SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Private & Confidential
ZIGRAMData {Assets. Science. Experts}
Z
Private & Confidential
Z Zeno Founder of the Stoic school of philosophy
I Issac Asimov Finest writer & creator of Science Fiction
G Sir Francis Galton One of the greatest polymaths of our time
R S. Ramanujan Famous mathematician with almost no formal training
A Augustus Founder of the Roman Empire and Pax Romana
M John McCarthy Computer scientist known as the ‘Father of AI’
Private & Confidential
What is ZIGRAM?
ZIGRAM is a high impact organization which operates in
the Data Asset space.
Our team is made up of professionals from varied
domains like data science, technology, sales, financial
services, research and business consulting.
Our aim is to deliver value to clients by Building and
Managing Data Assets across use cases - thereby
boosting revenues and reducing the cost of doing
business, in a data driven world.
Private & Confidential
A Data Asset is a structured, comprehensive
and validated database of information which
is built and maintained for a specific use case
or in response to a problem
Comprehensive
Built-For-Purpose
Validated
Structured
What is a Data Asset?
Gold Standard or
Reference Data
Data Asset {
Private & Confidential
Data So? The Answer
Why are Data Assets Important?
Banks & FIs suffer frauds
due to lack of data,
monitoring and timely alerts
Private & Confidential
DIKW Players
Spend billions of dollars
Employ over 400,000 resources
And yet struggle to maintain and develop data
assets projects
$3 Trillion
Impact of bad data in 2016
In a report by IBM, the estimated annual
cost of poor quality data has reached
$3.1 Trillion annually, just in the US alone
For
Customers
For The
Ecosystem
The Pain Point
DIKW {Data, Information, Knowledge & Wisdom}
Private & Confidential
Who are our Customers?
Data Information Knowledge Wisdom
Market Statistics
Market Survey
Database Providers
Marketing Data
Advertising Data
Credit Rating Companies
Financial Market Data
Risk Data Providers
Health Data Providers
Background Check Vendors
Big 4 Accounting Firms
Financial Consulting Firms
Market Research
Brand Research
Generic Consulting Firms
Management Consulting
M&A Firms
Specialist Advisors
PR Firms
Qualitative Insights
Private & Confidential
I
II
Data Asset
Technology
Data Asset
Services
Applications created by using multiple technologies including automation, analytics,
machine learning and AI to help build Data Assets – Faster, Cheaper and Better
Executing process and operations across the Data Asset Lifecycle by deploying
experienced resources, subject matter experts and specialists – from
Conceptualization to Delivery
What do we do?
Private & Confidential
I Data Asset
Technology
Applications created by using multiple technologies including automation, analytics,
machine learning and AI to help build Data Assets – Faster, Cheaper and Better
Building applications & leveraging technologies
Development
Maintenance
Enhancement
Enrichment
 Regular Expressions
 Translation & Transliteration
 Source Assessment
 Scraping and Crawlers
 Data Dictionary
 AI / Machine Learning
 Testing Methodologies
 Workflow Automation
 Profile Development
 NLP
 Link Extraction
 Statistical Testing
 Validation Methodologies
 Master Structures
 Scaling Techniques
 Cloud Services
 External Integrations
 Application Development
Technology Solutions for Data Asset Projects
Data Asset Technology
Private & Confidential
II Data Asset
Services
Executing process and operations across the Data Asset Lifecycle by deploying
experienced resources, subject matter experts and specialists – from
Conceptualization to Delivery
Our team has demonstratable
capabilities and skill sets required
to develop and manage data
asset projects across use cases
and industries for clients globally.
 Research
 Process Development
 Analytics
 Reports & MIS
 Project Management
Executing projects and delivering value
Data Asset Services
Private & Confidential
Politically Exposed Persons
1.2+ Million
Building and maintenance of a global database of PEPs
done across 240 Countries & Jurisdictions covering 30
Languages
Suspected Players Online
200,000+
Negative news of the online space – Websites linked to
individuals & entities covering IP theft, OC, human-trafficking,
terrorism etc.
Marijuana Related Businesses
55,000+
US and Canada list for Marijuana business across the
supply chain
