US20040210509A1 - Automated method of and system for identifying, measuring and enhancing categories of value for a value chain - Google Patents

Automated method of and system for identifying, measuring and enhancing categories of value for a value chain Download PDF

Info

Publication number
US20040210509A1
US20040210509A1 US10/743,417 US74341703A US2004210509A1 US 20040210509 A1 US20040210509 A1 US 20040210509A1 US 74341703 A US74341703 A US 74341703A US 2004210509 A1 US2004210509 A1 US 2004210509A1
Authority
US
United States
Prior art keywords
value
systems
organization
block
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/743,417
Inventor
Jeff Eder
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eder Jeffrey
Asset Trust Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/779,109 external-priority patent/US6393406B1/en
Priority claimed from US09/135,983 external-priority patent/US6321205B1/en
Application filed by Individual filed Critical Individual
Priority to US10/743,417 priority Critical patent/US20040210509A1/en
Assigned to VALUEMINER, INC. reassignment VALUEMINER, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EDER, JEFF
Publication of US20040210509A1 publication Critical patent/US20040210509A1/en
Assigned to ASSET TRUST, INC. reassignment ASSET TRUST, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VALUEMINER, INC.
Assigned to ASSET RELIANCE, INC. reassignment ASSET RELIANCE, INC. NUNC PRO TUNC ASSIGNMENT (SEE DOCUMENT FOR DETAILS). Assignors: EDER, JEFF
Assigned to EDER, JEFFREY reassignment EDER, JEFFREY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ASSET RELIANCE INC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • G06Q30/0202Market predictions or forecasting for commercial activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Definitions

  • This invention relates to a method of and system for business valuation, more particularly, to an automated system that identifies, evaluates and helps improve the management of the categories of value for a value chain and for each enterprise in the value chain on a continual basis.
  • the virtual value chain may appear to the consumer as a single entity, when in reality a number of enterprises from different continents have joined together to complete the preparation and delivery of the good or service that is ultimately being purchased.
  • Virtual value chains allow each firm in the value chain to focus on their own specialty, be it manufacturing, design, distribution or marketing while reaping the benefits of the increased scale and scope inherent in the alliance. Enabled by the low cost communication capability provided by the internet, the virtual value chain is really just an extreme form of a phenomenon that has been sweeping American industry for many years—the electronic linkage of businesses.
  • Soft asset management applications include: alliance management systems, brand management systems, customer relationship management systems, channel management systems, intellectual property management systems, process management systems and vendor management systems. While these systems enhance the day to day management of the individual “soft” assets, there is currently no mechanism for integrating the input from each of these different systems in to an overall organization or enterprise asset management system. As a result, the organization or enterprise can be (and often is) faced with conflicting recommendations as each system tries to optimize the asset it is focused on without considering the overall financial performance of the organization or enterprise.
  • Income valuations are the most common type of valuation. They are based on the premise that the current value of a business is a function of the future value that an investor can expect to receive from purchasing all or part of the business. In these valuations the expected returns from investing in the business and the risks associated with receiving the expected returns are evaluated by the appraiser. The appraiser then determines the value whereby a hypothetical buyer would receive a sufficient return on the investment to compensate the buyer for the risk associated with receiving the expected returns. One difficulty with this method is determining the lenth of time the company is expected to generate the expected returns that drive the valuation. Most income valuations use an explicit forecast of returns for some period, usually 3 to 5 years, combined with a “residual”. The residual is generally a flat or uniformly growing forecast of future returns that is discounted by some factor to estimate its value on the date of valuation. In some cases the residual is the largest part of the calculated value.
  • the appraiser When performing a business valuation, the appraiser is generally free to select the valuation type and method (or some combination of the methods) in determining the business value.
  • the usefulness of these valuations is limited because there is no correct answer, there is only the best possible informed guess for any given business valuation.
  • the usefulness of business valuations to business owners and managers is restricted for another reason—valuations typically determine only the value of the business as a whole.
  • the valuation would have to furnish supporting detail that would highlight the value of different categories of value within the business. An operating manager would then be able to use a series of business valuations to identify categories within a business that have been decreasing in value.
  • This information could also be used to help identify corrective action programs and to track the progress that these programs have made in increasing business value. This same information could also be used to identify categories that are contributing to an increase in business value. This information could be used to identify categories where increased levels of investment would have a significant favorable impact on the overall health of the business.
  • intangible asset valuations also ignore the real options for growth that are intimately inter-related and dependent upon the intangible assets being evaluated.
  • intangible assets can affect the market's perception of which company is likely to receive the lions share of future growth in a given industry. This, in turn affects the allocation of industry options to the market price for equity in the enterprise.
  • a preferable object to which the present invention is applied is the valuation and coordinated management of the different categories of value within an organization that consists of two or more commercial enterprises that have come together to form a “virtual value chain” for the purpose of delivering products or services to customers where a large portion of the organization's business value is associated with intangibles and real options.
  • the present invention also provides the ability to calculate and display a comprehensive and accurate valuation for the categories of value for each commercial enterprise within the virtual value chain.
  • the ability to “drill down” for more detailed analysis extends to each element of value within each enterprise in the “virtual value chain” as illustrated in Table 1.
  • Table 1 Level Valuation Categories Organization Current Operation: Assets/Liabilities Current Operation: Enterprise Contribution & Joint: Real options/Contingent Liabilities Enterprise Current Operation: Assets/Liabilities Current Operation: Elements of Value Real Options/Contingent Liabilities & Market Sentiment Element of Value Sub-elements of value
  • the present invention eliminates a great deal of time-consuming and expensive effort by automating the extraction of data from the databases, tables, and files of existing computer-based corporate finance, operations, human resource and “soft” asset management system databases as required to operate the system.
  • the automated extraction, aggregation and analysis of data from a variety of existing computer-based systems significantly increases the scale and scope of the analysis that can be completed.
  • the system of the present invention further enhances the efficiency and effectiveness of the business valuation by automating the retrieval, storage and analysis of information useful for valuing categories of value from external databases and publications and the internet.
  • the present invention takes a similar approach to enterprise value analysis by consistently utilizing the same set of valuation methodologies for valuing the different categories of enteprise value as shown in Table 3.
  • One benefit of the novel system is that the market value of every enterprise in the organization is subdivided in to at least three distinct categories of value: current operation assets, elements of value and real options. As shown in the table 5, these three value categories match the three distinct “horizons” for management focus the McKinsey consultants reported on in The Alchemy of Growth. TABLE 5 System Value Categories Three Horizons Current Operation Assets Short Term Elements of Value Growth Real Options Options
  • growth opportunities and contingent liabilities are valued using real option algorithms. Because real option algorithms explicitly recognize whether or not an investment is reversible and/or if it can be delayed, the values calculated using these algorithms are more realistic than valuations created using more traditional approaches like Net Present Value.
  • real option analysis for valuing growth opportunities and contingent liabilities gives the present invention a distinct advantage over traditional approaches to business valuation.
  • intangible elements are by definition not tangible, they can not be measured directly. They must instead be measured by the impact they have on their surrounding environment.
  • electricity is an “intangible” that is measured by the impact it has on the surrounding environment.
  • the strength of the magnetic field generated by the flow of electricity through a conductor is used to determine the amount of electricity that is being consumed.
  • the system of the present invention measures intangible elements of value by identifying the attributes that, like the magnetic field, reflect the strength of the element in driving the components of value (revenue, expense and change in capital) and are easy to measure.
  • the attributes related to each element's strength are identified, they are summarized into a single expression (a composite variable or vector).
  • the vectors for all elements are then evaluted to determine their relative contribution to driving each of the components of value.
  • the system of the present invention calculates the product of each element's relative contribution and forecast life to determine the contribution to each of the components of value.
  • the contributions to each component of value are then added together to determine the value of each element (see Table 7).
  • the system also gives the user the ability to track the changes in categories of value by comparing the current valuations to previously calculated valuations.
  • the system provides the user with an alternative to general ledger accounting systems for tracking financial performance.
  • the system of the present invention produces reports in formats that are similar to the reports provided by traditional accounting systems.
  • the method for tracking the categories of value for a business enterprise provided by the present invention eliminates many of the limitations associated with current accounting systems that were described previously.
  • FIG. 1 is a block diagram showing the major processing steps of the present invention
  • FIG. 2 is a diagram showing the files or tables in the application database of the present invention that are utilized for data storage and retrieval during the processing that values the categories of value within the organization;
  • FIG. 3 is a block diagram of an implementation of the present invention.
  • FIG. 4 is a diagram showing the data windows that are used for receiving information from and transmitting information to the user ( 20 ) during system processing;
  • FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F are block diagrams showing the sequence of steps in the present invention used for specifying system settings and for initializing and operating the data bots that extract, aggregate, store and manipulate information utilized in system processing from: user input, the basic financial system database, the operation management system database, the human resource information system database, external databases, the advanced financial system database, soft asset management system databases and the internet;
  • FIG. 6A, FIG. 6B and FIG. 6C are block diagrams showing the sequence of steps in the present invention that are utilized for initializing and operating the analysis bots;
  • FIG. 7 is a block diagram showing the sequence of steps in the present invention used for the analyzing enterprise market sentiment
  • FIG. 8 is a block diagram showing the sequence of steps in the present invention used in trading organization stock and in preparing, displaying and optionally printing reports;
  • FIG. 9 is a block diagram showing the sequence of steps in the present invention used for generating lists of value enhancing changes and calculating, displaying and optionally printing simulations of the effects of user-specified and/or system generated changes in business value drivers on the financial performance and the future value of the organization and the enterprises in the organization;
  • FIG. 1 provides an overview of the processing completed by the innovative system for business valuation.
  • an automated method of and system ( 100 ) for business valuation is provided. Processing starts in this system ( 100 ) with a the specification of system settings and the initialization and activation of software data “bots” ( 200 ) that extract, aggregate, manipulate and store the data and user ( 20 ) input required for completing system processing.
  • This information is extracted via a network ( 45 ) from a basic financial system database ( 5 ), an operation management system database ( 10 ), a human resource information system database ( 15 ), an external database ( 25 ), an advanced financial system database ( 30 ), soft asset management system databases ( 35 ) and the internet ( 40 ).
  • These information extractions and aggregations may be influenced by a user ( 20 ) through interaction with a user-interface portion of the application software ( 700 ) that mediates the display, transmission and receipt of all information to and from a browser ( 800 ) that the user ( 20 ) interacts with. While only one database of each type ( 5 , 10 , 15 , 25 , 30 and 35 ) is shown in FIG. 1, it is to be understood that the system ( 100 ) can extract data from multiple databases of each type via the network ( 45 ).
  • the preferred embodiment of the present invention contains a soft asset management system for each element of value being analyzed.
  • Automating the extraction and analysis of data from each soft asset management system ensures that the management of each soft asset is considered and prioritized within the overall financial models for the organization and for each enterprise in the organization. It should also be understood that it is possible to complete a bulk extraction of data from each database ( 5 , 10 , 15 , 25 , 30 and 35 ) via the network ( 45 ) using data extraction applications such as Aclue from Decisionism and Power Center from Informatica before initializing the data bots.
  • the data extracted in bulk could be stored in a single datamart or datawarehouse where the data bots could operate on the aggregated data.
  • the application database ( 50 ) contains tables for storing user input, extracted information and system calculations including a system settings table ( 140 ), a metadata mapping table ( 141 ), a conversion rules table ( 142 ), a basic financial system table ( 143 ), an operation system table ( 144 ), a human resource system table ( 145 ), an external database table ( 146 ), an advanced finance system table ( 147 ), a soft asset system table ( 148 ), a bot date table ( 149 ), a keyword table ( 150 ), a classified text table ( 151 ), a geospatial measures table ( 152 ), a composite variables table ( 153 ), an industry ranking table ( 154 ), an element of value definition table ( 155 ), a component of value definition table ( 156 ), a cluster ID table ( 157 ), an element variables table ( 158 ), a vector table ( 140 ), a metadata mapping table ( 141 ), a conversion rules table ( 142 ), a basic financial system table ( 143 ), an operation
  • the application database ( 50 ) can optionally exist as a datamart, data warehouse or departmental warehouse.
  • the system of the present invention has the ability to accept and store supplemental or primary data directly from user input, a data warehouse or other electronic files in addition to receiving data from the databases described previously.
  • the system of the present invention also has the ability to complete the necessary calculations without receiving data from one or more of the specified databases. However, in the preferred embodiment all required information is obtained from the specified data sources ( 5 , 10 , 15 , 25 , 30 , 35 and 40 ).
  • the preferred embodiment of the present invention is a computer system ( 100 ) illustratively comprised of a user-interface personal computer ( 110 ) connected to an application server personal computer ( 120 ) via a network ( 45 ).
  • the application server personal computer ( 120 ) is in turn connected via the network ( 45 ) to a database-server personal computer ( 130 ).
  • the user interface personal computer ( 110 ) is also connected via the network ( 45 ) to an internet browser applicance ( 90 ) that contains browser software ( 800 ) such as Microsoft Internet Explorer or Netscape Navigator.
  • the database-server personal computer ( 130 ) has a read/write random access memory ( 131 ), a hard drive ( 132 ) for storage of the application database ( 50 ), a keyboard ( 133 ), a communications bus ( 134 ), a CRT display ( 135 ), a mouse ( 136 ), a CPU ( 137 ) and a printer ( 138 ).
  • the application-server personal computer ( 120 ) has a read/write random access memory ( 121 ), a hard drive ( 122 ) for storage of the non user interface portion of the application software ( 200 , 300 , 400 , 500 and 600 ) of the present invention, a keyboard ( 123 ), a communications bus ( 124 ), a CRT display ( 125 ), a mouse ( 126 ), a CPU ( 127 ) and a printer ( 128 ). While only one client personal computer is shown in FIG. 3, it is to be understood that the application-server personal computer ( 120 ) can be networked to fifty or more client personal computers ( 110 ) via the network ( 45 ). The application-server personal computer ( 120 ) can also be networked to fifty or more server, personal computers ( 130 ) via the network ( 45 ). It is to be understood that the diagram of FIG. 3 is merely illustrative of one embodiment of the present invention.
  • the user-interface personal computer ( 110 ) has a read/write random access memory ( 111 ), a hard drive ( 112 ) for storage of a client data-base ( 49 ) and the user-interface portion of the application software ( 700 ), a keyboard ( 113 ), a communications bus ( 114 ), a CRT display ( 115 ), a mouse ( 116 ), a CPU ( 117 ) and a printer ( 118 ).
  • the application software controls the performance of the central processing unit ( 127 ) as it completes the calculations required to calculate the detailed business valuation.
  • the application software program ( 200 , 300 , 400 , 500 , 600 and 700 ) is written in a combination of C++ and Visual Basic®.
  • the application software ( 200 , 300 , 400 , 500 , 600 and 700 ) can use Structured Query Language (SQL) for extracting data from the databases and the internet ( 5 , 10 , 15 , 25 , 30 , 35 and 40 ).
  • SQL Structured Query Language
  • the user ( 20 ) can optionally interact with the user-interface portion of the application software ( 700 ) using the browser software ( 800 ) in the browser appliance ( 90 ) to provide information to the application software ( 200 , 300 , 400 , 500 , 600 and 700 ) for use in determining which data will be extracted and transferred to the application database ( 50 ) by the data bots.
  • User input is initially saved to the client database ( 49 ) before being transmitted to the communication bus ( 125 ) and on to the hard drive ( 122 ) of the application-server computer via the network ( 45 ).
  • the central processing unit ( 127 ) accesses the extracted data and user input by retrieving it from the hard drive ( 122 ) using the random access memory ( 121 ) as computation workspace in a manner that is well known.
  • the computers ( 110 , 120 and 130 ) shown in FIG. 3 illustratively are IBM PCs or clones or any of the more powerful computers or workstations that are widely available.
  • Typical memory configurations for client personal computers ( 110 ) used with the present invention should include at least 256 megabytes of semiconductor random access memory ( 111 ) and at least a 50 gigabyte hard drive ( 112 ).
  • Typical memory configurations for the application-server personal computer ( 120 ) used with the present invention should include at least 1028 megabytes of semiconductor random access memory ( 121 ) and at least a 100 gigabyte hard drive ( 122 ).
  • Typical memory configurations for the database-server personal computer ( 130 ) used with the present invention should include at least 2056 megabytes of semiconductor random access memory ( 135 ) and at least a 500 gigabyte hard drive ( 131 ).
  • the value of the organiztion, each enterprise within the organization and each element of value can be broken down into the value categories listed in Table 1.
  • Table 2 and Table 3 the value of the current-operation will be calculated using an income valuation.
  • An integral part of most income valuation models is the calculation of the present value of the expected cash flows, income or profits associated with the current-operation.
  • the present value of a stream of cash flows is calculated by discounting the cash flows at a rate that reflects the risk associated with realizing the cash flow. For example, the present value (PV) of a cash flow of ten dollars ($10) per year for five (5) years would vary depending on the rate used for discounting future cash flows as shown below.
  • the revenue, expense and capital requirement forecasts for the current operation, the real options and the contingent liabilities are obtained from an advanced financial planning system database ( 30 ) from an advanced financial planning system similar to the one disclosed in U.S. Pat. No. 5,615,109.
  • the extracted revenue, expense and capital requirement forecasts are used to calculate a cash flow for each period covered by the forecast for the organization and each enterprise in the organization by subtracting the expense and change in capital for each period from the revenue for each period.
  • a steady state forecast for future periods is calculated after determining the steady state growth rate the best fits the calculated cash flow for the forecast time period.
  • the steady state growth rate is used to calculate an extended cash flow forecast.
  • the extended cash flow forecast is used to determine the Competitive Advantage Period (CAP) implicit in the enteprise market value.
  • CAP Competitive Advantage Period
  • the preferred embodiment has a pre-determined number of sub-components for each component of value for the organization and each enterprise in the organization.
  • the revenue value is not subdivided.
  • the expense value is subdivided into five sub-components: the cost of raw materials, the cost of manufacture or delivery of service, the cost of selling, the cost of support and the cost of administration.
  • the capital value is subdivided into six sub-components: cash, non-cash financial assets, production equipment, other assets (non financial, non production assets), financial liabilities and equity.
  • the production equipment and equity sub-components are not used directly in evaluating the elements of value.
  • the components and sub-components of current-operation value will be used in calculating the value of: enteprise contribution, elements of value and sub-elements of value.
  • Enterprise contribution will be defined as “the economic benefit that as a result of past transactions an enterprise is expected to provide to an organization.”
