 2001-04-16 2008-10-30 Arkady Borkovsky Using Network Traffic Logs for Search Enhancement
US7996397B2 (en) 2001-04-16 2011-08-09 Yahoo! Inc. Using network traffic logs for search enhancement
US8203952B2 (en) 2001-04-16 2012-06-19 Yahoo! Inc. Using network traffic logs for search enhancement
US7246080B2 (en) * 2001-06-08 2007-07-17 International Business Machines Corporation Apparatus, system and method for measuring and monitoring supply chain risk
US20020188496A1 (en) * 2001-06-08 2002-12-12 International Business Machines Coporation Apparatus, system and method for measuring and monitoring supply chain risk
US20020198750A1 (en) * 2001-06-21 2002-12-26 Innes Bruce Donald Risk management application and method
US10346926B2 (en) 2002-09-09 2019-07-09 Xenogenic Development Llc Context search system
US10719888B2 (en) 2002-09-09 2020-07-21 Xenogenic Development Limited Liability Company Context search system
US20050097065A1 (en) * 2002-10-11 2005-05-05 Vivecon Corporation System and method for analyzing relationships between sourcing variables
US20040098300A1 (en) * 2002-11-19 2004-05-20 International Business Machines Corporation Method, system, and storage medium for optimizing project management and quality assurance processes for a project
US20040177335A1 (en) * 2003-03-04 2004-09-09 International Business Machines Corporation Enterprise services application program development model
US20050021380A1 (en) * 2003-07-25 2005-01-27 Taylor Stephen W. Strategic level quality assurance system for business development
US7707511B2 (en) 2003-11-18 2010-04-27 Gary Edward Peterson Interactive risk management system and method
US20050108080A1 (en) * 2003-11-18 2005-05-19 Peterson Gary E. Interactive risk management system and method
US20050108083A1 (en) * 2003-11-18 2005-05-19 Peterson Gary E. Interactive risk management system and method
US20090043637A1 (en) * 2004-06-01 2009-02-12 Eder Jeffrey Scott Extended value and risk management system
US7533092B2 (en) 2004-10-28 2009-05-12 Yahoo! Inc. Link-based spam detection
US20060095416A1 (en) * 2004-10-28 2006-05-04 Yahoo! Inc. Link-based spam detection
US20060206405A1 (en) * 2005-03-11 2006-09-14 Scott Gambill Gambill stock oscillator
US8713025B2 (en) 2005-03-31 2014-04-29 Square Halt Solutions, Limited Liability Company Complete context search system
US20060229921A1 (en) * 2005-04-08 2006-10-12 Mr. Patrick Colbeck Business Control System
WO2006119239A3 (en) * 2005-04-29 2009-04-16 Millennium Ventures Group System and method for generating and evaluating an innovation
US20060247943A1 (en) * 2005-04-29 2006-11-02 Millennium Ventures Group System and method for generating and evaluating an innovation
US20080167936A1 (en) * 2005-04-29 2008-07-10 Millennium Ventures Group System and Method for Generating and Evaluating an Innovation
WO2006119239A2 (en) * 2005-04-29 2006-11-09 Millennium Ventures Group System and method for generating and evaluating an innovation
US7624054B2 (en) * 2005-08-25 2009-11-24 Sas Institute Inc. Financial risk mitigation optimization systems and methods
US20070050282A1 (en) * 2005-08-25 2007-03-01 Sas Institute Inc. Financial risk mitigation optimization systems and methods
US20070100724A1 (en) * 2005-11-03 2007-05-03 Hollas Judd E Electronic enterprise capital marketplace and monitoring apparatus and method
US7698188B2 (en) 2005-11-03 2010-04-13 Beta-Rubicon Technologies, Llc Electronic enterprise capital marketplace and monitoring apparatus and method
WO2007055919A3 (en) * 2005-11-03 2007-11-08 Beta Rubicon Technologies Llc Electronic enterprise capital marketplace and monitoring apparatus and method
US20070192236A1 (en) * 2006-02-02 2007-08-16 Sun Microsystems, Inc. IT risk management framework and methods
US10083481B2 (en) * 2006-02-02 2018-09-25 Oracle America, Inc. IT risk management framework and methods
US8429177B2 (en) * 2006-02-08 2013-04-23 Yahoo! Inc. Using exceptional changes in webgraph snapshots over time for internet entity marking