Rogue Mobile Apps
10,000+
Identification of mobile applications which contravene
regulations and client’s brand & acceptable usage
High Risk Correspondent Banks
3000+
Research and updation of global correspondent banking
relationships
Slavery & Human Trafficking
Global
Conceptualization to framework development of a
database related to slavery associated individuals &
companies
Anti-Corruption Referral Directory
10,000+
Development of Anti-Corruption referral directory on Civil
Servants for the UN in India
Ports & Vessels
4000+
Development of TBML information related to sanctions,
sea ports and vessels
Entertainment
100,000+
Development of a Best-In-Class Region focused
Entertainment Data Asset
EDD Reports
Africa, Middle East & Asia
Research reports on clients
Correspondent Banks
15,000+
Research and updation of global correspondent banking
relationships
Civil Servants
500,000+
Database of Civil Servants (other than PEPs)
Team Experience in Data Assets
Private & Confidential
Research &
Operations
Data Science Technology Representation
+ Profile Development
+ Online Research
+ Data Projects
+ Data Asset Framework
+ Remediation
+ Enhancement
+ Enrichment
+ Maintenance
+ Analytics
+ Machine Learning
+ NLP
+ Deep Learning
+ Statistical Testing
+ Automation
+ Application Development
+ Cloud Technology
+ APIs
+ Data Architecture
+ Extraction/Mining
+ Scrapers & Crawlers
+ External Services
+ Dashboards
+ Visual Analytics
+ Relationship Maps
+ Reporting
Core Data
Insights &
Efficiency
Delivery &
Deployment
Reporting &
Showcasing
Capabilities
Building the right mix of skills and resources
Private & Confidential
“Our vision is to integrate our products
and services in DIKW organizations
globally, to help solve real world
problems by leveraging Data Assets”
DIKW {Data, Information, Knowledge & Wisdom}
Private & Confidential
Use Cases
Snapshot of Data Asset projects
Private & Confidential
Marijuana Related
Businesses (MRB)
Facial Recognition
Security
HSN Codes
Tax & Trade DiligenceOutreach
Inside Sales
Risk & Compliance
AML Zone
Current Focus Areas
$
Private & Confidential
The Harmonized Commodity
Description and Coding System
generally refers to “Harmonized
System of Nomenclature” or simply
“HSN”. It has been developed by the
World Customs Organization (WCO).
HSN Codes
Tax & Trade
The Need
HSN is applicable in India after
implementation of GST. The code is critical
for businesses to be able to adhere with the
GST norms and avoid penalties
Drivers
- HSN is applicable post GST
- Confusion & ambiguity in relevant codes
- Claiming input credit tax
- Tax liability and penalties
End Users
- Global MNCs in India
- Export and Import companies
- Tax advisors & consultants
09024020 is the code for Black Tea sold
as leaf in bulk, where 09 is the Chapter,
02 is the heading and 40 is the product
code for Black Tea.
10 Million Combinations (5000 codes)
1.3 Million GST professionals
The last 2 digits of 20 is code allotted
by Indian taxation system for Black
Tea sold in leaf form and in bulk.
Had it been Black Tea bags then the
last two digits of the HSN code would
have been replaced with 40 instead
of 20.
HSN Codes
Private & Confidential
A database containing images &
profiles of RSCI entities (Religious,
Social & Culturally Important
Individuals) to aid a facial recognition
software in identifying, recognising
and providing information about
these individuals
Facial Recognition
Facial Recognition
The Need
Organizations need reference images and
profile details about an important individual
so that they may be able to identify, preempt
or act based on Facial Recognition triggers
Drivers
- Security and Risk
- KYC and Customer Loyalty Programs
- Facility Risk
- Authentication via Online Channels
End Users
- Banks & Financial Institutions
- Law Enforcement
- Airports & Casinos
- Events & Retail
400K RSCI Profiles
Market Size ~ $7.5 Billion
Area of Deployment
Generic facial recognition framework and
process
Facial Recognition
Private & Confidential
Developing and delivering primed
account data assets for specific end-
customer requirements, along with
insights, KPIs and predictive
analytics with the aim to increase
conversion, ticket size and traction.
Inside Sales
Sales & Marketing
The Need
To reduce the cost of sales, customer
acquisition and increase CLV, organizations
globally have started using Inside Sales as
the primary methodology of sales
Drivers