  • an element of value will be defined as “an identifiable entity or group of items that as a result of past transactions has provided and is expected to provide economic benefit to an enterprise”.
  • An item will be defined as a single member of the group that defines an element of value. For example, an individual salesman would be an “item” in the “element of value” sales staff.
  • the data associated with performance of an individual item will be referred to as “item variables”.
  • the valuation of an organization and the enterprises in the organization using the approach outlined above is completed in five distinct stages.
  • the first stage of processing programs bots to continually extract, aggregate, manipulate and store the data from user input and databases and the internet ( 5 , 10 , 15 , 25 , 30 , 35 or 40 ) as required for the analysis of business value. Bots are independent components of the application that have specific tasks to perform.
  • the second stage of processing programs analysis bots to continually:
  • [0071] 7. specify and optimize predictive models to determine the relationship between the vectors determined in step 2 and the revenue, expense and capital values determined in step 6,
  • the third stage of processing (block 400 from FIG. 1) analyzes the market sentiment associated with each enterprise as shown in FIG. 7.
  • the fourth stage of processing (block 500 from FIG. 1) displays the results of the prior calculations in specified formats and optionally generates trades in enterprise stock as shown in FIG. 8.
  • the fifth and final stage of processing (block 600 from FIG. 1) identifies potential improvements in organization and enterprise operation and analyzes the impact of proposed improvements on financial performance and business value for the organization and each enterprise as shown in FIG. 9.
  • FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F detail the processing that is completed by the portion of the application software ( 200 ) that extracts, aggregates, transforms and stores the information required for system operation from: the basic financial system database ( 5 ), operation management system database ( 10 ), human resource information system database ( 15 ), external database ( 25 ), advanced financial system database ( 30 ), soft asset management system database ( 35 ), the internet ( 40 ) and the user ( 20 ).
  • the basic financial system database 5
  • operation management system database 10
  • human resource information system database 15
  • external database 25
  • advanced financial system database 30
  • soft asset management system database 35
  • the internet 40
  • the user 20
  • Advanced financial systems utilize information from the basic financial systems to perform financial analysis, financial planning and financial reporting functions.
  • Virtually every commercial enterprise uses some type of basic financial system as they are required to use these systems to maintain books and records for income tax purposes.
  • An increasingly large percentage of these basic financial systems are resident in microcomputer and workstation systems.
  • Basic financial systems include general-ledger accounting systems with associated accounts receivable, accounts payable, capital asset, inventory, invoicing, payroll and purchasing subsystems. These systems incorporate worksheets, files, tables and databases. These databases, tables and files contain information about the company operations and its related accounting transactions.
  • these databases, tables and files are accessed by the application software of the present invention as required to extract the information required for completing a business valuation.
  • the system is also capable of extracting the required information from a data warehouse (or datamart) when the required information has been pre-loaded into the warehouse.
  • the general ledger system generally maintains summary, dollar only transaction histories and balances for all accounts while the associated subsystems, accounts payable, accounts receivable, inventory, invoicing, payroll and purchasing, maintain more detailed historical transaction data and balances for their respective accounts. It is common practice for each subsystem to maintain the detailed information shown in Table 9 for each transaction.
  • the output from a general ledger system includes income statements, balance sheets and cash flow statements in well defined formats which assist management in measuring the financial performance of the firm during the prior periods when data input and system processing have been completed.
  • ERP Enterprise Resource Planning Systems
  • MRP Material Requirement Planning Systems
  • Purchasing Systems Scheduling Systems and Quality Control Systems
  • Operation Management Systems in manufacturing firms may also monitor information relating to the production rates and the performance of individual production workers, production lines, work centers, production teams and pieces of production equipment including the information shown in Table 10.
  • TABLE 10 Operation Management System - Production Information 1. ID number (employee id/machine id) 2. Actual hours - last batch 3. Standard hours - last batch 4. Actual hours - year to date 5. Actual/Standard hours - year to date % 6. Actual setup time - last batch 7. Standard setup time - last batch 8. Actual setup hours - year to date 9. Actual/Standard setup hrs - yr to date % 10. Cumulative training time 11. Job(s) certifications 12. Actual scrap - last batch 13. Scrap allowance - last batch 14. Actual scrap/allowance - year to date 15. Rework time/unit last batch 16. Rework time/unit year to date 17. QC rejection rate - batch 18. QC rejection rate - year to date
  • Operation management systems are also useful for tracking requests for service to repair equipment in the field or in a centralized repair facility. Such systems generally store information similar to that shown below in Table 11. TABLE 11 Operation Management System - Service Call Information 1. Customer name 2. Customer number 3. Contract number 4. Service call number 5. Time call received 6. Product(s) being fixed 7. Serial number of equipment 8. Name of person placing call 9. Name of person accepting call 10. Promised response time 11. Promised type of response 12. Time person dispatched to call 13. Name of person handling call 14. Time of arrival on site 15. Time of repair completion 16. Actual response type 17. Part(s) replaced 18. Part(s) repaired 19. 2nd call required 20. 2nd call number
  • Computer based human resource systems may some times be packaged or bundled within enterprise resource planning systems such as those available from SAP, Oracle and Peoplesoft.
  • Human resource systems are increasingly used for storing and maintaining corporate records concerning active employees in sales, operations and the other functional specialties that exist within a modern corporation. Storing records in a centralized system facilitates timely, accurate reporting of overall manpower statistics to the corporate management groups and the various government agencies that require periodic updates.
  • human resource systems include the company payroll system as a subsystem. In the preferred embodiment of the present invention, the payroll system is part of the basic financial system. These systems can also be used for detailed planning regarding future manpower requirements.
  • Human resource systems typically incorporate worksheets, files, tables and databases that contain information about the current and future employees.
  • External databases can be used for obtaining information that enables the definition and evaluation of a variety of things including elements of value, sentiment factors, industry real options and composite variables. In some cases information from these databases can be used to supplement information obtained from the other databases and the internet ( 5 , 10 , 15 , 30 , 35 and 40 ). In the system of the present invention, the information extracted from external databases ( 25 ) can be in the forms listed in Table 13.
  • Types of information a) numeric information such as that found in the SEC Edgar database and the databases of financial infomediaries such as FirstCall, IBES and Compustat, b) text information such as that found in the Lexis Nexis database and databases containing past issues from specific publications, c) multimedia information such as video and audio clips, and d) geospatial data.
  • the system of the present invention uses different “bot” types to process each distinct data type from external databases ( 25 ).
  • the same “bot types” are also used for extracting each of the different types of data from the internet ( 40 ).
  • the system of the present invention must have access to at least one external database ( 25 ) that provides information regarding the equity prices for each enterprise in the organization and the equity prices and financial performance of competitors.
  • Advanced financial systems may also use information from external databases ( 25 ) and the internet ( 40 ) in completing their processing.
  • Advanced financial systems include financial planning systems and activity based costing systems.
  • Activity based costing systems may be used to supplement or displace the operation of the expense component analysis segment of the present invention as disclosed previously.
  • Financial planning systems generally use the same format used by basic financial systems in forecasting income statements, balance sheets and cash flow statements for future periods. Management uses the output from financial planning systems to highlight future financial difficulties with a lead time sufficient to permit effective corrective action and to identify problems in company operations that may be reducing the profitability of the business below desired levels. These systems are most often developed by individuals within companies using 2 and 3 dimensional spreadsheets such as Lotus 1-2-3 ®, Microsoft Excel® and Quattro Pro®.
  • EIS executive information system
  • DSS decision support system
  • the advanced financial system database is similar to the financial planning system database detailed in U.S. Pat. No. 5,165,109 for “Method of and System for Generating Feasible, Profit Maximizing Requisition Sets”, by Jeff S. Eder, the disclosure of which is incorporated herein by reference.
  • Soft asset management systems include: alliance management systems, brand management systems, customer relationship management systems, channel management systems, intellectual property management systems, process management systems and vendor management systems.
  • Soft asset management systems are similar to operation management systems in that they generally have the ability to forecast future events as well as track historical occurrences.
  • Customer relationship management systems are the most well established soft asset management systems at this point and will the focus of the discussion regarding soft asset management system data. In firms that sell customized products, the customer relationship management system is generally integrated with an estimating system that tracks the flow of estimates into quotations, orders and eventually bills of lading and invoices.
  • customer relationship management systems In other firms that sell more standardized products, customer relationship management systems generally are used to track the sales process from lead generation to lead qualification to sales call to proposal to acceptance (or rejection) and delivery. All customer relationship management systems would be expected to track all of the customer's interactions with the enterprise after the first sale and store information similar to that shown below in Table 14.
  • FIG. 5A System processing of the information from the different databases and the internet ( 5 , 10 , 15 , 25 , 30 , 35 and 40 ) described above starts in a block 201 , FIG. 5A, which immediately passes processing to a software block 202 .
  • the software in block 202 prompts the user ( 20 ) via the system settings data window ( 701 ) to provide system setting information.
  • the system setting information entered by the user ( 20 ) is transmitted via the network ( 45 ) back to the application server ( 120 ) where it is stored in the system settings table ( 140 ) in the application database ( 50 ) in a manner that is well known.
  • the specific inputs the user ( 20 ) is asked to provide at this point in processing are shown in Table 15. TABLE 15 1. New run or structure revision? 2.
  • the organization and enterprise checklists are used by a “rules” engine (such as the one available from Neuron Data) in block 202 to influence the number and type of items with pre-defined metadata mapping for each category of value. For example, if the checklists indicate that the organization and enterprises are focused on branded, consumer markets, then additional brand related factors will be pre-defined for mapping. The application of these system settings will be further explained as part of the detailed explanation of the system operation.
  • the software in block 202 also uses the current system date to determine the time periods (months) that require data in order to complete the current operation and the real option valuations and stores the resulting date range in the system settings table ( 140 ).
  • the valuation of the current operation by the system utilizes basic finance, advanced financial, soft asset management, external database and human resource data for the three year period before and the three year forecast period after the current date.
  • processing advances to a software block 203 .
  • the software in block 203 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to map metadata using the standard specified by the user ( 20 ) (XML, Microsoft's Open Information Model of the Metadata Coalitions specification) from the basic financial system database ( 5 ), the operation management system database ( 10 ), the human resource information system database ( 15 ), the external database ( 25 ), the advanced financial system database ( 30 ) and the soft asset management system database ( 35 ) to the organizational hierarchy stored in the system settings table ( 140 ) and to the pre-specified fields in the metadata mapping table ( 141 ).
  • XML XML, Microsoft's Open Information Model of the Metadata Coalitions specification
  • Pre-specified fields in the metadata mapping table include, the revenue, expense and capital components and sub-components for the organization and each enterprise and pre-specified fields for expected value drivers. Because the bulk of the information being extracted is financial information, the metadata mapping often takes the form of specifying the account number ranges that correspond to the different fields in the metadata mapping table ( 141 ). Table 16, shows the base account number structure that the account numbers in the other systems must align with. For example, using the structure shown below, the revenue component for the organization could be specified as organization 01, any enterprise number, any deparment number, accounts 400 to 499 (the revenue account range) with any sub-account. TABLE 16 Account Number 01 - 800 - 901 - 677- 003 Segment Organi- Enterprise Department Account Sub- zation account Subgroup Products Workstation Marketing Labor P.R. Position 5 4 3 2 1
  • any database fields that are not mapped to pre-specified fields are defined by the user ( 20 ) as component of value. elements of value or non-relevant attributes and “mapped” in the metadata mapping table ( 141 ) to the corresponding fields in each database in a manner identical to that described above for the pre-specified fields.
  • the software in block 203 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide conversion rules for each metadata field for each data source.
  • IConversion rules will include information regarding currency conversions and conversion for units of measure that may be required to accurately and consistently analyze the data.
  • the inputs from the user ( 20 ) regarding conversion rules are stored in the conversion rules table ( 142 ) in the application database. When conversion rules have been stored for all fields from every data source, then processing advances to a software block 204 .
  • the software in block 204 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 212 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 207 .
  • the software in block 207 checks the bot date table ( 149 ) and deactivates any basic financial system data bots with creation dates before the current system date and retrieves information from the system setting table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 207 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the basic financial system database ( 5 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Bots are independent components of the application that have specific tasks to perform. In the case of data acquisition bots, their tasks are to extract and convert data from a specified source and then store it in a specified location.
  • Each data bot initialized by software block 207 will store its data in the basic financial system table ( 143 ). Every data acquisition bot for every data source contains the information shown in Table 17. TABLE 17 1. Unique ID number (based on date, hour, minute, second of creation) 2. The data source location 3. Mapping information 4. Timing of extraction 5. Conversion rules (if any) 6. Storage Location (to allow for tracking of source and destination events) 7. Creation date (day, hour, minute, second)
  • processing advances to a block 208 .
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the basic financial system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the basic financial system table ( 143 ).
  • processing advances to a block 210 .
  • the software in block 210 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converterd data is stored in the basic financial system table ( 143 ). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing passes, on to software block 212 .
  • the software in block 212 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 224 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 221 .
  • the software in block 221 checks the bot date table ( 149 ) and deactivates any operations management system data bots with creation dates before the current system date and retrieves information from the system setting table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 221 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the operations management system database ( 10 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 221 will store its data in the operations system table ( 144 ).
  • processing advances to a block 222 .
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the operations management system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the operations system table ( 144 ).
  • processing advances to a block 210 .
  • the software in block 210 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converterd data is stored in the operations system table ( 144 ). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes, on to software block 224 .
  • the software in block 224 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 228 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 225 .
  • the software in block 225 checks the bot date table ( 149 ) and deactivates any human resource management system data bots with creation dates before the current system date and retrieves information from the system setting table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 225 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the human resource management system database ( 15 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 225 will store its data in the human resource system table ( 145 ).
  • processing advances to a block 226 .
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the human resource management system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the human resource system table ( 145 ).
  • processing advances to a block 210 .
  • the software in block 210 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converterd data is stored in the human resource system table ( 145 ). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes, on to software block 228 .
  • the software in block 228 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 244 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 241 .
  • the software in block 241 checks the bot date table ( 149 ) and deactivates any external database data bots with creation dates before the current system date and retrieves information from the system setting table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 241 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the external database ( 25 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 241 will store its data in the external database table ( 146 ).
  • processing advances to a block 242 .
  • the bots extract and convert data in accordance with their preprogrammed instructions.
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the external database metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the external database table ( 146 ). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 210 .
  • the software in block 210 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converterd data is stored in the external database table ( 146 ). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes, on to software block 244 .
  • the software in block 244 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 248 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 245 .
  • the software in block 245 checks the bot date table ( 149 ) and deactivates any advanced financial system data bots with creation dates before the current system date and retrieves information from the system setting table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 245 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to the advanced financial system database ( 30 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Each data bot initialized by software block 245 will store its data in the advanced financial system database table ( 147 ).
  • processing advances to a block 246 .
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the advanced financial system database metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the advanced financial system database table ( 147 ).
  • processing advances to a block 210 .
  • the software in block 210 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converted data is stored in the advanced financial system database table ( 147 ). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes, on to software block 248 .
  • the software in block 248 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 264 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 261 .
  • the software in block 261 checks the bot date table ( 149 ) and deactivates any soft asset management system data bots with creation dates before the current system date and retrieves information from the system setting table ( 140 ), metadata mapping table ( 141 ) and conversion rules table ( 142 ). The software in block 261 then initializes data bots for each field in the metadata mapping table ( 141 ) that mapped to a soft asset management system database ( 35 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ). Extracting data from each soft asset management system ensures that the management of each soft asset is considered and prioritized within the overall financial models for the organization and each enterprise in the organization. Each data bot initialized by software block 261 will store its data in the soft asset system table ( 148 ).
  • processing advances to a block 262 .
  • the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 209 before the bot completes data storage.
  • the software in block 209 checks the metadata for the soft asset management system databases to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the soft asset system table ( 148 ).
  • processing advances to a block 210 .
  • the software in block 210 prompts the user ( 20 ) via the metadata and conversion rules window ( 702 ) to provide metadata and conversion rules for each new field.
  • the information regarding the new metadata and conversion rules is stored in the metadata mapping table ( 141 ) and conversion rules table ( 142 ) while the extracted, converterd data is stored in the soft asset system table ( 148 ). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage.
  • the new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes, on to software block 264 .
  • the software in block 264 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 276 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 265 .
  • the software in block 265 prompts the user ( 20 ) via the identification and classification rules window ( 703 ) to identify keywords such as company names, brands, trademarks, competitors for pre-specified fields in the metadata mapping table ( 141 ).
  • the user ( 20 ) also has the option of mapping keywords to other fields in the metadata mapping table ( 141 ).
  • the user ( 20 ) is prompted to select and classify descriptive terms for each keyword.
  • the input from the user ( 20 ) is stored in the keyword table ( 150 ) in the application database before processing advances to a software block 266 .
  • the software in block 266 checks the bot date table ( 149 ) and deactivates any internet text bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the keyword table ( 150 ). The software in block 266 then initializes internet text bots for each field in the metadata mapping table ( 141 ) that mapped to a keyword in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ) before advancing processing to a software block 267 .
  • Bots are independent components of the application that have specific tasks to perform. In the case of text bots, their tasks are to locate, count and classify keyword matches from a specified source and then store their findings in a specified location. Each text bot initialized by software block 266 will store the location, count and classification data it discovers in the classified text table ( 151 ). Multimedia data can be processed using bots with essentially the same specifications if software to translate and parse the multimedia content is included in each bot. Every internet text bot contains the information shown in Table 18. TABLE 18 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Storage location 4. Mapping information 5. Home URL 6. Keyword 7. Descriptive term 1 To 7 + n. Descriptive term n
  • the text bots locate and classify data from the external database ( 25 ) in accordance with their programmed instructions in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 268 before the bot completes data storage.
  • the software in block 268 checks to see if all keyword hits are associated with descriptive terms that have been been classified. If the software in block 268 doesn't find any unclassified “hits”, then the address, count and classified text are stored in the classified text table ( 151 ). Alternatively, if there are terms that haven't been classified, then processing advances to a block 269 .
  • the software in block 269 prompts the user ( 20 ) via the identification and classification rules window ( 703 ) to provide classification rules for each new term.
  • the information regarding the new classification rules is stored in the keyword table ( 150 ) while the newly classified text is stored in the classified text table ( 151 ). It is worth noting at this point that the activation and operation of bots that don't have unclassified fields continues. Only bots with unclassified fields will “wait” for user input before completing data storage.
  • the new classification rules will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes, on to a software block 270 .
  • the software in block 270 checks the bot date table ( 149 ) and deactivates any external database text bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the keyword table ( 150 ).
