Continuous Infrastructure Assessment for Key Business Functions in Changing Environments

Author(s):  
Gabriel A. Weaver ◽  
Tim Yardley ◽  
David P. Emmerich
2020 ◽  
Vol 26 (11) ◽  
pp. 2567-2593
Author(s):  
M.V. Pomazanov

Subject. The study addresses the improvement of risk management efficiency and the quality of lending decisions made by banks. Objectives. The aim is to present the bank management with a fair algorithm for risk management motivation on the one hand, and the credit management (business) on the other hand. Within the framework of the common goal to maximize risk-adjusted income from loans, this algorithm will provide guidelines for ‘risk management’ and ‘business’ functions on how to improve individual and overall efficiency. Methods. The study employs the discriminant analysis, type I and II errors, Lorentz curve modeling, statistical analysis, economic modeling. Results. The paper offers a mechanism for assessing the quality of risk management decisions as opposed to (or in support of) decisions of the lending business when approving transactions. The mechanism rests on the approach of stating type I and II errors and the corresponding classical metric of the Gini coefficient. On the ‘business’ side, the mechanism monitors the improvement or deterioration of the indicator of changes in losses in comparison with the market average. Conclusions. The study substantiates the stimulating ‘rules of the game’ between the ‘business’ and ‘risk management’ to improve the efficiency of the entire business, to optimize interactions within the framework of internal competition. It presents mathematical tools to calculate corresponding indicators of the efficiency of internally competing entities.


Author(s):  
Robert B. Handfield ◽  
Anand Nair

Counterfeiting is a problem many companies do not want to acknowledge or talk about. However, ignoring the problem is likely to have the effect of encouraging counterfeiters to go unchecked. A multilayered strategy that adopts several approaches and engages the entire organization is needed to address the counterfeiting problem. This chapter provides a set of recommendations to address the issue of counterfeiting. Initially, the size of the problem must be estimated and the return on investment approximated. This can help define the need for a team of experts to work in this area, leading to a set of performance metrics that are aligned with business objectives and outcomes. Next, the key focal product segments should be targeted and a system for identifying products through product trademark registration with customs authorities should be completed. In the end, combating counterfeiting is not a supply chain problem, it is not a legal problem, nor is it a packaging and covert marking problem. It is a global problem—one that impacts all organizations, large and small. All business functions need to be part of the discussion, not just a single brand security function. Failure to approach counterfeiting in this manner will simply allow the problem to continue to grow.


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Roberto Rodriguez-Zurrunero ◽  
Ramiro Utrilla ◽  
Elena Romero ◽  
Alvaro Araujo

Wireless Sensor Networks (WSNs) are a growing research area as a large of number portable devices are being developed. This fact makes operating systems (OS) useful to homogenize the development of these devices, to reduce design times, and to provide tools for developing complex applications. This work presents an operating system scheduler for resource-constraint wireless devices, which adapts the tasks scheduling in changing environments. The proposed adaptive scheduler allows dynamically delaying the execution of low priority tasks while maintaining real-time capabilities on high priority ones. Therefore, the scheduler is useful in nodes with rechargeable batteries, as it reduces its energy consumption when battery level is low, by delaying the least critical tasks. The adaptive scheduler has been implemented and tested in real nodes, and the results show that the nodes lifetime could be increased up to 70% in some scenarios at the expense of increasing latency of low priority tasks.


2021 ◽  
Vol 19 ◽  
pp. 752-758
Author(s):  
Aarushi Venkatakrishnan ◽  
Zoie E. Holzknecht ◽  
Rob Holzknecht ◽  
Dawn E. Bowles ◽  
Sanet H. Kotzé ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document