- Increasing Sales Costs
- Targeting small and SME entities
- Need to educate and engage prior to sales
- Making smaller ticket size sales, viable
End Users
- SAS Organizations with SME target Market
- Organizations selling product bundles
Target 1.5 Million SMEs in India
$30B Inside Sales Market Size
Inside Sales requires high quality data, good
context and a tech enabled ecosystem
Inside Sales
Private & Confidential
Developed to give the global AML
professional an analytics based,
comprehensive and easy to
reference resource for AML cases,
penalties & actions.
$
AML Data Asset
Risk & Compliance
100+ focus countries
AML timeline stretching back 50+ years
15,000+ AML cases
The Need
Adequate coverage, overview and
oversight of specific AML based risks
related to individuals and organizations
Drivers
- Need for validated information
- Screening & Due Diligence on third parties
- Correspondent banking based risk
- Risk based assessment requirements
End Users
- Banks & Financial Institutions
- Risk & Compliance Professionals
- Regulatory and Government Agencies
150K AML Professionals
AML Zone
Private & Confidential
MRB Data Asset is being developed
to be the most comprehensive and
detailed database of Marijuana-
Related Businesses (“MRBs”) and
their related Ultimate Beneficial
Owners (“UBOs”).
Marijuana Related
Businesses (MRB)
Diligence
31 Legal Medical Marijuana States & DC
9 Legal Recreational Marijuana States & DC
150K Estimated MRB Profiles
The Need
For organizations to screen, identify and
act in the event of an MRB customer/third
party
Drivers
- Rapidly changing regulation
- Legalization for medical & other users
- Difference between federal & state laws
- Client specific risk appetite
End Users
- Banks & Financial Institutions
- Investors & Marketing Agencies
- Regulatory and Government Agencies
- Aggregators & B2B service providers
Legal MRB Market ~ $5 Billion
Marijuana Related Businesses
Private & Confidential
Products
Tools & Applications
Private & Confidential
Profile Builder
Performance Visual Analytics Process Management Extraction Machine Learning Integrations
EnhancedCoverage
EfficientMaintenance
TimeReduction
CurrentTechnology
Pipeline
More comprehensive coverage and completion rates for PEPs and
Associations, globally
Maintain 100% of PEPs by addressing the issue of unsustainable backlog
Upfront, reduce time by a third to build PEP profiles and ensure ongoing
efficiency
PROFILE BUILDER is an application
designed to manage PEP data asset
maintenance and development by
leveraging:
 Technology driven workflows
 Embedded Data Asset operations processes
 Automation of extraction of sources and content
 Machine learning
 End-to-end project management
Fully Featured. With the right context
Built on the Azure cloud with .Net, Python & HTML/CSS, with ML, NLP,
proxy and scraping services integrated
Private & Confidential
Research Optimization
Built for institutions who want a solution to manage
their entire research, risk and compliance process
Designed for individual researchers and teams who
want a seamless low cost solution to initiate research
- Financial Institutions
- Risk focused teams
- Vendor & supply chain departments
- Government Agencies
- Consultants & Advisors
- Educational institutions
- Hiring and Executive search
- Data Asset development teams
Use-case specific
algorithms for global search
on individuals, businesses &
events
Machine learning driven
search to provide 50%+
time savings
Workflow automation
integrated with NLP, tools,
templates and intelligent
services
1 2 3
Private & Confidential
Contact
bali@zigram.tech
Linkedin/zigram
http://www.zigram.tech/
https://twitter.com/ZigramT
© Zigram Data Technologies Private Limited 2019.
All information contained in this presentation is the IP of ZIGRAM. This presentation is meant only for the recipient. No part
of this document may be reproduced / shared / divulged or referred to in part or in full without the prior written consent of
ZIGRAM. The ideas / views presented in this document are those of ZIGRAM and may not be replicated or used without the
written consent of ZIGRAM. While considerable care has been taken in gathering the thoughts/ information included in this
document, ZIGRAM has not validated such information and hence does not confirm accuracy of such information. This
document is preliminary in nature and is purely indicative of the approach recommended by ZIGRAM.