  • the software in block 270 then initializes external database text bots for each field in the metadata mapping table ( 141 ) that mapped to a keyword in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ) before advancing processing to a software block 271 . Every text bot initialized by software block 270 will store the location, count and classification data it discovers in the classified text table ( 151 ). Every external database text bot contains the information shown in Table 19. TABLE 19 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Storage location 4. Mapping information 5. Data Source 6. Keyword 7. Descriptive term 1 To 7 + n. Descriptive term n
  • the text bots locate and classify data from the external database ( 25 ) in accordance with its programmed instructions with the frequency specified by user ( 20 ) in the system settings table ( 140 ).
  • processing advances to a software block 268 before the bot completes data storage.
  • the software in block 268 checks to see if all keyword hits are associated with descriptive terms that have been been classified. If the software in block 268 doesn't find any unclassified “hits”, then the address, count and classified text are stored in the classified text table ( 151 ). Alternatively, if there are terms that haven't been classified, then processing advances to a block 269 .
  • the software in block 269 prompts the user ( 20 ) via the identification and classification rules window ( 703 ) to provide classification rules for each new term.
  • the information regarding the new classification rules is stored in the keyword table ( 150 ) while the newly classified text is stored in the classified text table ( 151 ). It is worth noting at this point that the activation and operation of bots that don't have unclassified fields continues. Only bots with unclassified fields “wait” for user input before completing data storage.
  • the new classification rules will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes, on to software block 276 .
  • the software in block 276 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 280 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 277 .
  • the software in block 277 checks the system setting table ( 140 ) to see if there is geocoded data in the application database ( 50 ) and to determine which on-line geocoding service (CentrusTM from QM Soft or MapMarkerTM from Mapinfo) is being used. If geospatial data is not being used, then processing advances to a block 291 . Alternatively, if the software in block 277 determines that geospatial data is being used, processing advances to a software block 278 .
  • the software in block 278 prompts the user ( 20 ) via the geospatial meaure definitions window ( 709 ) to define the measures that will be used in evaluating the elements of value. After specifying the measures, the user ( 20 ) is prompted to select the geospatial locus for each measure from the data already stored in the application database ( 50 ). The input from the user ( 20 ) is stored in the geospatial measures table ( 152 ) in the application database before processing advances to a software block 279 .
  • the software in block 279 checks the bot date table ( 149 ) and deactivates any geospatial bots with creation dates before the current system date and retrieves information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the geospatial measures table ( 152 ). The software in block 279 then initializes geospatial bots for each field in the metadata mapping table ( 141 ) that mapped to geospatial data in the application database ( 50 ) in accordance with the frequency specified by user ( 20 ) in the system settings table ( 140 ) before advancing processing to a software block 280 .
  • Bots are independent components of the application that have specific tasks to perform. In the case of geospatial bots, their tasks are to calculate user specified measures using a specified geocoding service and then store the measures in a specified location. Each geospatial bot initialized by software block 279 will store the measures it calculates in the application database table where the geospatial data was found. Tables that could include geospatial data include: the basic financial system table ( 143 ), the operation system table ( 144 ), the human resource system table ( 145 ), the external database table ( 146 ), the advanced finance system table ( 147 ) and the soft asset system table ( 148 ). Every geospatial bot contains the information shown in Table 20. TABLE 20 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Geospatial locus 6. Geospatial measure 7. Geocoding service
  • the geospatial bots locate data and complete measurements in accordance with their programmed instructions with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). As each geospatial bot retrieves data and calculates the geospatial measures that have been specified, processing advances to a block 281 before the bot completes data storage. The software in block 281 checks to see if all geospatial data located by the bot has been been measured. If the software in block 281 doesn't find any unmeasured data, then the measurement is stored in the application database ( 50 ). Alternatively, if there are data elements that haven't been measured, then processing advances to a block 282 .
  • the software in block 282 prompts the user ( 20 ) via the geospatial measure definition window ( 709 ) to provide measurement rules for each new term.
  • the information regarding the new measurement rules is stored in the geospatial measures table ( 152 ) while the newly calculated measurement is stored in the appropriate table in the application database ( 50 ). It is worth noting at this point that the activation and operation of bots that don't have unmeasured fields continues. Only the bots with unmeasured fields “wait” for user input before completing data storage. The new measurement rules will be used the next time bots are initialized in accordance with the frequency established by the user ( 20 ). In either event, system processing then passes on to a software block 291 .
  • the software in block 291 checks: the basic financial system table ( 143 ), the operation system table ( 144 ), the human r source system table ( 145 ), the external database table ( 146 ), the advanced finance system table ( 147 ), the soft asset system table ( 148 ), the classified text table ( 151 ) and the geospatial measures table ( 152 ) to see if data is missing from any of the periods required for system calculation.
  • the range of required dates was previously calculated by the software in block 202 . If there is no data missing from any period, then processing advances to a software block 293 . Alternatively, if there is missing data for any field for any period, then processing advances to a block 292 .
  • the software in block 292 prompts the user ( 20 ) via the missing data window ( 704 ) to specify the method to be used for filling the blanks for each item that is missing data.
  • Options the user ( 20 ) can choose from for filling the blanks include: the average value for the item over the entire time period, the average value for the item over a specified period, zero, the average of the preceeding item and the following item values and direct user input for each missing item. If the user ( 20 ) doesn't provide input within a specified interval, then the default missing data procedure specified in the system settings table ( 140 ) is used. When all the blanks have been filled and stored for all of the missing data, system processing advances to a block 293 .
  • the software in block 293 calculates attributes by item for each numeric data field in the basic financial system table ( 143 ), the operation system table ( 144 ), the human resource system table ( 145 ), the external database table ( 146 ), the advanced finance system table ( 147 ) and the soft asset system table ( 148 ).
  • the attributes calculated in this step include: cumulative total value, the period to period rate of change in value, the rolling average value and a series of time lagged values.
  • the software in block 293 calculates attributes for each date field in the specified tables including time since last occurrence, cumulative time since first occurrence, average frequency of occurrence and the rolling average frequency of occurrence.
  • the numbers derived from numeric and date fields are collectively referred to as “item performance indicators”.
  • the software in block 293 also calculates pre-specified combinations of variables called composite variables for measuring the strength of the different elements of value.
  • the item performance indicators are stored in the table where the item source data was obtained and the composite variables are stored in the composite variables table ( 153 ) before processing advances to a block 294 .
  • the software in block 294 uses attribute derivation algorithms such as the AQ program to create combinations of the variables that did't pre-specified for combination. While the AQ program is used in the preferred embodiment of the present invention, other attribute derivation algorithms such as the LINUS algorithms, may be used to the same effect.
  • the software creates these attributes using both item variables that were specified as “element” variables and item variables that were not.
  • the resulting composite variables are stored in the composite variables table ( 153 ) before processing advances to a block 295 .
  • the software in block 295 uses Data Envelopement Analysis (hereinafter, DEA) to determine the relative industry ranking of the organization and enterprises being examined using the composite variables calculated in block 293 .
  • DEA Data Envelopement Analysis
  • DEA can be used to determine the relative efficiency of a company in receiving favorable press mentions per dollar spent on advertising.
  • the software in block 296 uses pattern-matching algorithms to assign pre-designated data fields for different elements of value to pre-defined groups with numerical values. This type of analysis is useful in classifying purchasing patterns and/or communications patterns as “heavy”, “light”, “moderate” or “sporadic”. The assignments are calculated using the “rolling average” value for each field. The classification and the numeric value associated with the classification are stored in the application database ( 50 ) table where the data field is located before processing advances to a block 297 .
  • the software in block 297 retrieves data from the metadata mapping table ( 141 ), creates and then stores the definitions for the pre-defined components of value in the components of value definition table ( 155 ).
  • the revenue component of value is not divided into sub-components
  • the expense value is divided into five sub-components (the cost of raw materials, the cost of manufacture or delivery of service, the cost of selling, the cost of support and the cost of administration)
  • the capital value is divided into six sub-components: (cash, non-cash financial assets, production equipment, other assets, financial liabilities and equity) in the preferred embodiment.
  • processing advances to a software block 302 to begin the analysis of the extracted data using analysis bots.
  • FIG. 6A, FIG. 6B and FIG. 6C detail the processing that is completed by the portion of the application software ( 300 ) that programs analysis bots to:
  • Processing in this portion of the application begins in software block 302 .
  • the software in block 302 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 3110 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 303 .
  • the software in block 303 retrieves data from the meta data mapping table ( 141 ) and the soft asset system table ( 148 ) and then assigns item variables, item performance indicators and composite variables to each element of value using a two step process.
  • item variables and item performance indicators are assigned to elements of value based on the soft asset management system they correspond to (for example, all item variables from a brand management system and all item performance indicators derived from brand management system variables are assigned to the brand element of value).
  • pre-defined composite variables are assigned to the element of value they were assigned to measure in the metadata mapping table ( 141 ). After the assignment of variables and indicators to elements is complete, the resulting assignments are saved to the element of value definition table ( 155 ) and processing advances to a block 304 .
  • the software in block 304 checks the bot date table ( 149 ) and deactivates any clustering bots with creation dates before the current system date.
  • the software in block 304 then initializes bots as required for each component of value.
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ), retrieve the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the component of value definition table ( 156 ) as required and define segments for the component of value data before saving the resulting cluster information in the application database ( 50 ).
  • Bots are independent components of the application that have specific tasks to perform. In the case of predictive model bots, their primary task is to segment the component and sub-component of value variables into distinct clusters that share similar characteristics.
  • the clustering bot assigns a unique id number to each “cluster” it identifies and stores the unique id numbers in the cluster id table ( 157 ). Every item variable for every component and sub-component of value is assigned to one of the unique clusters.
  • the cluster id for each variable is saved in the data record for each item variable in the table where it resides.
  • the item variables are segmented into a number of clusters less than or equal to the maximum specified by the user ( 20 ) in the system settings.
  • the data is segmented using the “default” clustering algorithm the user ( 20 ) specified in the system settings.
  • the system of the present invention provides the user ( 20 ) with the choice of several clustering algorithms including: an unsupervised “Kohonen” neural network, K-nearest neighbor, Expectation Maximization (EM) and the segmental K-means algorithm.
  • EM Expectation Maximization
  • Every clustering bot contains the information shown in Table 21. TABLE 21 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Component or subcomponent of value 6.
  • Clustering algorithm type Maximum number of clusters 8. Variable 1 . . . 8 + n. Variable n
  • the software in block 305 checks the bot date table ( 149 ) and deactivates any predictive model bots with creation dates before the current system date. The software in block 305 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the element of value definition table ( 155 ) and the component of value definition table ( 156 ) required to initialize predictive model bots for each component of value at every level in the organization.
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is determine the relationship between the item variables, item performance indicators and composite variables (collectively hereinafter, “the variables”) and the components of value (and sub-components of value) by cluster at each level of the organization.
  • a series of predictive model bots are initialized at this stage because it is impossible to know in advance which predictive model type will produce the “best” predictive model for the data from each commercial enterprise.
  • the series for each model includes 9 predictive model bot types: neural network; CART; projection pursuit regression; generalized additive model (GAM), redundant regression network; boosted Naive Bayes Regression; MARS; linear regression; and stepwise regression.
  • GAM generalized additive model
  • the software in block 305 generates this series of predictive model bots for the levels of the organization shown in Table 22.
  • TABLE 22 Predictive models by organization level Organization: Enterprise variables relationship to organization revenue component of value by cluster Enterprise variables relationship to organization expense subcomponents of value by cluster Enterprise variables relationship to organization capital change subcomponents of value by cluster Enterprise: Element variables relationship to enterprise revenue component of value by cluster Element variables relationship to enterprise expense subcomponents of value by cluster Element variables relationship to enterprise capital change subcomponents of value by cluster Element of Value: Sub-element of value variables relationship to element of value
  • Every predictive model bot contains the information shown in Table 23. TABLE 23 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Component or subcomponent of value 6. Cluster (ID) 7. Enterprise, Element or Sub-Element ID 8. Predictive Model Type 9. Variable 1 . . . 9 + n. Variable n
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, the bots retrieve the required data from the appropriate table in the application database ( 50 ) and randomly partition the item variables, item performance indicators and composite variables into a training sets and a test set.
  • the software in block 305 uses “bootstrapping” where the different training data sets are created by re-sampling with replacement from the original training set, so data records may occur more than once. The same sets of data will be used to train and then test each predictive model bot.
  • processing advances to a block 306 .
  • the software in block 306 uses a variable selection algorithm such as stepwise regression (other algorithms can be used) to combine the results from the predictive model bot analyses for each model to determine the best set of variables for each model.
  • a variable selection algorithm such as stepwise regression (other algorithms can be used) to combine the results from the predictive model bot analyses for each model to determine the best set of variables for each model.
  • the models having the smallest amount of error as measured by applying the mean squared error algorithm to the test data are given preference in determining the best set of variables.
  • the best set of variables contain the item variables, item performance indicators and composite variables that correlate most strongly with changes in the components of value.
  • the best set of variables will hereinafter be referred to as the “value drivers”. Eliminating low correlation factors from the initial configuration of the vector creation algorithms increases the efficiency of the next stage of system processing. Other error algorithms alone or in combination may be substituted for the mean squared error algorithm.
  • the software in block 306 tests the independence of the value drivers at the enterprise, element and sub-element level before processing advances to
  • the software in block 307 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation, a structure change or if the interaction between value drivers has changed from being highly correlated to being independent. If the calculation is not a new calculation, a structure change or a change to independent value driver status, then processing advances to a software block 310 . Alternatively, if the calculation is new, a structure change or a change to independent status, then processing advances to a software block 308 . The software in block 308 checks the bot date table ( 149 ) and deactivates any induction bots with creation dates before the current system date.
  • the software in block 308 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the component of value definition table ( 156 ) and the element variables table ( 158 ) as required to initialize induction model bots for each enterprise, element of value and sub-element of value at every level in the organization in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ) before processing advances to a block 309 .
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary tasks are to refine the item variable, item performance indicator and composite variable selection to reflect only causal variables and to produce formulas, (hereinafter, vectors) that summarize the relationship between the item variables, item performance indicators and composite variables and changes in the component or sub-component of value being examined.
  • vectors that summarize the relationship between the item variables, item performance indicators and composite variables and changes in the component or sub-component of value being examined.
  • these variables are simply grouped together to represent an element vector when they are dependent.
  • a series of induction bots are initialized at this stage because it is impossible to know in advance which induction algorithm will produce the “best” vector for the best fit variables from each model.
  • the series for each model includes 4 induction bot types: entropy minimization, LaGrange, Bayesian and path analysis.
  • the software in block 308 generates this series of induction bots for each set of variables stored in the element variables table ( 158 ) in the previous stage in processing. Every induction bot contains the information shown in Table 24. TABLE 24 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Component or subcomponent of value 6. Cluster (ID) 7. Enterprise, Element or Sub-Element ID 8. Variable Set 9. Induction algorithm type
  • bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). Once activated, they retrieve the element variable information for each model from the element variable table ( 158 ) and sub-divides the variables into two sets, one for training and one for testing. The same set of training data is used by each of the different types of bots for each model.
  • the software in block 309 uses a model selection algorithm to identify the vector that best fits the data for each enterprise, element or sub-element being analyzed.
  • a cross validation algorithm is used for model selection.
  • the software in block 309 saves the the best fit vector in the vector table ( 159 ) in the application database ( 50 ) and processing returns to advances to a block 310 .
  • the software in block 310 tests the value drivers or vectors to see if there are “missing” value drivers that are influencing the results. If the software in block 310 doesn't detect any missing value drivers, then system processing advances to a block 322 . Alternatively, if missing value drivers are detected by the software in block 310 , then processing advances to a software block 321 .
  • the software in block 321 prompts the user ( 20 ) via the variable identification window ( 710 ) to adjust the specification(s) for the affected enterprise, element of value or subelement of value.
  • system processing advances to a software block 323 .
  • the software in block 323 checks the in the system settings table ( 140 ) and/or the element of value definition table ( 155 ) to see if there any changes in structure. If there have been changes in the structure, then processing advances to a block 205 and the system processing described previously is repeated. Alternatively, if there are no changes in structure, then processing advances to a block 325 .
  • the software in block 325 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 329 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 326 .
  • the software in block 326 checks the bot date table ( 149 ) and deactivates any option bots with creation dates before the current system date.
  • the software in block 326 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the basic financial system database ( 143 ), the external database table ( 146 ) and the advanced finance system table ( 147 ) as required to initialize option bots for the organization, the industry and each enterprise in the organization before processing advances to a block 327 .
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary tasks are to calculate the cost of capital (if the user ( 20 ) hasn't specified the cost of capital in the system settings table ( 140 )) and value the real options for the industry, the organization, and each enterprise in the organization.
  • the base cost of capital is calculated using a well known formula for the industry and each enterprise.
  • the bots then use the data regarding the similarity of the “soft” asset profiles between the proposed real option activity and the existing industry, organization and enterprise profiles to determine the multiple on the cost of capital that will be used in valuing the real option. The closer the real option profile is to the existing profile, the closer the multiple is to one.
  • pattern matching algorithms can be used to replace the assessment by the user ( 20 ).
  • the value of the real option is calculated using dynamic programming algorithms in a manner that is well known and stored in the real option value table ( 162 ).
  • Real option values are calculated using dynamic programming algorithms.
  • the real option can be valued using other algorithms including binomial, neural network or Black Scholes algorithms.
  • the software in block 326 generates option bots for the industry, the organization and each enterprise in the organization.
  • Option bots contain the information shown in Table 25. TABLE 25 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Organization or Enterprise ID 6. Real Option Type (Industry, Organization or Enterprise) 7. Real Option 8. Allocation % (if applicable)
  • the option bots are initialized by the software in block 326 processing passes to a block 327 .
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • the bots retrieve information for the organization, the industry and each enterprise in the organization from the basic financial system database ( 143 ), the external database table ( 146 ) and the advanced finance system table ( 147 ) as required to complete the option valuation.
  • the value of the real option is calculated using dynamic programming algorithms in a manner that is well known.
  • the resulting values are then saved in the real option value table ( 162 ) in the application database ( 50 ) before processing advances to a block 328 .
  • the software in block 328 uses the item performance indicators produced by DEA analysis in blocks 304 , 308 and 314 and the percentage of industry real options controlled by the enterprise to determine the allocation percentage for industry options. The more dominant the organization and enterprise—as indicated by the industry rank for the intangible element indicators, the greater the allocation of industry real options.