US20070198603A1 (en) * 2006-02-08 2007-08-23 Konstantinos Tsioutsiouliklis Using exceptional changes in webgraph snapshots over time for internet entity marking
US10783526B2 (en) 2006-12-19 2020-09-22 Celeritasworks, Llc Campaign awareness management systems and methods
US10339539B2 (en) 2006-12-19 2019-07-02 Celeritasworks, Llc Campaign awareness management systems and methods
US20080154700A1 (en) * 2006-12-19 2008-06-26 Celeritasworks, Llc Campaign awareness management systems and methods
US7930290B2 (en) * 2007-01-12 2011-04-19 Microsoft Corporation Providing virtual really simple syndication (RSS) feeds
US20080172370A1 (en) * 2007-01-12 2008-07-17 Microsoft Corporation Providing virtual really simple syndication (rss) feeds
US20100257123A1 (en) * 2007-02-13 2010-10-07 Sohail Abdul-Rahim Abdulla Jaffar Al Zarawani System and method for just-in-time captial investment and controlled cost insurance
WO2008101004A1 (en) * 2007-02-13 2008-08-21 Sohail Jaffar Zarawani System and method for just-in-time capital investment and controlled cost insurance
US20080195542A1 (en) * 2007-02-13 2008-08-14 Al Zarawani Sohail Abdul-Rahim System and method for just-in-time capital investment and controlled cost insurance
US8290986B2 (en) 2007-06-27 2012-10-16 Yahoo! Inc. Determining quality measures for web objects based on searcher behavior
US20090006357A1 (en) * 2007-06-27 2009-01-01 Alexandrin Popescul Determining quality measures for web objects based on searcher behavior
US20090013033A1 (en) * 2007-07-06 2009-01-08 Yahoo! Inc. Identifying excessively reciprocal links among web entities
US20090030761A1 (en) * 2007-07-09 2009-01-29 Infosys Technologies Ltd. Predicting financial impact of business framework
US20090222415A1 (en) * 2008-03-03 2009-09-03 Hitachi, Ltd. Evaluating risk of information mismanagement in computer storage
US8407118B1 (en) * 2008-03-31 2013-03-26 Intuit Inc. Method and system for generating an economic indicator using aggregated financial data
US20090292546A1 (en) * 2008-05-20 2009-11-26 Aleixo Jeffrey A Human Resources Employment Method
US8788247B2 (en) * 2008-08-20 2014-07-22 International Business Machines Corporation System and method for analyzing effectiveness of distributing emergency supplies in the event of disasters
US20100049485A1 (en) * 2008-08-20 2010-02-25 International Business Machines Corporation System and method for analyzing effectiveness of distributing emergency supplies in the event of disasters
US20110016058A1 (en) * 2009-07-14 2011-01-20 Pinchuk Steven G Method of predicting a plurality of behavioral events and method of displaying information
US8688501B2 (en) * 2010-01-20 2014-04-01 International Business Machines Corporation Method and system enabling dynamic composition of heterogenous risk models
US20110178949A1 (en) * 2010-01-20 2011-07-21 International Business Machines Corporation Method and system enabling dynamic composition of heterogenous risk models
US8566745B2 (en) * 2010-10-29 2013-10-22 Hewlett-Packard Development Company, L.P. Method and system for project and portfolio management
US20120110504A1 (en) * 2010-10-29 2012-05-03 Claudio Bartolini Method and system for project and portfolio management
US10360527B2 (en) * 2010-11-10 2019-07-23 International Business Machines Corporation Casual modeling of multi-dimensional hierarchical metric cubes
US20130282429A1 (en) * 2011-02-25 2013-10-24 Research & Business Foundation Sungkyunkwan University Apparatus and method for context based activity modeling
US10146954B1 (en) 2012-06-11 2018-12-04 Quest Software Inc. System and method for data aggregation and analysis
US20140244343A1 (en) * 2013-02-22 2014-08-28 Bank Of America Corporation Metric management tool for determining organizational health
US9594907B2 (en) 2013-03-14 2017-03-14 Sas Institute Inc. Unauthorized activity detection and classification