Weitere Àhnliche Inhalte

Was ist angesagt?

Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow) Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow) Lalit Jain
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensicspranjal dutta
 
Tor Presentation
Tor PresentationTor Presentation
Tor PresentationHassan Faraz
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
UNIT2-Data Mining.pdf
UNIT2-Data Mining.pdfUNIT2-Data Mining.pdf
UNIT2-Data Mining.pdfNancykumari47
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websitesm srikanth
 
Pulse Doppler Radar
Pulse Doppler RadarPulse Doppler Radar
Pulse Doppler RadarAkhilesh Arora
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksAshish Arora
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Email security
Email securityEmail security
Email securityBaliram Yadav
 
Digital Asset Management: Intro & Career Path for Librarians
Digital Asset Management: Intro & Career Path for LibrariansDigital Asset Management: Intro & Career Path for Librarians
Digital Asset Management: Intro & Career Path for LibrariansLaura Fu
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 

Was ist angesagt? (20)

Ids(final)
Ids(final)Ids(final)
Ids(final)
 
Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow) Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow)
 
Steganography
SteganographySteganography
Steganography
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
UNIT2-Data Mining.pdf
UNIT2-Data Mining.pdfUNIT2-Data Mining.pdf
UNIT2-Data Mining.pdf
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Pulse Doppler Radar
Pulse Doppler RadarPulse Doppler Radar
Pulse Doppler Radar
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Email security
Email securityEmail security
Email security
 
Digital Asset Management: Intro & Career Path for Librarians
Digital Asset Management: Intro & Career Path for LibrariansDigital Asset Management: Intro & Career Path for Librarians
Digital Asset Management: Intro & Career Path for Librarians
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 

Ähnlich wie Zigram (Introduction) Feb 2019

Zigram Introduction
Zigram IntroductionZigram Introduction
Zigram IntroductionAbhishek Bali
 
Data Assets & Services - BMR Advisors
Data Assets & Services - BMR AdvisorsData Assets & Services - BMR Advisors
Data Assets & Services - BMR AdvisorsAbhishek Bali
 
ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM
 
How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015Ihor Malchenyuk
 
Fintech summit 2016 thomson reuters tim baker_presentation final
Fintech summit 2016 thomson reuters tim baker_presentation finalFintech summit 2016 thomson reuters tim baker_presentation final
Fintech summit 2016 thomson reuters tim baker_presentation finalGlen Frost
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM
 
Welcome To The World Mira
Welcome To The World MiraWelcome To The World Mira
Welcome To The World MiraSaumya Gandhi
 
MMRS Panel Book B2B
MMRS Panel Book B2BMMRS Panel Book B2B
MMRS Panel Book B2BABHISEKH SINGH
 
Cases for Financial Market
Cases for Financial MarketCases for Financial Market
Cases for Financial MarketKarina Matos
 
China Data Bank | China-Focused Big Data Solution
China Data Bank | China-Focused Big Data SolutionChina Data Bank | China-Focused Big Data Solution
China Data Bank | China-Focused Big Data SolutionOctoPlus Media Global Limited
 
Artificial intelligence & Machine learning role in financial services
Artificial intelligence & Machine learning role in financial servicesArtificial intelligence & Machine learning role in financial services
Artificial intelligence & Machine learning role in financial servicesPrudhvi Parne
 
Future space solution_briefing
Future space solution_briefingFuture space solution_briefing
Future space solution_briefingJuanjo MARTINEZ PAGAN
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
BMR Advisors | Financial Crimes Compliance Services
BMR Advisors | Financial Crimes Compliance ServicesBMR Advisors | Financial Crimes Compliance Services
BMR Advisors | Financial Crimes Compliance ServicesAbhishek Bali
 