  • the software in block 328 saves the information regarding the allocation of industry real options to the organization and each enterprise in the organization to the real option value table ( 162 ) in the application database ( 50 ) before advancing processing to a block 329 .
  • the software in block 329 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 333 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 330 .
  • the software in block 330 checks the bot date table ( 149 ) and deactivates any cash flow bots with creation dates before the current system date.
  • the software in block 326 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the component of value definition table ( 156 ) as required to initialize cash flow bots for the organization and each enterprise in the organization in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ) before processing advances to a block 331 .
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary tasks are to calculate the cash flow for the organization and each enterprise in the organization for every time period where data is available and to forecast a steady state cash flow for the organization and each enterprise in the organization.
  • Cash flow is calculated using a well known formula where cash flow equals period revenue minus period expense plus the period change in capital plus non-cash depreciation/amortization for the period.
  • the steady state cash flow is calculated for the organization and each enterprise in the organization using forecasting methods identical to those disclosed previously in U.S. Pat. No. 5,615,109 to forecast revenue, expenses, capital changes and depreciation seperately before calculating the cash flow.
  • the software in block 326 generates cash flow bots for the organization and each enterprise in the organization.
  • Every cash flow bot contains the information shown in Table 26.
  • TABLE 26 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Organization or Enterprise ID 6. Components of value
  • processing passes to a block 331 .
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • the bots retrieve the component of value information for the organization and each enterprise in the organization from the component of value definition table ( 156 ).
  • the cash flow bots then complete the calculation and forecast of cash flow for the organization and each enterprise in the organization before saving the resulting values by period in the cash flow table ( 161 ) in the application database ( 50 ) before processing advances to a block 333 .
  • the software in block 333 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 343 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 341 .
  • the software in block 341 checks the bot date table ( 149 ) and deactivates any element life bots with creation dates before the current system date. The software in block 341 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the element of value definition table ( 155 ) as required to initialize element life bots for each element and sub-element of value in the organization before processing advances to a block 342 .
  • Bots are independent components of the application that have specific tasks to perform. In the case of element life bots, their primary task is to determine the expected life of each element and sub-element of value for each enterprise in the organization. There are three methods for evaluating the expected life of the elements and sub-elements of value. Elements of value that are defined by a population of members (such as: channel partners, customers, employees and vendors) will have their lives estimated by analyzing and forecasting the lives of the members of the population.
  • the forecasting of member lives will be determined by the “best” fit solution from competing life estimation methods including the Iowa type survivor curves, Weibull distribution survivor curves, Gompertz-Makeham survivor curves, polynomial equations and the forecasting methodology disclosed in U.S. Pat. No. 5,615,109.
  • Elements of value such as some parts of Intellectual Property—patents
  • elements of value and sub-element of value (such as brand names, information technology and processes) that do not have defined lives and that do not consist of a collection of members will have their lives estimated by comparing the relative strength and stability of the element vectors with the relative stability of the enterprise CAP.
  • the resulting values are stored in the element of value definition table ( 155 ) for each element and sub-element of value of each enterprise in the organization.
  • Every element life bot contains the information shown in Table 27. TABLE 27 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Element of Sub-Element of Value 6. Life Estimation Method (population analysis, date calculation or relative CAP)
  • processing passes to block 342 .
  • the element life bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • the bots retrieve information for each element and sub-element of value from the element of value definition table ( 155 ) as required to complete the estimate of element life.
  • the resulting values are then saved in the element of value definition table ( 155 ) in the application database ( 50 ) before processing advances to a block 343 .
  • the software in block 343 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 402 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 345 .
  • the software in block 345 checks the bot date table ( 149 ) and deactivates any component capitalization bots with creation dates before the current system date.
  • the software in block 341 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the component of value definition table ( 156 ) as required to initialize component capitalization bots for the organization and each enteprise in the organization before processing advances to a block 346 .
  • F fx Forecast revenue, expense or capital requirements for year x after valuation date (from advanced finance system)
  • N Number of years in CAP (from prior calculation)
  • K Cost of capital - % per year (from prior calculation)
  • g Forecast growth rate during CAP - % per year (from advanced finance system)
  • Every component capitalization bot contains the information shown in Table 29. TABLE 29 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Organization or Enterprise ID 6. Component of Value (Revenue, Expense or Capital Change) 7. Sub Component of Value
  • processing passes to block 346 .
  • the component capitalization bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • the bots retrieve information for each component and sub-component of value from the advanced finance system table ( 147 ) and the component of value definition table ( 156 ) as required to calculate the capitalized value of each component.
  • the resulting values are then saved in the component of value definition table ( 156 ) in the application database ( 50 ) before processing advances to a block 347 .
  • the software in block 347 checks the bot date table ( 149 ) and deactivates any valuation bots with creation dates before the current system date.
  • the software in block 347 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) as required to initialize valuation bots for each enterprise, element and sub-element of value in the organization before processing advances to a block 348 .
  • Bots are independent components of the application that have specific tasks to perform.
  • their task is to calculate the contribution of every enterprise, element of value and sub-element of value in the organization using the overall procedure outlined in Table 7.
  • the first step in completing the calculation in accordance with the procedure outlined in Table 7, is determining the relative contribution of each enterprise and element of value by using a series of predictive models to find the best fit relationship between:
  • the system of the present invention uses 9 different types of predictive models to determine relative contribution: neural network; CART; projection pursuit regression; generalized additive model (GAM), redundant regression network; boosted Na ⁇ ve Bayes Regression; MARS; linear regression; and stepwise regression to determine relative contribution.
  • the model having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is the best fit model.
  • the “relative contribution algorithm” used for completing the analysis varies with the model that was selected as the “best-fit”. For example, if the “best-fit” model is a neural net model, then the portion of revenue attributable to each input vector is determined by the formula shown in Table 30.
  • the resulting values are stored in the element of value definition table ( 155 ) for each element and sub-element of value of each enterprise in the organization.
  • Every valuation bot contains the information shown in Table 32. TABLE 32 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise Contribution, Element of Value or Sub-Element of Value 6. Organization, Enteprise or Element of Value ID
  • processing passes to block 348 .
  • the valuation bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • the bots retrieve information from the element of value definition table ( 155 ) and the component of value definition table ( 156 ) as required to complete the valuation.
  • the resulting values are then saved in the element of value definition table ( 155 ) in the application database ( 50 ) before processing advances to a block 349 .
  • the software in block 349 checks the bot date table ( 149 ) and deactivates any residual bots with creation dates before the current system date. The software in block 349 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ) and the element of value definition table ( 155 ) as required to initialize residual bots for each enterprise in the organization.
  • Every residual bot contains the information shown in Table 34. TABLE 34 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Organization or Enterprise ID
  • the residual bots are initialized by the software in block 348 processing passes to block 349 .
  • the residual bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information from the element of value definition table ( 155 ) and the component of value definition table ( 156 ) as required to complete the residual calculation for the organization or enterprise. After the calculation is complete, the resulting values are then saved in the element of value definition table ( 155 ) in the application database ( 50 ) before processing advances to a block 402 .
  • the flow diagram in FIG. 7 details the processing that is completed by the portion of the application software ( 400 ) that analyzes the market sentiment for the enterprises in the organization. Processing begins in a software block 402 .
  • the software in block 402 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 409 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 404 .
  • the software in block 404 checks the bot date table ( 149 ) and deactivates any sentiment calculation bots with creation dates before the current system date. The software in block 404 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the external database table ( 146 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) and the real option value table ( 162 ) as required to initialize sentiment calculation bots for each enterprise in the organization.
  • Every sentiment calculation bot contains the information shown in Table 36. TABLE 36 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise ID
  • the sentiment calculation bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • the bots retrieve information from the external database table ( 146 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) and the real option value table ( 162 ) as required to complete the sentiment calculation for each enterprise.
  • the resulting values are then saved in the enterprise sentiment table ( 166 ) in the application database ( 50 ) before processing advances to a block 409 .
  • the software in block 409 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 412 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 410 .
  • the software in block 410 checks the bot date table ( 149 ) and deactivates any sentiment factor bots with creation dates before the current system date. The software in block 410 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the external database table ( 146 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) and the real option value table ( 162 ) as required to initialize sentiment factor bots for each enterprise in the organization.
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is to calculate sentiment related attributes including cumulative total value, the period to period rate of change in value, the rolling average value, a series of time lagged values as well as pre-specified combinations of variables called composite variables.
  • the bots also use attribute derivation algorithms such as the AQ program to create combinations of the variables that did't pre-specified for combination. While the AQ program is used in the preferred embodiment of the present invention, other attribute derivation algorithms such as the LINUS algorithms, may be used to the same effect.
  • the newly calculated sentiment factors are stored in the sentiment factor table ( 169 ) before processing advances to a block 411 .
  • Every sentiment factor bot contains the information shown in Table 37. TABLE 37 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise ID
  • sentiment factor bots are initialized by the software in block 410 processing passes to block 411 .
  • the sentiment factor bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ). After being activated, the bots retrieve information from the external database table ( 146 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) and the real option value table ( 162 ) as required to generate the sentiment factors for each enterprise. After the calculation is complete, the resulting values are then saved in the sentiment factors table ( 169 ) in the application database ( 50 ) before processing advances to a block 412 .
  • the software in block 412 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 502 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 413 .
  • the software in block 413 checks the bot date table ( 149 ) and deactivates any sentiment analysis bots with creation dates before the current system date.
  • the software in block 413 then retrieves the information from the system settings table ( 140 ), the metadata mapping table ( 141 ), the external database table ( 146 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ), the real option value table ( 162 ), the enteprise sentiment table ( 166 ) and the sentiment factors table ( 169 ) as required to initialize sentiment analysis bots for each enterprise in the organization.
  • Bots are independent components of the application that have specific tasks to perform. In the case of sentiment analysis bots, their primary task is determine the relationship between sentiment factors and the calculated sentiment for each enterprise in the organization.
  • a series of predictive model bots are initialized at this stage because it is impossible to know in advance which predictive model type will produce the “best” predictive model for the data from each commercial enterprise.
  • the series for each model includes 9 predictive model bot types: neural network; CART; projection pursuit regression; generalized additive model (GAM), redundant regression network; boosted Naive Bayes Regression; MARS; linear regression; and stepwise regression.
  • Every sentiment analysis bot contains the information shown in Table 38. TABLE 38 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Enterprise ID
  • the sentiment analysis bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • the bots retrieve information from the the system settings table ( 140 ), the metadata mapping table ( 141 ), the enteprise sentiment table ( 166 ) and the sentiment factors table ( 169 ) and randomly partition sentiment factors for each enterprise into a training set and a test set.
  • the software in block 414 uses “bootstrapping” where the different training data sets are created by re-sampling with replacement from the original training set, so data records may occur more than once.
  • the software in block 415 combines the results from the sentiment analysis from each bot type to determine the best set of sentiment factors for each enterprise.
  • the models having the smallest amount of error as measured by applying the mean squared error algorithm to the test data are given preference in determining the best set of variables.
  • the best set of variables contain the sentiment factors that correlate most strongly with changes in the components of value.
  • the best set of variables will hereinafter be referred to as the “sentiment drivers”.
  • the software in block 415 saves an indicator in each item record identifying the sentiment factors that are “sentiment drivers” before processing advances to block 502 .
  • the flow diagram in FIG. 8 details the processing that is completed by the portion of the application software ( 500 ) that creates and displays financial management reports, optionally prints financial management reports and optionally trades company equity securities.
  • the financial management reports use the Value Map® report format to summarize information about the categories of business value for the organization and each enterprise in the organization. If there are prior valuations, then a Value Creation report will be created to highlight changes in the categories of business value during the period between the prior valuation and the current valuation date.
  • System processing in this portion of the application software ( 900 ) begins in a block 502 .
  • the software in block 502 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 505 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 504 .
  • the software in block 504 checks the bot date table ( 149 ) and deactivates any report bots with creation dates before the current system date.
  • the software in block 504 then retrieves the information from the system settings table ( 140 ) and the report table ( 164 ) as required to determine the format (Value Map® & Value Creation format and/or traditional: balance sheet, income & cash flow statement format) and type of report (text or graphical) bots that need to be created for the organization, each enterprise in the organization and the sub-elements of value before processing advances to block 505 .
  • Bots are independent components of the application that have specific tasks to perform. In the case of report bots, their primary tasks are to: retrieve data from the system settings table ( 140 ), the basic finance system table ( 143 ), the advanced finance system table ( 147 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) and the real option value table ( 162 ), calculate market equity using the formula shown in Table 39 and generate the reports in the specified formats for the specified time period(s).
  • Market Equity (Current Operation Value) + ( ⁇ Real Option Values) ⁇ ( ⁇ Short Term Liabilities) ⁇ ( ⁇ Contingent & Long Term Liabilities) ⁇ (Book Value of Equity)
  • Every report bot contains the information shown in Table 40. TABLE 40 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Organization, Enterprise or Element of ValueID 6. Report Format (text or graphical) 7. Report Type (Value Map ®/Value Creation format or traditional format)
  • the report bots are initialized by the software in block 504 processing passes to a block 505 .
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • the bots retrieve information for the organization, enterprise or element of value from the element of value definition table ( 155 ), the component of value definition table ( 156 ) and the real option value table ( 1 ) as required to complete the report in accordance with the pre-specified format.
  • the resulting reports are then saved in the report table ( 164 ) in the application database ( 50 ).
  • the software in block 505 creates and displays all Value Map® reports and Value Creation Statement reports the user ( 20 ) requests using the report selection and display data window ( 705 ) in the general format shown in Table 41. Graphical reports such as those in a Hyperbolic Tree format that have been saved over time can be displayed like a “movie” shows the evolution of value over time.
  • the software in block 505 also prompts the user ( 20 ) using the report selection and display data window ( 705 ) to select reports for printing. After the user's input regarding reports to print has been stored in the reports table ( 164 ), processing advances to block 507 . If the user doesn't provide any input, then only the default reports specified by the user ( 20 ) in the system settings table ( 140 ) will be produced for storage.
  • the software in block 507 checks the reports tables ( 164 ) to determine if any reports have been designated for printing. If reports have been designated for printing, then processing advances to a block 506 .
  • the software in block 506 sends the designated reports to the printer ( 118 ). After the reports have been sent to the printer ( 118 ), processing advances to a software block 509 . Alternatively, if no reports were designated for printing then processing advances directly from block 507 to block 509 .
  • the software in block 509 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if trading in enterprise equity is authorized. If trading in enterprise equity is not authorized, then processing advances to a software block 507 . Alternatively, if trading in enterprise equity is authorized, then processing advances to a software block 510 .
  • the software in block 510 retrieves information from the system settings table ( 140 ) and the advanced finance system table ( 147 ) that is required to calculate the minimum amount of cash that will be available for investment in enteprise equity during the next 12 month period.
  • the system settings table ( 140 ) contains the minimum amount of cash and available securities that the user ( 20 ) indicated was required for enterprise operation while the advanced finance system table ( 147 ) contains a forecast of the cash balance for the enterprise for each period during the next 12 months.
  • processing advances to a software block 511 .
  • the software in block 511 checks the equity purchase table ( 165 ) and enterprise sentiment table ( 166 ) to see if there is negative sentiment in any enterprise with available cash. If there are no enterprises with negative sentiment and available cash, then processing advances a software block 602 . Alternatively, if there are enterprises with available cash and negative sentiment, then processing advances to a software block 512 .
  • the software in block 512 retrieves the current enterprise equity price from the external database table ( 146 ), calculates the number of shares that can be purchased using the available cash and then generates a purchase order for the number of shares that can be purchased.
  • the software in block 512 then prompts the user ( 20 ) via the purchase shares and confirm data window ( 706 ) to confirm the purchase.
  • the software in block 512 retrieves the on-line equity account information from the system settings table ( 140 ) and transmits and confirms the order to purchase the shares with the on-line broker via the network ( 45 ).
  • the details of equity purchase transaction and confirmation are saved in the equity purchase table ( 156 ) before processing advances to block 602 .
  • the flow diagram in FIG. 9 details the processing that is completed by the portion of the application software ( 600 ) that generates and analyzes value improvements. Processing in this portion of the application starts in software block 602 .
  • the software in block 602 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 606 . Alternatively, if the calculation is new or a structure change, then processing advances to a software block 603 .
  • the software in block 603 checks the bot date table ( 149 ) and deactivates any improvement bots with creation dates before the current system date. The software in block 603 then retrieves the information from the system settings table ( 140 ), the soft asset system table ( 148 ), the element of value definition table ( 155 ) and the component of value definition table ( 156 ) as required to initialize improvement bots before processing advances to a block 604 .
  • Bots are independent components of the application that have specific tasks to perform.
  • their primary task is to analyze and prioritize potential changes to value drivers for each enterprise in the organization.
  • the analysis of value driver changes closely mirrors the calculation of profit improvement that was completed in the related U.S. Pat. No. 5,615,109 a “Method of and System for Generating Feasible, Profit Maximizing Requisition Sets”.
  • the capital efficiency of the potential improvements identified by the improvement bots is evaluated in accordance with the formula shown in Table 43.
  • the software in block 604 generates a list of potential improvements for each element of value defined and measured by the system of the present invention.
  • Every improvement bot contains the information shown in Table 44.
  • TABLE 44 1. Unique ID number (based on date, hour, minute, second of creation) 2. Creation date (day, hour, minute, second) 3. Mapping information 4. Storage location 5. Element of ValueID 6. Soft Asset System 7. Value Driver
  • the improvement bots are initialized by the software in block 603 processing passes to a block 604 .
  • the bots activate in accordance with the frequency specified by the user ( 20 ) in the system settings table ( 140 ).
  • the bots retrieve information for the element of value from the system settings table ( 140 ), the soft asset system table ( 148 ), the element of value definition table ( 155 ) and the component of value definition table ( 156 ) as required to complete the analyses in accordance with the formula shown in Table 40.
  • the soft asset management system that corresponds to the element of value being analyzed may also have generated a list of potential improvements.
  • the software in block 605 prepares a list of the potential value improvements in capital efficiency order and prompts the user ( 20 ) via a value driver and structure change window ( 707 ) to modify and/or select the improvements and/or structure changes that should be included in the revised forecast. If the user ( 20 ) chooses not to enter any selections, then the software in block 605 will select the potential improvements that produce the most benefit within the constraints imposed by the available cash.
  • the information regarding the improvement selections made by the user ( 20 ) or the system are stored in the value driver change table ( 167 ) in the application database ( 50 ). In a similar fashion, if the user made any changes to the structure, the information regarding the new change is stored in the system settings table ( 140 ) before processing advances to a software block 606 .