US9231979B2 (en) * 2013-03-14 2016-01-05 Sas Institute Inc. Rule optimization for classification and detection
US20140282856A1 (en) * 2013-03-14 2014-09-18 Sas Institute Inc. Rule optimization for classification and detection
US11334941B2 (en) * 2013-03-15 2022-05-17 Capital One Services, Llc Systems and computer-implemented processes for model-based underwriting
US20140358745A1 (en) * 2013-06-04 2014-12-04 LedgerPal Inc. Automated accounting method
US10242407B1 (en) 2013-09-24 2019-03-26 Innovative Market Analysis, LLC Financial instrument analysis and forecast
US20150154695A1 (en) * 2013-12-03 2015-06-04 Mastercard International Corporation Forecasting lagged current transactions based on prior transactions
US20190009923A1 (en) * 2014-11-10 2019-01-10 Federal Express Corporation Risk assessment framework
US11299290B2 (en) 2014-11-10 2022-04-12 Federal Express Corporation Risk assessment framework
US10647443B2 (en) * 2014-11-10 2020-05-12 Federal Express Corporation Risk assessment framework
US11338934B2 (en) 2014-11-10 2022-05-24 Federal Express Corporation Risk assessment framework
US11897625B2 (en) 2014-11-10 2024-02-13 Federal Express Corporation Risk assessment framework
US10326748B1 (en) 2015-02-25 2019-06-18 Quest Software Inc. Systems and methods for event-based authentication
US10417613B1 (en) 2015-03-17 2019-09-17 Quest Software Inc. Systems and methods of patternizing logged user-initiated events for scheduling functions
US9990506B1 (en) 2015-03-30 2018-06-05 Quest Software Inc. Systems and methods of securing network-accessible peripheral devices
US10140466B1 (en) 2015-04-10 2018-11-27 Quest Software Inc. Systems and methods of secure self-service access to content
US10536352B1 (en) 2015-08-05 2020-01-14 Quest Software Inc. Systems and methods for tuning cross-platform data collection
US10218588B1 (en) 2015-10-05 2019-02-26 Quest Software Inc. Systems and methods for multi-stream performance patternization and optimization of virtual meetings
US10157358B1 (en) 2015-10-05 2018-12-18 Quest Software Inc. Systems and methods for multi-stream performance patternization and interval-based prediction
US10142391B1 (en) 2016-03-25 2018-11-27 Quest Software Inc. Systems and methods of diagnosing down-layer performance problems via multi-stream performance patternization
US10855625B1 (en) * 2016-05-11 2020-12-01 Workato, Inc. Intelligent, adaptable, and trainable bot that orchestrates automation and workflows across multiple applications
CN111344722A (en) * 2017-05-01 2020-06-26 高盛公司有限责任公司 System and method for scene simulation
TWI664598B (en) * 2017-05-23 2019-07-01 第一商業銀行股份有限公司 Financial service method with point of sale terminal
US11250520B2 (en) * 2017-06-27 2022-02-15 Fin Box Technologies, Inc. Methods and systems for efficient delivery of accounting and corporate planning services
US10803533B2 (en) * 2017-06-27 2020-10-13 Fin Box Technologies, Inc. Methods and systems for efficient delivery of accounting and corporate planning services
US11393045B2 (en) * 2017-06-27 2022-07-19 Fin Box Technologies, Inc. Methods and systems for efficient delivery of accounting and corporate planning services
TWI699727B (en) * 2018-12-25 2020-07-21 財團法人商業發展研究院 Apparatus and method for estimate fund risk
US11461726B2 (en) * 2019-01-21 2022-10-04 Adp, Inc. Business insight generation system
US11216742B2 (en) 2019-03-04 2022-01-04 Iocurrents, Inc. Data compression and communication using machine learning
US11468355B2 (en) 2019-03-04 2022-10-11 Iocurrents, Inc. Data compression and communication using machine learning
US11661195B2 (en) 2019-03-13 2023-05-30 Federal Express Corporation Mitigating operational risk in aircraft
CN113516333A (en) * 2021-03-10 2021-10-19 福建省农村信用社联合社 Performance test method and system based on precision service model
US20220366342A1 (en) * 2021-04-16 2022-11-17 Tata Consultancy Services Limited Method and system for providing intellectual property adoption recommendations to an enterprise