The Datascension Advantage 2012
The Datascension Advantage   2012The Datascension Advantage   2012
The Datascension Advantage 2012mantoine77
 

Ähnlich wie Zigram (Introduction) Feb 2019 (20)

Zigram Introduction
Zigram IntroductionZigram Introduction
Zigram Introduction
 
Data Assets & Services - BMR Advisors
Data Assets & Services - BMR AdvisorsData Assets & Services - BMR Advisors
Data Assets & Services - BMR Advisors
 
ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019
 
How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015
 
Fintech summit 2016 thomson reuters tim baker_presentation final
Fintech summit 2016 thomson reuters tim baker_presentation finalFintech summit 2016 thomson reuters tim baker_presentation final
Fintech summit 2016 thomson reuters tim baker_presentation final
 
Karza Technologies
Karza TechnologiesKarza Technologies
Karza Technologies
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020
 
Welcome To The World Mira
Welcome To The World MiraWelcome To The World Mira
Welcome To The World Mira
 
MMRS Panel Book B2B
MMRS Panel Book B2BMMRS Panel Book B2B
MMRS Panel Book B2B
 
Cases for Financial Market
Cases for Financial MarketCases for Financial Market
Cases for Financial Market
 
China Data Bank | China-Focused Big Data Solution
China Data Bank | China-Focused Big Data SolutionChina Data Bank | China-Focused Big Data Solution
China Data Bank | China-Focused Big Data Solution
 
Media kit way2
Media kit way2Media kit way2
Media kit way2
 
Artificial intelligence & Machine learning role in financial services
Artificial intelligence & Machine learning role in financial servicesArtificial intelligence & Machine learning role in financial services
Artificial intelligence & Machine learning role in financial services
 
Future space solution_briefing
Future space solution_briefingFuture space solution_briefing
Future space solution_briefing
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
BMR Advisors | Financial Crimes Compliance Services
BMR Advisors | Financial Crimes Compliance ServicesBMR Advisors | Financial Crimes Compliance Services
BMR Advisors | Financial Crimes Compliance Services
 
The 10 best performing regtech solution providers
The 10 best performing regtech solution providersThe 10 best performing regtech solution providers
The 10 best performing regtech solution providers
 
The Datascension Advantage 2012
The Datascension Advantage   2012The Datascension Advantage   2012
The Datascension Advantage 2012
 

Mehr von ZIGRAM

AML Penalties Intro Deck
AML Penalties Intro Deck AML Penalties Intro Deck
AML Penalties Intro Deck ZIGRAM
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM
 
AML Penalties Closed Beta 7 June 2021
AML Penalties Closed Beta 7 June 2021AML Penalties Closed Beta 7 June 2021
AML Penalties Closed Beta 7 June 2021ZIGRAM
 
5 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 20205 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 2020ZIGRAM
 
Program Management Internship ZIGRAM Feb 2020
Program Management Internship ZIGRAM Feb 2020Program Management Internship ZIGRAM Feb 2020
Program Management Internship ZIGRAM Feb 2020ZIGRAM
 
ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM
 
Gender Inequality and Alcohol Consumption
Gender Inequality and Alcohol ConsumptionGender Inequality and Alcohol Consumption
Gender Inequality and Alcohol ConsumptionZIGRAM
 

Mehr von ZIGRAM (7)

AML Penalties Intro Deck
AML Penalties Intro Deck AML Penalties Intro Deck
AML Penalties Intro Deck
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021
 
AML Penalties Closed Beta 7 June 2021
AML Penalties Closed Beta 7 June 2021AML Penalties Closed Beta 7 June 2021
AML Penalties Closed Beta 7 June 2021
 
5 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 20205 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 2020
 
Program Management Internship ZIGRAM Feb 2020
Program Management Internship ZIGRAM Feb 2020Program Management Internship ZIGRAM Feb 2020
Program Management Internship ZIGRAM Feb 2020
 
ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019
 
Gender Inequality and Alcohol Consumption
Gender Inequality and Alcohol ConsumptionGender Inequality and Alcohol Consumption
Gender Inequality and Alcohol Consumption
 

KĂŒrzlich hochgeladen

Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 

KĂŒrzlich hochgeladen (20)

Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 

Zigram (Introduction) Feb 2019

  • 1. Private & Confidential ZIGRAMData {Assets. Science. Experts} Z
  • 2. Private & Confidential Z Zeno Founder of the Stoic school of philosophy I Issac Asimov Finest writer & creator of Science Fiction G Sir Francis Galton One of the greatest polymaths of our time R S. Ramanujan Famous mathematician with almost no formal training A Augustus Founder of the Roman Empire and Pax Romana M John McCarthy Computer scientist known as the ‘Father of AI’
  • 3. Private & Confidential What is ZIGRAM? ZIGRAM is a high impact organization which operates in the Data Asset space. Our team is made up of professionals from varied domains like data science, technology, sales, financial services, research and business consulting. Our aim is to deliver value to clients by Building and Managing Data Assets across use cases - thereby boosting revenues and reducing the cost of doing business, in a data driven world.
  • 4. Private & Confidential A Data Asset is a structured, comprehensive and validated database of information which is built and maintained for a specific use case or in response to a problem Comprehensive Built-For-Purpose Validated Structured What is a Data Asset? Gold Standard or Reference Data Data Asset {
  • 5. Private & Confidential Data So? The Answer Why are Data Assets Important? Banks & FIs suffer frauds due to lack of data, monitoring and timely alerts
  • 6. Private & Confidential DIKW Players Spend billions of dollars Employ over 400,000 resources And yet struggle to maintain and develop data assets projects $3 Trillion Impact of bad data in 2016 In a report by IBM, the estimated annual cost of poor quality data has reached $3.1 Trillion annually, just in the US alone For Customers For The Ecosystem The Pain Point DIKW {Data, Information, Knowledge & Wisdom}
  • 7. Private & Confidential Who are our Customers? Data Information Knowledge Wisdom Market Statistics Market Survey Database Providers Marketing Data Advertising Data Credit Rating Companies Financial Market Data Risk Data Providers Health Data Providers Background Check Vendors Big 4 Accounting Firms Financial Consulting Firms Market Research Brand Research Generic Consulting Firms Management Consulting M&A Firms Specialist Advisors PR Firms Qualitative Insights
  • 8. Private & Confidential I II Data Asset Technology Data Asset Services Applications created by using multiple technologies including automation, analytics, machine learning and AI to help build Data Assets – Faster, Cheaper and Better Executing process and operations across the Data Asset Lifecycle by deploying experienced resources, subject matter experts and specialists – from Conceptualization to Delivery What do we do?
  • 9. Private & Confidential I Data Asset Technology Applications created by using multiple technologies including automation, analytics, machine learning and AI to help build Data Assets – Faster, Cheaper and Better Building applications & leveraging technologies Development Maintenance Enhancement Enrichment  Regular Expressions  Translation & Transliteration  Source Assessment  Scraping and Crawlers  Data Dictionary  AI / Machine Learning  Testing Methodologies  Workflow Automation  Profile Development  NLP  Link Extraction  Statistical Testing  Validation Methodologies  Master Structures  Scaling Techniques  Cloud Services  External Integrations  Application Development Technology Solutions for Data Asset Projects Data Asset Technology
  • 10. Private & Confidential II Data Asset Services Executing process and operations across the Data Asset Lifecycle by deploying experienced resources, subject matter experts and specialists – from Conceptualization to Delivery Our team has demonstratable capabilities and skill sets required to develop and manage data asset projects across use cases and industries for clients globally.  Research  Process Development  Analytics  Reports & MIS  Project Management Executing projects and delivering value Data Asset Services