  • the software in block 606 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a structure change. If the calculation is new or a structure change, then processing advances to software block 204 and the processing described above is repeated. Alternatively, if the calculation is not a structure change, then processing advances to a software block 610 .
  • the software in block 610 retrieves information from the system settings table ( 140 ), the element of value definition table ( 155 ), the component of value definition table ( 156 ) and the value driver change table ( 167 ) as required to define and initialize a probabilistic simulation model.
  • the preferred embodiment of the probabilistic simulation model is a Markov Chain Monte Carlo model, however, other simulation models can be used with similar results.
  • the information defining the model is then stored in the simulation table ( 168 ) before the software in block 610 iterates the model as required to ensure the convergence of the frequency distribution of the output variables.
  • the software in block 610 saves the resulting information in the simulation table ( 168 ) before displaying the results of the simulation to the user ( 20 ) via a Value MentorTM Reports data window ( 708 ) that uses a summary Value MapTM report format to display the mid point and the range of estimated future values for the various elements of each enterprise and the changes in value drivers, user-specified or system generated, that drove the future value estimate.
  • the user ( 20 ) is prompted to indicate when the examination of the displayed report is complete and to indicate if any reports should be printed. If the user ( 20 ) doesn't provide any information regarding reports to display or print, then no reports are displayed or printed at this point and system processing continues.
  • the information entered by the user ( 20 ) is entered in to the report table ( 164 ) before processing advances to a block 611 .
  • the software in block 611 checks the reports tables ( 164 ) to determine if any additional reports have been designated for printing. If additional reports have been designated for printing, then processing advances to a block 612 which prepares and sends the designated reports to the printer ( 118 ). After the reports have been sent to the printer ( 118 ), processing advances to a software block 614 . If the software in block 611 determines that no additional reports have been designated for printing, then processing advances directly to block 614 .
  • the software in block 614 checks the system settings table ( 140 ) in the application database ( 50 ) to determine if the current calculation is a continuous calculation. If the calculation is a continuous calculation, then processing advances to software block 204 where the processing described previously is repeated continuously. Alternatively, if the calculation is not continuous, then processing advances to a software block 615 where processing stops.

Abstract

An automated method and system (100) for identifying, measuring and enhancing categories of value for the different levels of a value chain on a continual basis. The categories of value are analyzed at each level in the value chain using predictive models and vector creation algorithms to define the enterprise and element vectors before valuing the organization, each enterprise in the organization and the elements of value in each enterprise. The relative strengths of the intangible elements of value are used in evaluating the real options of each enterprise and in determining the allocation of industry real options to the enterprise and the organization before summary reports are prepared, displayed and optionally printed. The system then generates potential value improvements which the user (20) optionally accepts, rejects or modifies before simulations are completed to analyze the value impact of the enhancements.

Description

  • Application Ser. No. 09/295,337, filed Apr. 21, 1999, application Ser. No. 09/293,336, filed Apr. 16, 1999, application Ser. No. 09/135,983 filed Aug. 17, 1998, application Ser. No. 08/999,245, filed Dec. 10, 1997 and application Ser. No. 08/779,109, filed Jan. 6, 1997 which are also incorporated herein by reference. The subject matter of this application is also related to the subject matter of U.S. Pat. No. 5,615,109 for “Method of and System for Generating Feasible, Profit Maximizing Requisition Sets”, application Ser. No. 09/938,874 filed Aug. 27, 2001, of application Ser. No. 09/761,671 filed Jan. 18, 2001, of application Ser. No. 09/764,068 filed Jan. 19, 2001, of application Ser. No. 10/097,344 filed Mar. 13, 2002, of application Ser. No. 10/298,021 filed Nov. 18, 2003, of application Ser. No, 10/282,113 filed Oct. 29, 2002, of application Ser. No. 10/287,586 filed Nov. 5, 2002, of application Ser. No. 10/283,083 filed Oct. 30, 2002, of application Ser. No. 10/441,385 filed May 20, 2003 and of application Ser. No. 10/674,861 filed Aug. 25, 2003 by Jeff S. Eder, the disclosures of which are also incorporated herein by reference.[0001]
  • BACKGROUND OF THE INVENTION
  • This invention relates to a method of and system for business valuation, more particularly, to an automated system that identifies, evaluates and helps improve the management of the categories of value for a value chain and for each enterprise in the value chain on a continual basis. [0002]
  • The internet has had many profound effects on global commerce. The dramatic increase in the use of email, the explosion of e-commerce and the meteoric rise in the market value of internet firms like eBay, Amazon.com and Yahoo! are some of the more visible examples of the impact it has had on the American economy. Another impact of the internet has been that it has enabled the “virtual integration” of companies in different locations and different industries. Companies can now join together in a matter of days with essentially no investment to form a “virtual value chain” for delivering products and services to consumers. [0003]
  • The virtual value chain may appear to the consumer as a single entity, when in reality a number of enterprises from different continents have joined together to complete the preparation and delivery of the good or service that is ultimately being purchased. Virtual value chains allow each firm in the value chain to focus on their own specialty, be it manufacturing, design, distribution or marketing while reaping the benefits of the increased scale and scope inherent in the alliance. Enabled by the low cost communication capability provided by the internet, the virtual value chain is really just an extreme form of a phenomenon that has been sweeping American industry for many years—the electronic linkage of businesses. [0004]
  • Despite the widespread accceptance and use of “virtual value chains” as a mechanism for efficiently and effectively responding to customer demands, there is no known method or system for systematically evaluating the value of these new types of organizations. In a similar manner there is no known method or system for evaluating the contribution of the different enterprises in the “virtual value chain”. [0005]
  • The need for a systematic approach for evaluating “virtual value chains” is just part of a larger need that has recently appeared for a new method for systematically evaluating the financial performance of a commercial business. The need for a new approach has been highlighted in the past two years by the multi-billion dollar valuations being placed on internet companies like Amazon.com, E trade and eBay that have never earned a dollar of profit and that have no prospect of earning a dollar of profit any time soon. The most popular traditional approaches to valuation are all based on some multiple of accounting earnings (a price to earnings ratio or P/E ratio)—with no corporate earnings in the past or the foreseeable future—these methods are of course useless in evaluating the new companies. [0006]
  • The inability of traditional methods to provide a framework for analyzing “virtual value chains” and internet firms are just two glaring examples of the weakness of traditional financial systems. Numerous academic studies have demonstrated that accounting earnings don't fully explain changes in company valuations and the movement of stock prices. Many feel that because of this traditional accounting systems are driving information-age managers to make the wrong decisions and the wrong investments. Accounting systems are “wrong” for one simple reason, they track tangible assets while ignoring intangible assets. Intangible assets such as the skills of the workers, intellectual property, business infrastructure, databases, and relationships with customers and suppliers are not measured with current accounting systems. This oversight is critical because in the present economy the success of an enterprise is determined more by its ability to use its intangible assets than by its ability to amass and control the physical ones that are tracked by traditional accounting systems. [0007]
  • Consultants from McKinsey & Company recently completed a three year study of companies in 10 industry segments in 12 countries that confirmed the importance of intangible assets as enablers of new business expansion and profitable growth. The results of the study, published in the book [0008] The Alchemy of Growth, revealed three common characteristics of the most successful businesses in today's economy:
  • 1. They consistently utilize “soft” or intangible assets like brand names, customers and employees to support business expansion; [0009]
  • 2. They systematically generate and harvest real options for growth; and [0010]
  • 3. Their management focuses on 3 distinct “horizons”—short term (1-3 years), growth (3-5 years out) and options (beyond 5 years). [0011]
  • The experience of several of the most important companies in the U.S. economy, IBM, General Motors and DEC, in the late 1980's and early 1990's illustrates the problems that can arise when intangible asset information is omitted from corporate financial statements and companies focus only on the short term horizon. All three companies were showing large profits using current accounting systems while their businesses were deteriorating. If they had been forced to take write-offs when the declines in intangible assets were occurring, the problems would have been visible to the market and management would have been forced to act to correct the problems much more quickly than they actually did. These deficiencies of traditional accounting systems are particularly noticeable in high technology companies that are highly valued for their intangible assets and their options to enter growing markets rather than their tangible assets. [0012]
  • The appearance of a new class of software applications, soft asset management applications, is further evidence of the increasing importance of “soft” or intangible assets. Soft asset management applications (or systems) include: alliance management systems, brand management systems, customer relationship management systems, channel management systems, intellectual property management systems, process management systems and vendor management systems. While these systems enhance the day to day management of the individual “soft” assets, there is currently no mechanism for integrating the input from each of these different systems in to an overall organization or enterprise asset management system. As a result, the organization or enterprise can be (and often is) faced with conflicting recommendations as each system tries to optimize the asset it is focused on without considering the overall financial performance of the organization or enterprise. [0013]
  • A number of people have suggested using business valuations in place of traditional financial statements as the basis for measuring and managing financial performance. Unfortunately, using current methods, the valuation of a business is a complex and time-consuming undertaking. Business valuations determine the price that a hypothetical buyer would pay for a business under a given set of circumstances. The volume of business valuations being performed each year is increasing significantly. A leading cause of this growth in volume is the increasing use of mergers and acquisitions as vehicles for corporate growth. Business valuations are frequently used in setting the price for a business that is being bought or sold. Another reason for the growth in the volume of business valuations has been their increasing use in areas other than supporting merger and acquisition transactions. For example, business valuations are now being used by financial institutions to determine the amount of credit that should be extended to a company, by courts in determining litigation settlement amounts and by investors in evaluating the performance of company management. [0014]
  • Income valuations are the most common type of valuation. They are based on the premise that the current value of a business is a function of the future value that an investor can expect to receive from purchasing all or part of the business. In these valuations the expected returns from investing in the business and the risks associated with receiving the expected returns are evaluated by the appraiser. The appraiser then determines the value whereby a hypothetical buyer would receive a sufficient return on the investment to compensate the buyer for the risk associated with receiving the expected returns. One difficulty with this method is determining the lenth of time the company is expected to generate the expected returns that drive the valuation. Most income valuations use an explicit forecast of returns for some period, usually 3 to 5 years, combined with a “residual”. The residual is generally a flat or uniformly growing forecast of future returns that is discounted by some factor to estimate its value on the date of valuation. In some cases the residual is the largest part of the calculated value. [0015]
  • One of the problems inherent in a steady state “residual” forecast is that returns don't continue forever. Economists generally speak of a competitive advantage period or CAP (hereinafter referred to as CAP) during which a given firm is expected to generate positive returns. Under this theory, value is generated only during the CAP. After the CAP ends, value creation goes to zero or turns negative. Another change that has been produced by the internet economy is that the CAP for most businesses is generally thoght to be shrinking with the exception of companies whose products possess network externalities that tie others to the company and its products or services. These latter companies are thought to experience increasing returns as time goes by rather than having a finite CAP. Because the CAP is hard to calculate, it is generally ignored in income valuations however, the simplification of ignoring the CAP greatly reduces the utility of the valuations that are created with large residuals. [0016]
  • When performing a business valuation, the appraiser is generally free to select the valuation type and method (or some combination of the methods) in determining the business value. The usefulness of these valuations is limited because there is no correct answer, there is only the best possible informed guess for any given business valuation. The usefulness of business valuations to business owners and managers is restricted for another reason—valuations typically determine only the value of the business as a whole. To provide information that would be useful in improving the business, the valuation would have to furnish supporting detail that would highlight the value of different categories of value within the business. An operating manager would then be able to use a series of business valuations to identify categories within a business that have been decreasing in value. This information could also be used to help identify corrective action programs and to track the progress that these programs have made in increasing business value. This same information could also be used to identify categories that are contributing to an increase in business value. This information could be used to identify categories where increased levels of investment would have a significant favorable impact on the overall health of the business. [0017]
  • Even when intangible assets have been considered, the limitations in the existing methodology have severely restricted the utility of the valuations that have been produced. All known prior efforts to value intangible assets have been restricted to independent valuations of different types of intangible assets (similar to the individual soft asset management systems discussed previously). Intangible assets that have been valued separately in this manner include: brand names, customers and intellectual property. Problems associated with existing methods for valuing intangible assets include: [0018]
  • 1. interactions between the different intangible assets are ignored, [0019]
  • 2. the actual impact of the asset on the enterprise isn't measured, [0020]
  • 3. the relative strength of the intangible asset within the industry is just as important (and in some cases more important) than any absolute measure of its strength, and [0021]
  • 4. there is no systematic way for determining the life of the assets. [0022]
  • Typically, intangible asset valuations also ignore the real options for growth that are intimately inter-related and dependent upon the intangible assets being evaluated. In addition to having a direct influence on the valuation of a given real option the enterprise may possess, intangible assets can affect the market's perception of which company is likely to receive the lions share of future growth in a given industry. This, in turn affects the allocation of industry options to the market price for equity in the enterprise. [0023]
  • The lack of a consistent, well accepted, realistic method for measuring all the categories of business value also prevents some firms from receiving the financing they need to grow. Most banks and lending institutions focus on book value when evaluating the credit worthiness of a business seeking funds. As stated previously, the value of many high technology firms lies primarily in intangible assets and real options that aren't visible under traditional definitions of accounting book value. As a result, these businesses generally aren't eligible to receive capital from traditional lending sources, even though their financial prospects are generally far superior to those of companies with much higher tangible book values. [0024]
  • In light of the preceding discussion, it is clear that it would be advantageous to have an automated financial system that valued all the assets and options for a given organization. Ideally, this system would be capable of generating detailed valuations for businesses in new industries while prioritizing and coordinating the management of the different soft assets that the organization is tracking. [0025]
  • SUMMARY OF THE INVENTION
  • It is a general object of the present invention to provide a novel and useful system that continuously calculates and displays a comprehensive and accurate valuation for all the categories of value for a virtual organization that overcomes the limitations and drawbacks of the existing art that were described previously. [0026]
  • A preferable object to which the present invention is applied is the valuation and coordinated management of the different categories of value within an organization that consists of two or more commercial enterprises that have come together to form a “virtual value chain” for the purpose of delivering products or services to customers where a large portion of the organization's business value is associated with intangibles and real options. [0027]
  • The present invention also provides the ability to calculate and display a comprehensive and accurate valuation for the categories of value for each commercial enterprise within the virtual value chain. The ability to “drill down” for more detailed analysis extends to each element of value within each enterprise in the “virtual value chain” as illustrated in Table 1. [0028]
    TABLE 1
    Level Valuation Categories
    Organization Current Operation: Assets/Liabilities
    Current Operation: Enterprise
    Contribution &
    Joint: Real options/Contingent Liabilities
    Enterprise Current Operation: Assets/Liabilities
    Current Operation: Elements of Value
    Real Options/Contingent Liabilities &
    Market Sentiment
    Element of Value Sub-elements of value
  • The present invention eliminates a great deal of time-consuming and expensive effort by automating the extraction of data from the databases, tables, and files of existing computer-based corporate finance, operations, human resource and “soft” asset management system databases as required to operate the system. In accordance with the invention, the automated extraction, aggregation and analysis of data from a variety of existing computer-based systems significantly increases the scale and scope of the analysis that can be completed. The system of the present invention further enhances the efficiency and effectiveness of the business valuation by automating the retrieval, storage and analysis of information useful for valuing categories of value from external databases and publications and the internet. Uncertainty over which method is being used for completing the valuation and the resulting inability to compare different valuations is eliminated by the present invention by consistently utilizing the same set of valuation methodologies for valuing the different categories of organization value as shown in Table 2. [0029]
    TABLE 2
    Organization Categories of Value Valuation methodology
    Total current-operation value (COPTOT): Income Valuation
    Current Operation Cash & Marketable Securities GAAP for portion of assets/liabilities
    Assets/Liabilities: (CASH), Inventory (IN), from each enterprise that are devoted
    Accounts Receivable (AR), to the organization
    Prepaid Expenses (PE),
    Other Assets (OA); Accounts
    Payable (AP), Notes Payable
    (NP), Other Liabilities (OL)
    Curent Operation Production Equipment Replacement Value for portion of
    Assets/Liabilities: (PEQ), Other Physical Assets assets from each enterprise that are
    (OPA) devoted to the organization
    Current Operation Enterprise contribution to System calculated value
    Enterprise virtual value chain (VVCC)
    Contribution:
    Current Operation General going concern GGCV = COPTOT − CASH − AR − IN −
    Enterprise element of value (GGCV) PE − PEQ − OPA − OA − VVCC
    Contribution:
    Real options/Contingent Liabilities Real option algorithms + allocation of
    industry real options based on relative
    industry position
  • The present invention takes a similar approach to enterprise value analysis by consistently utilizing the same set of valuation methodologies for valuing the different categories of enteprise value as shown in Table 3. [0030]
    TABLE 3
    Enterprise Categories of Value Valuation methodology
    Total current-operation value (COPTOT): Income Valuation
    Current-operation Cash & Marketable Securities GAAP
    Assets/Liabilities: (CASH), Inventory (IN),
    Accounts Receivable (AR),
    Prepaid Expenses (PE),
    Other Assets (OA), Accounts
    Payable (AP), Notes Payable
    (NP), Other Liabilities (OL)
    Current-operation Production Equipment Replacement Value
    Assets/Liabilities: (PEQ), Other Physical Assets
    (OPA)
    Current Operation Alliances, Brand Names, System calculated value
    Elements of Value Channel Partners,
    (EV): Customers, Employees,
    Industry Factors*,
    Infrastructure, Intellectual
    Property, Information
    Technology, Processes and
    Vendors
    Current Operation General going concern GCV = COPTOT − CASH − AR − IN −
    Element of Value: (GCV) PE − PEQ − OPA − OA − ΣEV
    Real options/Contingent Liabilities Real option algorithms + allocation of
    industry real options based on relative
    strength of elements of value (EV)
    Market Sentiment Enterprise Market Value − (COPTOT +
    ΣReal option Values)
  • There is no market sentiment calculation at the organization level because the market value of each enterprise in the organization generally includes non-value chain related activities and the firm level market sentiment for each enterprise can not readily be sub-divided in to value chain and non-value chain sentiment. [0031]
  • The market value of each enterprise in the organization is calculated by adding the market value of all debt and equity as shown in Table 4. [0032]
    TABLE 4
    Enterprise Market Value =
    Σ Market value of enterprise equity +
    Σ Market value of company debt
  • One benefit of the novel system is that the market value of every enterprise in the organization is subdivided in to at least three distinct categories of value: current operation assets, elements of value and real options. As shown in the table 5, these three value categories match the three distinct “horizons” for management focus the McKinsey consultants reported on in [0033] The Alchemy of Growth.