Also Published As

Publication number Publication date
US20120303408A1 (en) 2012-11-29
US20090132448A1 (en) 2009-05-21
US20060143115A1 (en) 2006-06-29
US20080288394A1 (en) 2008-11-20
US8185486B2 (en) 2012-05-22
US20090070182A1 (en) 2009-03-12
US20040236673A1 (en) 2004-11-25
US20130132163A1 (en) 2013-05-23
US20060184570A1 (en) 2006-08-17
US20060184449A1 (en) 2006-08-17
US8694455B2 (en) 2014-04-08

Similar Documents

Publication Publication Date Title
US8185486B2 (en) Segmented predictive model system
US7873567B2 (en) Value and risk management system
US10839321B2 (en) Automated data storage system
US8498915B2 (en) Data processing framework for financial services
US20160239919A1 (en) Predictive model development system applied to organization management
US20050251468A1 (en) Process management system
US20050144106A1 (en) Method of and system for defining and measuring the real options of a commercial enterprise
US20160171398A1 (en) Predictive Model Development System Applied To Enterprise Risk Management
US20080027841A1 (en) System for integrating enterprise performance management
US6321205B1 (en) Method of and system for modeling and analyzing business improvement programs
US20080015871A1 (en) Varr system
US7580848B2 (en) Method of and system for analyzing, modeling and valuing elements of a business enterprise
US7523065B2 (en) Risk transfer supply chain system
US20010034628A1 (en) Detailed method of and system for modeling and analyzing business improvement programs
US20010041995A1 (en) Method of and system for modeling and analyzing business improvement programs
US20080004922A1 (en) Detailed method of and system for modeling and analyzing business improvement programs
US20050119922A1 (en) Method of and system for analyzing, modeling and valuing elements of a business enterprise
US20090030771A1 (en) Performance management platform
US20040215495A1 (en) Method of and system for defining and measuring the elements of value and real options of a commercial enterprise
US7970640B2 (en) Purchasing optimization system
Kuzhda Lectures on discipline “Economic forecasting” for the students of the speciality 073 “Management”(full-time study bachelors)
Van der Walt A materials management information system (MMIS) in a steel industry
mySAP et al. 5.1 General Overview

Legal Events

Date Code Title Description
AS Assignment

Owner name: ASSET TRUST, INC.,WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EDER, JEFF S;REEL/FRAME:016239/0297

Effective date: 20050708

Owner name: ASSET TRUST, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EDER, JEFF S;REEL/FRAME:016239/0297

Effective date: 20050708

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: ASSET RELIANCE, INC., WASHINGTON

Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:EDER, JEFF;REEL/FRAME:031909/0921

Effective date: 20120623

AS Assignment

Owner name: EDER, JEFFREY, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ASSET RELIANCE INC;REEL/FRAME:040639/0394

Effective date: 20161214