  • 11. Private & Confidential Politically Exposed Persons 1.2+ Million Building and maintenance of a global database of PEPs done across 240 Countries & Jurisdictions covering 30 Languages Suspected Players Online 200,000+ Negative news of the online space – Websites linked to individuals & entities covering IP theft, OC, human-trafficking, terrorism etc. Marijuana Related Businesses 55,000+ US and Canada list for Marijuana business across the supply chain Rogue Mobile Apps 10,000+ Identification of mobile applications which contravene regulations and client’s brand & acceptable usage High Risk Correspondent Banks 3000+ Research and updation of global correspondent banking relationships Slavery & Human Trafficking Global Conceptualization to framework development of a database related to slavery associated individuals & companies Anti-Corruption Referral Directory 10,000+ Development of Anti-Corruption referral directory on Civil Servants for the UN in India Ports & Vessels 4000+ Development of TBML information related to sanctions, sea ports and vessels Entertainment 100,000+ Development of a Best-In-Class Region focused Entertainment Data Asset EDD Reports Africa, Middle East & Asia Research reports on clients Correspondent Banks 15,000+ Research and updation of global correspondent banking relationships Civil Servants 500,000+ Database of Civil Servants (other than PEPs) Team Experience in Data Assets
  • 12. Private & Confidential Research & Operations Data Science Technology Representation + Profile Development + Online Research + Data Projects + Data Asset Framework + Remediation + Enhancement + Enrichment + Maintenance + Analytics + Machine Learning + NLP + Deep Learning + Statistical Testing + Automation + Application Development + Cloud Technology + APIs + Data Architecture + Extraction/Mining + Scrapers & Crawlers + External Services + Dashboards + Visual Analytics + Relationship Maps + Reporting Core Data Insights & Efficiency Delivery & Deployment Reporting & Showcasing Capabilities Building the right mix of skills and resources
  • 13. Private & Confidential “Our vision is to integrate our products and services in DIKW organizations globally, to help solve real world problems by leveraging Data Assets” DIKW {Data, Information, Knowledge & Wisdom}
  • 14. Private & Confidential Use Cases Snapshot of Data Asset projects
  • 15. Private & Confidential Marijuana Related Businesses (MRB) Facial Recognition Security HSN Codes Tax & Trade DiligenceOutreach Inside Sales Risk & Compliance AML Zone Current Focus Areas $
  • 16. Private & Confidential The Harmonized Commodity Description and Coding System generally refers to “Harmonized System of Nomenclature” or simply “HSN”. It has been developed by the World Customs Organization (WCO). HSN Codes Tax & Trade The Need HSN is applicable in India after implementation of GST. The code is critical for businesses to be able to adhere with the GST norms and avoid penalties Drivers - HSN is applicable post GST - Confusion & ambiguity in relevant codes - Claiming input credit tax - Tax liability and penalties End Users - Global MNCs in India - Export and Import companies - Tax advisors & consultants 09024020 is the code for Black Tea sold as leaf in bulk, where 09 is the Chapter, 02 is the heading and 40 is the product code for Black Tea. 10 Million Combinations (5000 codes) 1.3 Million GST professionals The last 2 digits of 20 is code allotted by Indian taxation system for Black Tea sold in leaf form and in bulk. Had it been Black Tea bags then the last two digits of the HSN code would have been replaced with 40 instead of 20. HSN Codes
  • 17. Private & Confidential A database containing images & profiles of RSCI entities (Religious, Social & Culturally Important Individuals) to aid a facial recognition software in identifying, recognising and providing information about these individuals Facial Recognition Facial Recognition The Need Organizations need reference images and profile details about an important individual so that they may be able to identify, preempt or act based on Facial Recognition triggers Drivers - Security and Risk - KYC and Customer Loyalty Programs - Facility Risk - Authentication via Online Channels End Users - Banks & Financial Institutions - Law Enforcement - Airports & Casinos - Events & Retail 400K RSCI Profiles Market Size ~ $7.5 Billion Area of Deployment Generic facial recognition framework and process Facial Recognition