    TABLE 5
    System Value Categories Three Horizons
    Current Operation Assets Short Term
    Elements of Value Growth
    Real Options Options
  • The utility of the valuations produced by the system of the present invention are further enhanced by explicitly calculating the lives of the different elements of value as required to remove the inaccuracy and distortion inherent in the use of a large residual. [0034]
  • As shown in Tables 2 and 3, growth opportunities and contingent liabilities are valued using real option algorithms. Because real option algorithms explicitly recognize whether or not an investment is reversible and/or if it can be delayed, the values calculated using these algorithms are more realistic than valuations created using more traditional approaches like Net Present Value. The use of real option analysis for valuing growth opportunities and contingent liabilities (hereinafter, real options) gives the present invention a distinct advantage over traditional approaches to business valuation. [0035]
  • The innovative system has the added benefit of providing a large amount of detailed information concerning both tangible and intangible elements of value. Because intangible elements are by definition not tangible, they can not be measured directly. They must instead be measured by the impact they have on their surrounding environment. There are analogies in the physical world. For example, electricity is an “intangible” that is measured by the impact it has on the surrounding environment. Specifically, the strength of the magnetic field generated by the flow of electricity through a conductor is used to determine the amount of electricity that is being consumed. The system of the present invention measures intangible elements of value by identifying the attributes that, like the magnetic field, reflect the strength of the element in driving the components of value (revenue, expense and change in capital) and are easy to measure. Once the attributes related to each element's strength are identified, they are summarized into a single expression (a composite variable or vector). The vectors for all elements are then evaluted to determine their relative contribution to driving each of the components of value. The system of the present invention calculates the product of each element's relative contribution and forecast life to determine the contribution to each of the components of value. The contributions to each component of value are then added together to determine the value of each element (see Table 7). [0036]
  • The system also gives the user the ability to track the changes in categories of value by comparing the current valuations to previously calculated valuations. As such, the system provides the user with an alternative to general ledger accounting systems for tracking financial performance. To facilitate its use as a tool for improving the value of a commercial enterprise, the system of the present invention produces reports in formats that are similar to the reports provided by traditional accounting systems. The method for tracking the categories of value for a business enterprise provided by the present invention eliminates many of the limitations associated with current accounting systems that were described previously. [0037]
  • BRIEF DESCRIPTION OF DRAWINGS
  • These and other objects, features and advantages of the present invention will be more readily apparent from the following description of the preferred embodiment of the invention in which: [0038]
  • FIG. 1 is a block diagram showing the major processing steps of the present invention; [0039]
  • FIG. 2 is a diagram showing the files or tables in the application database of the present invention that are utilized for data storage and retrieval during the processing that values the categories of value within the organization; [0040]
  • FIG. 3 is a block diagram of an implementation of the present invention; [0041]
  • FIG. 4 is a diagram showing the data windows that are used for receiving information from and transmitting information to the user ([0042] 20) during system processing;
  • FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F are block diagrams showing the sequence of steps in the present invention used for specifying system settings and for initializing and operating the data bots that extract, aggregate, store and manipulate information utilized in system processing from: user input, the basic financial system database, the operation management system database, the human resource information system database, external databases, the advanced financial system database, soft asset management system databases and the internet; [0043]
  • FIG. 6A, FIG. 6B and FIG. 6C are block diagrams showing the sequence of steps in the present invention that are utilized for initializing and operating the analysis bots; [0044]
  • FIG. 7 is a block diagram showing the sequence of steps in the present invention used for the analyzing enterprise market sentiment; [0045]
  • FIG. 8 is a block diagram showing the sequence of steps in the present invention used in trading organization stock and in preparing, displaying and optionally printing reports; and [0046]
  • FIG. 9 is a block diagram showing the sequence of steps in the present invention used for generating lists of value enhancing changes and calculating, displaying and optionally printing simulations of the effects of user-specified and/or system generated changes in business value drivers on the financial performance and the future value of the organization and the enterprises in the organization; [0047]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • FIG. 1 provides an overview of the processing completed by the innovative system for business valuation. In accordance with the present invention, an automated method of and system ([0048] 100) for business valuation is provided. Processing starts in this system (100) with a the specification of system settings and the initialization and activation of software data “bots” (200) that extract, aggregate, manipulate and store the data and user (20) input required for completing system processing. This information is extracted via a network (45) from a basic financial system database (5), an operation management system database (10), a human resource information system database (15), an external database (25), an advanced financial system database (30), soft asset management system databases (35) and the internet (40). These information extractions and aggregations may be influenced by a user (20) through interaction with a user-interface portion of the application software (700) that mediates the display, transmission and receipt of all information to and from a browser (800) that the user (20) interacts with. While only one database of each type (5, 10, 15, 25, 30 and 35) is shown in FIG. 1, it is to be understood that the system (100) can extract data from multiple databases of each type via the network (45). The preferred embodiment of the present invention contains a soft asset management system for each element of value being analyzed. Automating the extraction and analysis of data from each soft asset management system ensures that the management of each soft asset is considered and prioritized within the overall financial models for the organization and for each enterprise in the organization. It should also be understood that it is possible to complete a bulk extraction of data from each database (5, 10, 15, 25, 30 and 35) via the network (45) using data extraction applications such as Aclue from Decisionism and Power Center from Informatica before initializing the data bots. The data extracted in bulk could be stored in a single datamart or datawarehouse where the data bots could operate on the aggregated data.
  • All extracted information is stored in a file or table (hereinafter, table) within an application database ([0049] 50) as shown in FIG. 2. The application database (50) contains tables for storing user input, extracted information and system calculations including a system settings table (140), a metadata mapping table (141), a conversion rules table (142), a basic financial system table (143), an operation system table (144), a human resource system table (145), an external database table (146), an advanced finance system table (147), a soft asset system table (148), a bot date table (149), a keyword table (150), a classified text table (151), a geospatial measures table (152), a composite variables table (153), an industry ranking table (154), an element of value definition table (155), a component of value definition table (156), a cluster ID table (157), an element variables table (158), a vector table (159), a bot table (160), a cash flow table (161), a real option value table (162), an enterprise vector table (163), a report table (164), an equity purchase table (165), an enterprise sentiment table (166), a value driver change table (167), a simulation table (168) and a sentiment factors table (169). The application database (50) can optionally exist as a datamart, data warehouse or departmental warehouse. The system of the present invention has the ability to accept and store supplemental or primary data directly from user input, a data warehouse or other electronic files in addition to receiving data from the databases described previously. The system of the present invention also has the ability to complete the necessary calculations without receiving data from one or more of the specified databases. However, in the preferred embodiment all required information is obtained from the specified data sources (5, 10, 15, 25, 30, 35 and 40).
  • As shown in FIG. 3, the preferred embodiment of the present invention is a computer system ([0050] 100) illustratively comprised of a user-interface personal computer (110) connected to an application server personal computer (120) via a network (45). The application server personal computer (120) is in turn connected via the network (45) to a database-server personal computer (130). The user interface personal computer (110) is also connected via the network (45) to an internet browser applicance (90) that contains browser software (800) such as Microsoft Internet Explorer or Netscape Navigator.
  • The database-server personal computer ([0051] 130) has a read/write random access memory (131), a hard drive (132) for storage of the application database (50), a keyboard (133), a communications bus (134), a CRT display (135), a mouse (136), a CPU (137) and a printer (138).
  • The application-server personal computer ([0052] 120) has a read/write random access memory (121), a hard drive (122) for storage of the non user interface portion of the application software (200, 300, 400, 500 and 600) of the present invention, a keyboard (123), a communications bus (124), a CRT display (125), a mouse (126), a CPU (127) and a printer (128). While only one client personal computer is shown in FIG. 3, it is to be understood that the application-server personal computer (120) can be networked to fifty or more client personal computers (110) via the network (45). The application-server personal computer (120) can also be networked to fifty or more server, personal computers (130) via the network (45). It is to be understood that the diagram of FIG. 3 is merely illustrative of one embodiment of the present invention.
  • The user-interface personal computer ([0053] 110) has a read/write random access memory (111), a hard drive (112) for storage of a client data-base (49) and the user-interface portion of the application software (700), a keyboard (113), a communications bus (114), a CRT display (115), a mouse (116), a CPU (117) and a printer (118).
  • The application software ([0054] 200, 300, 400, 500, 600 and 700) controls the performance of the central processing unit (127) as it completes the calculations required to calculate the detailed business valuation. In the embodiment illustrated herein, the application software program (200, 300, 400, 500, 600 and 700) is written in a combination of C++ and Visual Basic®. The application software (200, 300, 400, 500, 600 and 700) can use Structured Query Language (SQL) for extracting data from the databases and the internet (5, 10, 15, 25, 30, 35 and 40). The user (20) can optionally interact with the user-interface portion of the application software (700) using the browser software (800) in the browser appliance (90) to provide information to the application software (200, 300, 400, 500, 600 and 700) for use in determining which data will be extracted and transferred to the application database (50) by the data bots.
  • User input is initially saved to the client database ([0055] 49) before being transmitted to the communication bus (125) and on to the hard drive (122) of the application-server computer via the network (45). Following the program instructions of the application software, the central processing unit (127) accesses the extracted data and user input by retrieving it from the hard drive (122) using the random access memory (121) as computation workspace in a manner that is well known.
  • The computers ([0056] 110, 120 and 130) shown in FIG. 3 illustratively are IBM PCs or clones or any of the more powerful computers or workstations that are widely available. Typical memory configurations for client personal computers (110) used with the present invention should include at least 256 megabytes of semiconductor random access memory (111) and at least a 50 gigabyte hard drive (112). Typical memory configurations for the application-server personal computer (120) used with the present invention should include at least 1028 megabytes of semiconductor random access memory (121) and at least a 100 gigabyte hard drive (122). Typical memory configurations for the database-server personal computer (130) used with the present invention should include at least 2056 megabytes of semiconductor random access memory (135) and at least a 500 gigabyte hard drive (131).
  • Using the system described above, the value of the organiztion, each enterprise within the organization and each element of value can be broken down into the value categories listed in Table 1. As shown in Table 2 and Table 3, the value of the current-operation will be calculated using an income valuation. An integral part of most income valuation models is the calculation of the present value of the expected cash flows, income or profits associated with the current-operation. The present value of a stream of cash flows is calculated by discounting the cash flows at a rate that reflects the risk associated with realizing the cash flow. For example, the present value (PV) of a cash flow of ten dollars ($10) per year for five (5) years would vary depending on the rate used for discounting future cash flows as shown below. [0057]
    Discount rate = 25%
    PV = 10 + 10 + 10 + 10 + 10 = 26.89
    {overscore (1.25)} {overscore ((1.25))}2 {overscore ((1.25))}3 {overscore ((1.25))}4 {overscore ((1.25))}5
    Discount rate = 35%
    PV = 10 + 10 + 10 + 10 + 10 = 22.20
    {overscore (1.35)} {overscore ((1.35))}2 {overscore ((1.35))}3 {overscore ((1.35))}4 {overscore ((1.35))}5
  • One of the first steps in evaluating the elements of current-operation value is extracting the data required to complete calculations in accordance with the formula that defines the value of the current-operation as shown in Table 6. [0058]
    TABLE 6
    Value of curr nt-op ration =
    (R) Value of forecast revenue from current-operation (positive) +
    (E) Value of forecast expense for current-operation (negative) +
    (C)* Value of current operation capital change forecast
  • The three components of current-operation value will be referred to as the revenue value (R), the expense value (E) and the capital value (C). Examination of the equation in Table 6 shows that there are three ways to increase the value of the current-operation—increase the revenue, decrease the expense or decrease the capital requirements (note: this statement ignores a fourth way to increase value—decrease interest rate used for discounting future cash flows). [0059]
  • In the preferred embodiment, the revenue, expense and capital requirement forecasts for the current operation, the real options and the contingent liabilities are obtained from an advanced financial planning system database ([0060] 30) from an advanced financial planning system similar to the one disclosed in U.S. Pat. No. 5,615,109. The extracted revenue, expense and capital requirement forecasts are used to calculate a cash flow for each period covered by the forecast for the organization and each enterprise in the organization by subtracting the expense and change in capital for each period from the revenue for each period. A steady state forecast for future periods is calculated after determining the steady state growth rate the best fits the calculated cash flow for the forecast time period. The steady state growth rate is used to calculate an extended cash flow forecast. The extended cash flow forecast is used to determine the Competitive Advantage Period (CAP) implicit in the enteprise market value.
  • While it is possible to use analysis bots to sub-divide each of the components of current operation value into a number of sub-components for analysis, the preferred embodiment has a pre-determined number of sub-components for each component of value for the organization and each enterprise in the organization. The revenue value is not subdivided. In the preferred embodiment, the expense value is subdivided into five sub-components: the cost of raw materials, the cost of manufacture or delivery of service, the cost of selling, the cost of support and the cost of administration. The capital value is subdivided into six sub-components: cash, non-cash financial assets, production equipment, other assets (non financial, non production assets), financial liabilities and equity. The production equipment and equity sub-components are not used directly in evaluating the elements of value. [0061]
  • The components and sub-components of current-operation value will be used in calculating the value of: enteprise contribution, elements of value and sub-elements of value. Enterprise contribution will be defined as “the economic benefit that as a result of past transactions an enterprise is expected to provide to an organization.” In a similar fashion, an element of value will be defined as “an identifiable entity or group of items that as a result of past transactions has provided and is expected to provide economic benefit to an enterprise”. An item will be defined as a single member of the group that defines an element of value. For example, an individual salesman would be an “item” in the “element of value” sales staff. The data associated with performance of an individual item will be referred to as “item variables”. [0062]
  • Analysis bots are used to determine enterprise and element of value lives and the percentage of: the revenue value, the expense value, and the capital value that are attributable to each element of value. The resulting values are then be added together to determine the valuation for different elements as shown by the example in Table 7. [0063]
    TABLE 7
    Percent- Element
    Gross Value age Life/CAP Net Value
    Revenue value = $120 M 20% 80% Value = $19.2 M
    Expense value = ($80 M) 10% 100%  Value = ($8.0) M
    Capital value = ($5 M)  5% 80% Value = ($0.2) M
    Total value = $35 M
    Net value for this element: Value = $11.0 M
  • The valuation of an organization and the enterprises in the organization using the approach outlined above is completed in five distinct stages. As shown in FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F the first stage of processing (block [0064] 200 from FIG. 1) programs bots to continually extract, aggregate, manipulate and store the data from user input and databases and the internet (5, 10, 15, 25, 30, 35 or 40) as required for the analysis of business value. Bots are independent components of the application that have specific tasks to perform. As shown in FIG. 6A, FIG. 6B and FIG. 6C the second stage of processing (block 300 from FIG. 1) programs analysis bots to continually:
  • 1. identify the item variables, item performance indicators and composite variables for each enterprise, element of value and sub-element of value that drive the components of value (revenue, expense and changes in capital), [0065]
  • 2. create vectors that summarize the performance of the item variables and item performance indicators for each enterprise contribution, element of value and sub-element of value, [0066]
  • 3. determine the appopriate cost of capital and value the organization and enteprise real options; [0067]
  • 4. determine the appopriate cost of capital, value and allocate the industry real options to each organization or enterprise on the basis of relative element strength; [0068]
  • 5. determine the expected life of each element of value and sub-element of value; [0069]
  • 6. calculate the organization and enterprise current operation values and value the revenue, expense and capital components said current operations using the information prepared in the previous stage of processing; [0070]
  • 7. specify and optimize predictive models to determine the relationship between the vectors determined in [0071] step 2 and the revenue, expense and capital values determined in step 6,
  • 8. combine the results of the fifth, sixth and seventh stages of processing to determine the value of each, enterprise contribution, element and sub-element (as shown in Table 7); [0072]
  • The third stage of processing (block [0073] 400 from FIG. 1) analyzes the market sentiment associated with each enterprise as shown in FIG. 7. The fourth stage of processing (block 500 from FIG. 1) displays the results of the prior calculations in specified formats and optionally generates trades in enterprise stock as shown in FIG. 8. The fifth and final stage of processing (block 600 from FIG. 1) identifies potential improvements in organization and enterprise operation and analyzes the impact of proposed improvements on financial performance and business value for the organization and each enterprise as shown in FIG. 9.
  • SYSTEM SETTINGS AND DATA BOTS
  • The flow diagrams in FIG. 5A, FIG. 5B, FIG. 5C, FIG. 5D, FIG. 5E and FIG. 5F detail the processing that is completed by the portion of the application software ([0074] 200) that extracts, aggregates, transforms and stores the information required for system operation from: the basic financial system database (5), operation management system database (10), human resource information system database (15), external database (25), advanced financial system database (30), soft asset management system database (35), the internet (40) and the user (20). A brief overview of the different databases will be presented before reviewing each step of processing completed by this portion (200) of the application software.
  • Corporate financial software systems are generally divided into two categories, basic and advanced. Advanced financial systems utilize information from the basic financial systems to perform financial analysis, financial planning and financial reporting functions. Virtually every commercial enterprise uses some type of basic financial system as they are required to use these systems to maintain books and records for income tax purposes. An increasingly large percentage of these basic financial systems are resident in microcomputer and workstation systems. Basic financial systems include general-ledger accounting systems with associated accounts receivable, accounts payable, capital asset, inventory, invoicing, payroll and purchasing subsystems. These systems incorporate worksheets, files, tables and databases. These databases, tables and files contain information about the company operations and its related accounting transactions. As will be detailed below, these databases, tables and files are accessed by the application software of the present invention as required to extract the information required for completing a business valuation. The system is also capable of extracting the required information from a data warehouse (or datamart) when the required information has been pre-loaded into the warehouse. [0075]
  • General ledger accounting systems generally store only valid accounting transactions. As is well known, valid accounting transactions consist of a debit component and a credit component where the absolute value of the debit component is equal to the absolute value of the credit component. The debits and the credits are posted to the separate accounts maintained within the accounting system. Every basic accounting system has several different types of accounts. The effect that the posted debits and credits have on the different accounts depends on the account type as shown in Table 8. [0076]
    TABLE 8
    Account Type: Debit Impact: Credit Impact:
    Asset Increase Decrease
    Revenue Decrease Increase
    Expense Increase Decrease
    Liability Decrease Increase
    Equity Decrease Increase
  • General ledger accounting systems also require that the asset account balances equal the sum of the liability account balances and equity account balances at all times. [0077]
  • The general ledger system generally maintains summary, dollar only transaction histories and balances for all accounts while the associated subsystems, accounts payable, accounts receivable, inventory, invoicing, payroll and purchasing, maintain more detailed historical transaction data and balances for their respective accounts. It is common practice for each subsystem to maintain the detailed information shown in Table 9 for each transaction. [0078]
    TABLE 9
    Subsystem Detailed Information
    Accounts Vendor, Item(s), Transaction Date, Amount
    Payable Owed, Due Date, Account Number
    Accounts Customer, Transaction Date, Product Sold,
    Receivable Quantity, Price, Amount Due, Terms, Due
    Date, Account Number
    Capital Asset ID, Asset Type, Date of Purchase,
    Assets Purchase Price, Useful Life, Depreciation
    Schedule, Salvage Value
    Inventory Item Number, Transaction Date, Transaction
    Type, Transaction Qty, Location, Account
    Number
    Invoicing Customer Name, Transaction Date, Item(s)
    Sold, Amount Due, Due Date, Account Number
    Payroll Employee Name, Employee Title, Pay
    Frequency, Pay Rate, Account Number
    Purchasing Vendor, Item(s), Purchase Quantity,
    Purchase Price(s), Due Date, Account
    Number
  • As is well known, the output from a general ledger system includes income statements, balance sheets and cash flow statements in well defined formats which assist management in measuring the financial performance of the firm during the prior periods when data input and system processing have been completed. [0079]
  • While basic financial systems are similar between firms, operation management systems vary widely depending on the type of company they are supporting. These systems typically have the ability to not only track historical transactions but to forecast future performance. For manufacturing firms, operation management systems such as Enterprise Resource Planning Systems (ERP), Material Requirement Planning Systems (MRP), Purchasing Systems, Scheduling Systems and Quality Control Systems are used to monitor, coordinate, track and plan the transformation of materials and labor into products. Systems similar to the one described above may also be useful for distributors to use in monitoring the flow of products from a manufacturer. [0080]
  • Operation Management Systems in manufacturing firms may also monitor information relating to the production rates and the performance of individual production workers, production lines, work centers, production teams and pieces of production equipment including the information shown in Table 10. [0081]
    TABLE 10
    Operation Management System - Production Information
    1. ID number (employee id/machine id)
    2. Actual hours - last batch
    3. Standard hours - last batch
    4. Actual hours - year to date
    5. Actual/Standard hours - year to date %
    6. Actual setup time - last batch
    7. Standard setup time - last batch
    8. Actual setup hours - year to date
    9. Actual/Standard setup hrs - yr to date %
    10. Cumulative training time
    11. Job(s) certifications
    12. Actual scrap - last batch
    13. Scrap allowance - last batch
    14. Actual scrap/allowance - year to date
    15. Rework time/unit last batch
    16. Rework time/unit year to date
    17. QC rejection rate - batch
    18. QC rejection rate - year to date
  • Operation management systems are also useful for tracking requests for service to repair equipment in the field or in a centralized repair facility. Such systems generally store information similar to that shown below in Table 11. [0082]
    TABLE 11
    Operation Management System - Service Call Information
    1. Customer name
    2. Customer number
    3. Contract number
    4. Service call number
    5. Time call received
    6. Product(s) being fixed
    7. Serial number of equipment
    8. Name of person placing call
    9. Name of person accepting call
    10. Promised response time
    11. Promised type of response
    12. Time person dispatched to call
    13. Name of person handling call
    14. Time of arrival on site
    15. Time of repair completion
    16. Actual response type
    17. Part(s) replaced
    18. Part(s) repaired
    19. 2nd call required
    20. 2nd call number
  • Computer based human resource systems may some times be packaged or bundled within enterprise resource planning systems such as those available from SAP, Oracle and Peoplesoft. Human resource systems are increasingly used for storing and maintaining corporate records concerning active employees in sales, operations and the other functional specialties that exist within a modern corporation. Storing records in a centralized system facilitates timely, accurate reporting of overall manpower statistics to the corporate management groups and the various government agencies that require periodic updates. In some cases human resource systems include the company payroll system as a subsystem. In the preferred embodiment of the present invention, the payroll system is part of the basic financial system. These systems can also be used for detailed planning regarding future manpower requirements. Human resource systems typically incorporate worksheets, files, tables and databases that contain information about the current and future employees. As will be detailed below, these databases, tables and files are accessed by the application software of the present invention as required to extract the information required for completing a business valuation. It is common practice for human resource systems to store the information shown in Table 12 for each employee. [0083]
    TABLE 12
    Human Resource System Information
    1. Employee name
    2. Job title
    3. Job code
    4. Rating
    5. Division
    6. Department
    7. Employee No./(Social Security Number)
    8. Year to date - hours paid
    9. Year to date - hours worked
    10. Employee start date - company
    11. Employee start date - department
    12. Employee start date - current job
    13. Training courses completed
    14. Cumulative training expenditures
    15. Salary history
    16. Current salary
    17. Educational background
    18. Current supervisor
  • External databases can be used for obtaining information that enables the definition and evaluation of a variety of things including elements of value, sentiment factors, industry real options and composite variables. In some cases information from these databases can be used to supplement information obtained from the other databases and the internet ([0084] 5, 10, 15, 30, 35 and 40). In the system of the present invention, the information extracted from external databases (25) can be in the forms listed in Table 13.
    Types of information
    a) numeric information such as that found
    in the SEC Edgar database and the databases
    of financial infomediaries such as FirstCall,
    IBES and Compustat,
    b) text information such as that found in the
    Lexis Nexis database and databases containing
    past issues from specific publications,
    c) multimedia information such as video and
    audio clips, and
    d) geospatial data.
  • The system of the present invention uses different “bot” types to process each distinct data type from external databases ([0085] 25). The same “bot types” are also used for extracting each of the different types of data from the internet (40). The system of the present invention must have access to at least one external database (25) that provides information regarding the equity prices for each enterprise in the organization and the equity prices and financial performance of competitors.
  • Advanced financial systems may also use information from external databases ([0086] 25) and the internet (40) in completing their processing. Advanced financial systems include financial planning systems and activity based costing systems. Activity based costing systems may be used to supplement or displace the operation of the expense component analysis segment of the present invention as disclosed previously. Financial planning systems generally use the same format used by basic financial systems in forecasting income statements, balance sheets and cash flow statements for future periods. Management uses the output from financial planning systems to highlight future financial difficulties with a lead time sufficient to permit effective corrective action and to identify problems in company operations that may be reducing the profitability of the business below desired levels. These systems are most often developed by individuals within companies using 2 and 3 dimensional spreadsheets such as Lotus 1-2-3 ®, Microsoft Excel® and Quattro Pro®. In some cases, financial planning systems are built within an executive information system (EIS) or decision support system (DSS). For the preferred embodiment of the present invention, the advanced financial system database is similar to the financial planning system database detailed in U.S. Pat. No. 5,165,109 for “Method of and System for Generating Feasible, Profit Maximizing Requisition Sets”, by Jeff S. Eder, the disclosure of which is incorporated herein by reference.
  • While advanced financial planning systems have been around for some time, soft asset management systems are a relatively recent development. Their appearance is further proof of the increasing importance of “soft” assets. Soft asset management systems include: alliance management systems, brand management systems, customer relationship management systems, channel management systems, intellectual property management systems, process management systems and vendor management systems. Soft asset management systems are similar to operation management systems in that they generally have the ability to forecast future events as well as track historical occurrences. Customer relationship management systems are the most well established soft asset management systems at this point and will the focus of the discussion regarding soft asset management system data. In firms that sell customized products, the customer relationship management system is generally integrated with an estimating system that tracks the flow of estimates into quotations, orders and eventually bills of lading and invoices. In other firms that sell more standardized products, customer relationship management systems generally are used to track the sales process from lead generation to lead qualification to sales call to proposal to acceptance (or rejection) and delivery. All customer relationship management systems would be expected to track all of the customer's interactions with the enterprise after the first sale and store information similar to that shown below in Table 14. [0087]
    TABLE 14
    Customer Relationship Management System - Information
    1. Customer/Potential customer name
    2. Customer number
    3. Address
    4. Phone number
    5. Source of lead
    6. Date of first purchase
    7. Date of last purchase
    8. Last sales call/contact
    9. Sales call history
    10. Sales contact history
    11. Sales history: product/qty/price
    12. Quotations: product/qty/price
    13. Custom product percentage
    14. Payment history
    15. Current A/R balance
    16. Average days to pay
  • System processing of the information from the different databases and the internet ([0088] 5, 10, 15, 25, 30, 35 and 40) described above starts in a block 201, FIG. 5A, which immediately passes processing to a software block 202. The software in block 202 prompts the user (20) via the system settings data window (701) to provide system setting information. The system setting information entered by the user (20) is transmitted via the network (45) back to the application server (120) where it is stored in the system settings table (140) in the application database (50) in a manner that is well known. The specific inputs the user (20) is asked to provide at this point in processing are shown in Table 15.
    TABLE 15
    1. New run or structure revision?
    2. Continuous, If yes, frequency? (hourly, daily,
    weekly, monthly or quarterly)
    3. Structure of virtual organization (organization,
    enterprises and sub-elements)
    4. Organization checklist
    5. Enterprise checklist
    6. Base acount structure
    7. Metadata standard (XML, MS OIM, MDC)
    8. Location of basic financial system database and metadata
    9. Location of advanced financial system database and metadata
    10. Location of human resource information system database
    and metadata
    11. Location of operation management system database and metadata
    12. Location of soft asset management system databases and metadata
    13. Location of external database and metadata
    14. Location of account structure
    15. Base currency
    16. Location of database and metadata for equity information
    17. Location of database and metadata for debt information
    18. Location of database and metadata for tax rate information
    19. Location of database and metadata for currency conversion
    rate information
    20. Geospatial data? If yes, identity of geocoding service.
    21. The maximum number of generations to be processed without
    improving fitness
    22. Default clustering algorithm (selected from list) and
    maximum cluster number
    23. Amount of cash and marketable securities required for day
    to day operations
    24. Weighted average cost of capital (optional input)
    25. Number of months a product is considered new after it
    is first produced
    26. Organization industry segments (SIC Code)
    27. Enterprise industry segments (SIC Code)
    28. Primary competitors by industry segment
    29. Management report types (text, graphic, both)
    30. Default reports
    31. Trading in enterprise equity authorized?
    32. On-line equity trading account information
    33. Default Missing Data Procedure
    34. Maximum time to wait for user input
  • The organization and enterprise checklists are used by a “rules” engine (such as the one available from Neuron Data) in [0089] block 202 to influence the number and type of items with pre-defined metadata mapping for each category of value. For example, if the checklists indicate that the organization and enterprises are focused on branded, consumer markets, then additional brand related factors will be pre-defined for mapping. The application of these system settings will be further explained as part of the detailed explanation of the system operation.
  • The software in [0090] block 202 also uses the current system date to determine the time periods (months) that require data in order to complete the current operation and the real option valuations and stores the resulting date range in the system settings table (140). In the preferred embodiment the valuation of the current operation by the system utilizes basic finance, advanced financial, soft asset management, external database and human resource data for the three year period before and the three year forecast period after the current date.
  • After the storage of system setting data is complete, processing advances to a [0091] software block 203. The software in block 203 prompts the user (20) via the metadata and conversion rules window (702) to map metadata using the standard specified by the user (20) (XML, Microsoft's Open Information Model of the Metadata Coalitions specification) from the basic financial system database (5), the operation management system database (10), the human resource information system database (15), the external database (25), the advanced financial system database (30) and the soft asset management system database (35) to the organizational hierarchy stored in the system settings table (140) and to the pre-specified fields in the metadata mapping table (141). Pre-specified fields in the metadata mapping table include, the revenue, expense and capital components and sub-components for the organization and each enterprise and pre-specified fields for expected value drivers. Because the bulk of the information being extracted is financial information, the metadata mapping often takes the form of specifying the account number ranges that correspond to the different fields in the metadata mapping table (141). Table 16, shows the base account number structure that the account numbers in the other systems must align with. For example, using the structure shown below, the revenue component for the organization could be specified as organization 01, any enterprise number, any deparment number, accounts 400 to 499 (the revenue account range) with any sub-account.
    TABLE 16
    Account Number
    01 - 800 - 901 - 677- 003
    Segment Organi- Enterprise Department Account Sub-
    zation account
    Subgroup Products Workstation Marketing Labor P.R.
    Position 5 4 3 2 1
  • As part of the metadata mapping process, any database fields that are not mapped to pre-specified fields are defined by the user ([0092] 20) as component of value. elements of value or non-relevant attributes and “mapped” in the metadata mapping table (141) to the corresponding fields in each database in a manner identical to that described above for the pre-specified fields. After all fields have been mapped to the metadata mapping table (141), the software in block 203 prompts the user (20) via the metadata and conversion rules window (702) to provide conversion rules for each metadata field for each data source. IConversion rules will include information regarding currency conversions and conversion for units of measure that may be required to accurately and consistently analyze the data. The inputs from the user (20) regarding conversion rules are stored in the conversion rules table (142) in the application database. When conversion rules have been stored for all fields from every data source, then processing advances to a software block 204.
  • The software in [0093] block 204 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 212. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 207.
  • The software in [0094] block 207 checks the bot date table (149) and deactivates any basic financial system data bots with creation dates before the current system date and retrieves information from the system setting table (140), metadata mapping table (141) and conversion rules table (142). The software in block 207 then initializes data bots for each field in the metadata mapping table (141) that mapped to the basic financial system database (5) in accordance with the frequency specified by user (20) in the system settings table (140). Bots are independent components of the application that have specific tasks to perform. In the case of data acquisition bots, their tasks are to extract and convert data from a specified source and then store it in a specified location. Each data bot initialized by software block 207 will store its data in the basic financial system table (143). Every data acquisition bot for every data source contains the information shown in Table 17.
    TABLE 17
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. The data source location
    3. Mapping information
    4. Timing of extraction
    5. Conversion rules (if any)
    6. Storage Location (to allow for tracking of source and destination
    events)
    7. Creation date (day, hour, minute, second)
  • After the software in [0095] block 207 initializes all the bots for the basic financial system database, processing advances to a block 208. In block 208, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the basic financial system database (5), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the basic financial system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the basic financial system table (143). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 210. The software in block 210 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converterd data is stored in the basic financial system table (143). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing passes, on to software block 212.
  • The software in [0096] block 212 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 224. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 221.
  • The software in [0097] block 221 checks the bot date table (149) and deactivates any operations management system data bots with creation dates before the current system date and retrieves information from the system setting table (140), metadata mapping table (141) and conversion rules table (142). The software in block 221 then initializes data bots for each field in the metadata mapping table (141) that mapped to the operations management system database (10) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 221 will store its data in the operations system table (144).
  • After the software in [0098] block 221 initializes all the bots for the operations management system database, processing advances to a block 222. In block 222, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the operations management system database (10), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the operations management system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the operations system table (144). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 210. The software in block 210 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converterd data is stored in the operations system table (144). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes, on to software block 224.
  • The software in [0099] block 224 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 228. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 225.
  • The software in [0100] block 225 checks the bot date table (149) and deactivates any human resource management system data bots with creation dates before the current system date and retrieves information from the system setting table (140), metadata mapping table (141) and conversion rules table (142). The software in block 225 then initializes data bots for each field in the metadata mapping table (141) that mapped to the human resource management system database (15) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 225 will store its data in the human resource system table (145).
  • After the software in [0101] block 225 initializes all the bots for the human resource management system database, processing advances to a block 226. In block 226, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the human resource management system database (15), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the human resource management system metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the human resource system table (145). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 210. The software in block 210 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converterd data is stored in the human resource system table (145). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes, on to software block 228.
  • The software in [0102] block 228 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 244. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 241.
  • The software in [0103] block 241 checks the bot date table (149) and deactivates any external database data bots with creation dates before the current system date and retrieves information from the system setting table (140), metadata mapping table (141) and conversion rules table (142). The software in block 241 then initializes data bots for each field in the metadata mapping table (141) that mapped to the external database (25) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 241 will store its data in the external database table (146).
  • After the software in [0104] block 241 initializes all the bots for the external database, processing advances to a block 242. In block 242, the bots extract and convert data in accordance with their preprogrammed instructions. As each bot extracts and converts data from the external database (25), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the external database metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the external database table (146). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 210. The software in block 210 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converterd data is stored in the external database table (146). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes, on to software block 244.
  • The software in [0105] block 244 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 248. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 245.
  • The software in [0106] block 245 checks the bot date table (149) and deactivates any advanced financial system data bots with creation dates before the current system date and retrieves information from the system setting table (140), metadata mapping table (141) and conversion rules table (142). The software in block 245 then initializes data bots for each field in the metadata mapping table (141) that mapped to the advanced financial system database (30) in accordance with the frequency specified by user (20) in the system settings table (140). Each data bot initialized by software block 245 will store its data in the advanced financial system database table (147).
  • After the software in [0107] block 245 initializes all the bots for the advanced financial system database, processing advances to a block 246. In block 246, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the advanced financial system database (30), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the advanced financial system database metadata to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the advanced financial system database table (147). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 210. The software in block 210 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converted data is stored in the advanced financial system database table (147). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes, on to software block 248.
  • The software in [0108] block 248 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 264. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 261.
  • The software in [0109] block 261 checks the bot date table (149) and deactivates any soft asset management system data bots with creation dates before the current system date and retrieves information from the system setting table (140), metadata mapping table (141) and conversion rules table (142). The software in block 261 then initializes data bots for each field in the metadata mapping table (141) that mapped to a soft asset management system database (35) in accordance with the frequency specified by user (20) in the system settings table (140). Extracting data from each soft asset management system ensures that the management of each soft asset is considered and prioritized within the overall financial models for the organization and each enterprise in the organization. Each data bot initialized by software block 261 will store its data in the soft asset system table (148).
  • After the software in [0110] block 261 initializes bots for all soft asset management system databases, processing advances to a block 262. In block 262, the bots extract and convert data in accordance with their preprogrammed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each bot extracts and converts data from the soft asset management system databases (35), processing advances to a software block 209 before the bot completes data storage. The software in block 209 checks the metadata for the soft asset management system databases to see if all fields have been extracted. If the software in block 209 finds no unmapped data fields, then the extracted, converted data is stored in the soft asset system table (148). Alternatively, if there are fields that haven't been extracted, then processing advances to a block 210. The software in block 210 prompts the user (20) via the metadata and conversion rules window (702) to provide metadata and conversion rules for each new field. The information regarding the new metadata and conversion rules is stored in the metadata mapping table (141) and conversion rules table (142) while the extracted, converterd data is stored in the soft asset system table (148). It is worth noting at this point that the activation and operation of bots that don't have unmapped fields continues. Only bots with unmapped fields “wait” for user input before completing data storage. The new metadata and conversion rule information will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes, on to software block 264.