  • 18. Private & Confidential Developing and delivering primed account data assets for specific end- customer requirements, along with insights, KPIs and predictive analytics with the aim to increase conversion, ticket size and traction. Inside Sales Sales & Marketing The Need To reduce the cost of sales, customer acquisition and increase CLV, organizations globally have started using Inside Sales as the primary methodology of sales Drivers - Increasing Sales Costs - Targeting small and SME entities - Need to educate and engage prior to sales - Making smaller ticket size sales, viable End Users - SAS Organizations with SME target Market - Organizations selling product bundles Target 1.5 Million SMEs in India $30B Inside Sales Market Size Inside Sales requires high quality data, good context and a tech enabled ecosystem Inside Sales
  • 19. Private & Confidential Developed to give the global AML professional an analytics based, comprehensive and easy to reference resource for AML cases, penalties & actions. $ AML Data Asset Risk & Compliance 100+ focus countries AML timeline stretching back 50+ years 15,000+ AML cases The Need Adequate coverage, overview and oversight of specific AML based risks related to individuals and organizations Drivers - Need for validated information - Screening & Due Diligence on third parties - Correspondent banking based risk - Risk based assessment requirements End Users - Banks & Financial Institutions - Risk & Compliance Professionals - Regulatory and Government Agencies 150K AML Professionals AML Zone
  • 20. Private & Confidential MRB Data Asset is being developed to be the most comprehensive and detailed database of Marijuana- Related Businesses (“MRBs”) and their related Ultimate Beneficial Owners (“UBOs”). Marijuana Related Businesses (MRB) Diligence 31 Legal Medical Marijuana States & DC 9 Legal Recreational Marijuana States & DC 150K Estimated MRB Profiles The Need For organizations to screen, identify and act in the event of an MRB customer/third party Drivers - Rapidly changing regulation - Legalization for medical & other users - Difference between federal & state laws - Client specific risk appetite End Users - Banks & Financial Institutions - Investors & Marketing Agencies - Regulatory and Government Agencies - Aggregators & B2B service providers Legal MRB Market ~ $5 Billion Marijuana Related Businesses
  • 22. Private & Confidential Profile Builder Performance Visual Analytics Process Management Extraction Machine Learning Integrations EnhancedCoverage EfficientMaintenance TimeReduction CurrentTechnology Pipeline More comprehensive coverage and completion rates for PEPs and Associations, globally Maintain 100% of PEPs by addressing the issue of unsustainable backlog Upfront, reduce time by a third to build PEP profiles and ensure ongoing efficiency PROFILE BUILDER is an application designed to manage PEP data asset maintenance and development by leveraging:  Technology driven workflows  Embedded Data Asset operations processes  Automation of extraction of sources and content  Machine learning  End-to-end project management Fully Featured. With the right context Built on the Azure cloud with .Net, Python & HTML/CSS, with ML, NLP, proxy and scraping services integrated
  • 23. Private & Confidential Research Optimization Built for institutions who want a solution to manage their entire research, risk and compliance process Designed for individual researchers and teams who want a seamless low cost solution to initiate research - Financial Institutions - Risk focused teams - Vendor & supply chain departments - Government Agencies - Consultants & Advisors - Educational institutions - Hiring and Executive search - Data Asset development teams Use-case specific algorithms for global search on individuals, businesses & events Machine learning driven search to provide 50%+ time savings Workflow automation integrated with NLP, tools, templates and intelligent services 1 2 3
  • 24. Private & Confidential Contact bali@zigram.tech Linkedin/zigram http://www.zigram.tech/ https://twitter.com/ZigramT © Zigram Data Technologies Private Limited 2019. All information contained in this presentation is the IP of ZIGRAM. This presentation is meant only for the recipient. No part of this document may be reproduced / shared / divulged or referred to in part or in full without the prior written consent of ZIGRAM. The ideas / views presented in this document are those of ZIGRAM and may not be replicated or used without the written consent of ZIGRAM. While considerable care has been taken in gathering the thoughts/ information included in this document, ZIGRAM has not validated such information and hence does not confirm accuracy of such information. This document is preliminary in nature and is purely indicative of the approach recommended by ZIGRAM.