  • The software in [0111] block 264 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 276. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 265.
  • The software in [0112] block 265 prompts the user (20) via the identification and classification rules window (703) to identify keywords such as company names, brands, trademarks, competitors for pre-specified fields in the metadata mapping table (141). The user (20) also has the option of mapping keywords to other fields in the metadata mapping table (141). After specifying the keywords, the user (20) is prompted to select and classify descriptive terms for each keyword. The input from the user (20) is stored in the keyword table (150) in the application database before processing advances to a software block 266.
  • The software in [0113] block 266 checks the bot date table (149) and deactivates any internet text bots with creation dates before the current system date and retrieves information from the system settings table (140), the metadata mapping table (141) and the keyword table (150). The software in block 266 then initializes internet text bots for each field in the metadata mapping table (141) that mapped to a keyword in accordance with the frequency specified by user (20) in the system settings table (140) before advancing processing to a software block 267.
  • Bots are independent components of the application that have specific tasks to perform. In the case of text bots, their tasks are to locate, count and classify keyword matches from a specified source and then store their findings in a specified location. Each text bot initialized by [0114] software block 266 will store the location, count and classification data it discovers in the classified text table (151). Multimedia data can be processed using bots with essentially the same specifications if software to translate and parse the multimedia content is included in each bot. Every internet text bot contains the information shown in Table 18.
    TABLE 18
    1. Unique ID number (based on date, hour, minute,
    second of creation)
    2. Creation date (day, hour, minute, second)
    3. Storage location
    4. Mapping information
    5. Home URL
    6. Keyword
    7. Descriptive term 1
    To
    7 + n. Descriptive term n
  • In [0115] block 267 the text bots locate and classify data from the external database (25) in accordance with their programmed instructions in accordance with the frequency specified by user (20) in the system settings table (140). As each text bot locates and classifies data from the internet (40) processing advances to a software block 268 before the bot completes data storage. The software in block 268 checks to see if all keyword hits are associated with descriptive terms that have been been classified. If the software in block 268 doesn't find any unclassified “hits”, then the address, count and classified text are stored in the classified text table (151). Alternatively, if there are terms that haven't been classified, then processing advances to a block 269. The software in block 269 prompts the user (20) via the identification and classification rules window (703) to provide classification rules for each new term. The information regarding the new classification rules is stored in the keyword table (150) while the newly classified text is stored in the classified text table (151). It is worth noting at this point that the activation and operation of bots that don't have unclassified fields continues. Only bots with unclassified fields will “wait” for user input before completing data storage. The new classification rules will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes, on to a software block 270.
  • The software in [0116] block 270 checks the bot date table (149) and deactivates any external database text bots with creation dates before the current system date and retrieves information from the system settings table (140), the metadata mapping table (141) and the keyword table (150). The software in block 270 then initializes external database text bots for each field in the metadata mapping table (141) that mapped to a keyword in accordance with the frequency specified by user (20) in the system settings table (140) before advancing processing to a software block 271. Every text bot initialized by software block 270 will store the location, count and classification data it discovers in the classified text table (151). Every external database text bot contains the information shown in Table 19.
    TABLE 19
    1. Unique ID number (based on date, hour, minute,
    second of creation)
    2. Creation date (day, hour, minute, second)
    3. Storage location
    4. Mapping information
    5. Data Source
    6. Keyword
    7. Descriptive term 1
    To
    7 + n. Descriptive term n
  • In [0117] block 271 the text bots locate and classify data from the external database (25) in accordance with its programmed instructions with the frequency specified by user (20) in the system settings table (140). As each text bot locates and classifies data from the external database (25) processing advances to a software block 268 before the bot completes data storage. The software in block 268 checks to see if all keyword hits are associated with descriptive terms that have been been classified. If the software in block 268 doesn't find any unclassified “hits”, then the address, count and classified text are stored in the classified text table (151). Alternatively, if there are terms that haven't been classified, then processing advances to a block 269. The software in block 269 prompts the user (20) via the identification and classification rules window (703) to provide classification rules for each new term. The information regarding the new classification rules is stored in the keyword table (150) while the newly classified text is stored in the classified text table (151). It is worth noting at this point that the activation and operation of bots that don't have unclassified fields continues. Only bots with unclassified fields “wait” for user input before completing data storage. The new classification rules will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes, on to software block 276.
  • The software in [0118] block 276 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 280. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 277.
  • The software in [0119] block 277 checks the system setting table (140) to see if there is geocoded data in the application database (50) and to determine which on-line geocoding service (Centrus™ from QM Soft or MapMarker™ from Mapinfo) is being used. If geospatial data is not being used, then processing advances to a block 291. Alternatively, if the software in block 277 determines that geospatial data is being used, processing advances to a software block 278.
  • The software in [0120] block 278 prompts the user (20) via the geospatial meaure definitions window (709) to define the measures that will be used in evaluating the elements of value. After specifying the measures, the user (20) is prompted to select the geospatial locus for each measure from the data already stored in the application database (50). The input from the user (20) is stored in the geospatial measures table (152) in the application database before processing advances to a software block 279.
  • The software in [0121] block 279 checks the bot date table (149) and deactivates any geospatial bots with creation dates before the current system date and retrieves information from the system settings table (140), the metadata mapping table (141) and the geospatial measures table (152). The software in block 279 then initializes geospatial bots for each field in the metadata mapping table (141) that mapped to geospatial data in the application database (50) in accordance with the frequency specified by user (20) in the system settings table (140) before advancing processing to a software block 280.
  • Bots are independent components of the application that have specific tasks to perform. In the case of geospatial bots, their tasks are to calculate user specified measures using a specified geocoding service and then store the measures in a specified location. Each geospatial bot initialized by [0122] software block 279 will store the measures it calculates in the application database table where the geospatial data was found. Tables that could include geospatial data include: the basic financial system table (143), the operation system table (144), the human resource system table (145), the external database table (146), the advanced finance system table (147) and the soft asset system table (148). Every geospatial bot contains the information shown in Table 20.
    TABLE 20
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Geospatial locus
    6. Geospatial measure
    7. Geocoding service
  • In [0123] block 280 the geospatial bots locate data and complete measurements in accordance with their programmed instructions with the frequency specified by the user (20) in the system settings table (140). As each geospatial bot retrieves data and calculates the geospatial measures that have been specified, processing advances to a block 281 before the bot completes data storage. The software in block 281 checks to see if all geospatial data located by the bot has been been measured. If the software in block 281 doesn't find any unmeasured data, then the measurement is stored in the application database (50). Alternatively, if there are data elements that haven't been measured, then processing advances to a block 282. The software in block 282 prompts the user (20) via the geospatial measure definition window (709) to provide measurement rules for each new term. The information regarding the new measurement rules is stored in the geospatial measures table (152) while the newly calculated measurement is stored in the appropriate table in the application database (50). It is worth noting at this point that the activation and operation of bots that don't have unmeasured fields continues. Only the bots with unmeasured fields “wait” for user input before completing data storage. The new measurement rules will be used the next time bots are initialized in accordance with the frequency established by the user (20). In either event, system processing then passes on to a software block 291.
  • The software in [0124] block 291 checks: the basic financial system table (143), the operation system table (144), the human r source system table (145), the external database table (146), the advanced finance system table (147), the soft asset system table (148), the classified text table (151) and the geospatial measures table (152) to see if data is missing from any of the periods required for system calculation. The range of required dates was previously calculated by the software in block 202. If there is no data missing from any period, then processing advances to a software block 293. Alternatively, if there is missing data for any field for any period, then processing advances to a block 292.
  • The software in [0125] block 292, prompts the user (20) via the missing data window (704) to specify the method to be used for filling the blanks for each item that is missing data. Options the user (20) can choose from for filling the blanks include: the average value for the item over the entire time period, the average value for the item over a specified period, zero, the average of the preceeding item and the following item values and direct user input for each missing item. If the user (20) doesn't provide input within a specified interval, then the default missing data procedure specified in the system settings table (140) is used. When all the blanks have been filled and stored for all of the missing data, system processing advances to a block 293.
  • The software in [0126] block 293 calculates attributes by item for each numeric data field in the basic financial system table (143), the operation system table (144), the human resource system table (145), the external database table (146), the advanced finance system table (147) and the soft asset system table (148). The attributes calculated in this step include: cumulative total value, the period to period rate of change in value, the rolling average value and a series of time lagged values. In a similar fashion the software in block 293 calculates attributes for each date field in the specified tables including time since last occurrence, cumulative time since first occurrence, average frequency of occurrence and the rolling average frequency of occurrence. The numbers derived from numeric and date fields are collectively referred to as “item performance indicators”. The software in block 293 also calculates pre-specified combinations of variables called composite variables for measuring the strength of the different elements of value. The item performance indicators are stored in the table where the item source data was obtained and the composite variables are stored in the composite variables table (153) before processing advances to a block 294.
  • The software in [0127] block 294 uses attribute derivation algorithms such as the AQ program to create combinations of the variables that weren't pre-specified for combination. While the AQ program is used in the preferred embodiment of the present invention, other attribute derivation algorithms such as the LINUS algorithms, may be used to the same effect. The software creates these attributes using both item variables that were specified as “element” variables and item variables that were not. The resulting composite variables are stored in the composite variables table (153) before processing advances to a block 295.
  • The software in [0128] block 295 uses Data Envelopement Analysis (hereinafter, DEA) to determine the relative industry ranking of the organization and enterprises being examined using the composite variables calculated in block 293. For example, DEA can be used to determine the relative efficiency of a company in receiving favorable press mentions per dollar spent on advertising. When all pre-specified industry rankings have been calculated and stored in the industry ranking table (154), processing advances to a software block 296.
  • The software in [0129] block 296 uses pattern-matching algorithms to assign pre-designated data fields for different elements of value to pre-defined groups with numerical values. This type of analysis is useful in classifying purchasing patterns and/or communications patterns as “heavy”, “light”, “moderate” or “sporadic”. The assignments are calculated using the “rolling average” value for each field. The classification and the numeric value associated with the classification are stored in the application database (50) table where the data field is located before processing advances to a block 297.
  • The software in [0130] block 297 retrieves data from the metadata mapping table (141), creates and then stores the definitions for the pre-defined components of value in the components of value definition table (155). As discussed previously, the revenue component of value is not divided into sub-components, the expense value is divided into five sub-components (the cost of raw materials, the cost of manufacture or delivery of service, the cost of selling, the cost of support and the cost of administration) and the capital value is divided into six sub-components: (cash, non-cash financial assets, production equipment, other assets, financial liabilities and equity) in the preferred embodiment. When data storage is complete, processing advances to a software block 302 to begin the analysis of the extracted data using analysis bots.
  • Analysis Bots
  • The flow diagrams in FIG. 6A, FIG. 6B and FIG. 6C detail the processing that is completed by the portion of the application software ([0131] 300) that programs analysis bots to:
  • 1. identify the item variables, item performance indicators and composite variables for each enterprise, element of value and sub-element of value that drive the components of value (revenue, expense and changes in capital), [0132]
  • 2. create vectors that summarize the performance of the item variables and item performance indicators for each enterprise contribution, element of value and sub-element of value, [0133]
  • 3. determine the appopriate cost of capital and value the organization and enteprise real options; [0134]
  • 4. determine the appopriate cost of capital, value and allocate the industry real options to each organization or enterprise on the basis of relative element strength; [0135]
  • 5. determine the expected life of each element of value and sub-element of value; [0136]
  • 6. calculate the organization and enterprise current operation values and value the revenue, expense and capital components said current operations using the information prepared in the previous stage of processing; [0137]
  • 7. specify and optimize predictive models to determine the relationship between the vectors determined in [0138] step 2 and the revenue, expense and capital values determined in step 6,
  • 8. combine the results of the fifth, sixth and seventh stages of processing to determine the value of each, enterprise contribution, element and sub-element (as shown in Table 7); [0139]
  • Processing in this portion of the application begins in [0140] software block 302. The software in block 302 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change then processing advances to a software block 3110. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 303.
  • The software in [0141] block 303 retrieves data from the meta data mapping table (141) and the soft asset system table (148) and then assigns item variables, item performance indicators and composite variables to each element of value using a two step process. First, item variables and item performance indicators are assigned to elements of value based on the soft asset management system they correspond to (for example, all item variables from a brand management system and all item performance indicators derived from brand management system variables are assigned to the brand element of value). Second, pre-defined composite variables are assigned to the element of value they were assigned to measure in the metadata mapping table (141). After the assignment of variables and indicators to elements is complete, the resulting assignments are saved to the element of value definition table (155) and processing advances to a block 304.
  • The software in [0142] block 304 checks the bot date table (149) and deactivates any clustering bots with creation dates before the current system date. The software in block 304 then initializes bots as required for each component of value. The bots: activate in accordance with the frequency specified by the user (20) in the system settings table (140), retrieve the information from the system settings table (140), the metadata mapping table (141) and the component of value definition table (156) as required and define segments for the component of value data before saving the resulting cluster information in the application database (50).
  • Bots are independent components of the application that have specific tasks to perform. In the case of predictive model bots, their primary task is to segment the component and sub-component of value variables into distinct clusters that share similar characteristics. The clustering bot assigns a unique id number to each “cluster” it identifies and stores the unique id numbers in the cluster id table ([0143] 157). Every item variable for every component and sub-component of value is assigned to one of the unique clusters. The cluster id for each variable is saved in the data record for each item variable in the table where it resides. The item variables are segmented into a number of clusters less than or equal to the maximum specified by the user (20) in the system settings. The data is segmented using the “default” clustering algorithm the user (20) specified in the system settings. The system of the present invention provides the user (20) with the choice of several clustering algorithms including: an unsupervised “Kohonen” neural network, K-nearest neighbor, Expectation Maximization (EM) and the segmental K-means algorithm. For algorithms that normally require the number of clusters to be specified the bot will iterate the number of clusters until it finds the cleanest segmentation for the data. Every clustering bot contains the information shown in Table 21.
    TABLE 21
    1. Unique ID number (based on date, hour, minute,
    second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Component or subcomponent of value
    6. Clustering algorithm type
    7. Maximum number of clusters
    8. Variable 1
    .
    .
    .
    8 + n. Variable n
  • When bots in [0144] block 304 have identified and stored cluster assignments for the item variables associated with each component and subcomponent of value, processing advances to a software block 305.
  • The software in [0145] block 305 checks the bot date table (149) and deactivates any predictive model bots with creation dates before the current system date. The software in block 305 then retrieves the information from the system settings table (140), the metadata mapping table (141), the element of value definition table (155) and the component of value definition table (156) required to initialize predictive model bots for each component of value at every level in the organization.
  • Bots are independent components of the application that have specific tasks to perform. In the case of predictive model bots, their primary task is determine the relationship between the item variables, item performance indicators and composite variables (collectively hereinafter, “the variables”) and the components of value (and sub-components of value) by cluster at each level of the organization. A series of predictive model bots are initialized at this stage because it is impossible to know in advance which predictive model type will produce the “best” predictive model for the data from each commercial enterprise. The series for each model includes 9 predictive model bot types: neural network; CART; projection pursuit regression; generalized additive model (GAM), redundant regression network; boosted Naive Bayes Regression; MARS; linear regression; and stepwise regression. The software in [0146] block 305 generates this series of predictive model bots for the levels of the organization shown in Table 22.
    TABLE 22
    Predictive models by organization level
    Organization:
    Enterprise variables relationship to organization
    revenue component of value by cluster
    Enterprise variables relationship to organization
    expense subcomponents of value by cluster
    Enterprise variables relationship to organization
    capital change subcomponents of value by cluster
    Enterprise:
    Element variables relationship to enterprise revenue
    component of value by cluster
    Element variables relationship to enterprise expense
    subcomponents of value by cluster
    Element variables relationship to enterprise capital
    change subcomponents of value by cluster
    Element of Value:
    Sub-element of value variables relationship to element
    of value
  • Every predictive model bot contains the information shown in Table 23. [0147]
    TABLE 23
    1. Unique ID number (based on date, hour, minute,
    second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Component or subcomponent of value
    6. Cluster (ID)
    7. Enterprise, Element or Sub-Element ID
    8. Predictive Model Type
    9. Variable 1
    .
    .
    .
    9 + n. Variable n
  • After predictive model bots for each level in the organization are initialized, the bots activate in accordance with the frequency specified by the user ([0148] 20) in the system settings table (140). Once activated, the bots retrieve the required data from the appropriate table in the application database (50) and randomly partition the item variables, item performance indicators and composite variables into a training sets and a test set. The software in block 305 uses “bootstrapping” where the different training data sets are created by re-sampling with replacement from the original training set, so data records may occur more than once. The same sets of data will be used to train and then test each predictive model bot. When the predictive model bots complete their training and testing, processing advances to a block 306.
  • The software in [0149] block 306 uses a variable selection algorithm such as stepwise regression (other algorithms can be used) to combine the results from the predictive model bot analyses for each model to determine the best set of variables for each model. The models having the smallest amount of error as measured by applying the mean squared error algorithm to the test data are given preference in determining the best set of variables. As a result of this processing the best set of variables contain the item variables, item performance indicators and composite variables that correlate most strongly with changes in the components of value. The best set of variables will hereinafter be referred to as the “value drivers”. Eliminating low correlation factors from the initial configuration of the vector creation algorithms increases the efficiency of the next stage of system processing. Other error algorithms alone or in combination may be substituted for the mean squared error algorithm. After the best set of variables have been selected and stored in the element variables table (158) for all models at all levels, the software in block 306 tests the independence of the value drivers at the enterprise, element and sub-element level before processing advances to a block 307.
  • The software in [0150] block 307 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation, a structure change or if the interaction between value drivers has changed from being highly correlated to being independent. If the calculation is not a new calculation, a structure change or a change to independent value driver status, then processing advances to a software block 310. Alternatively, if the calculation is new, a structure change or a change to independent status, then processing advances to a software block 308. The software in block 308 checks the bot date table (149) and deactivates any induction bots with creation dates before the current system date. The software in block 308 then retrieves the information from the system settings table (140), the metadata mapping table (141), the component of value definition table (156) and the element variables table (158) as required to initialize induction model bots for each enterprise, element of value and sub-element of value at every level in the organization in accordance with the frequency specified by the user (20) in the system settings table (140) before processing advances to a block 309.
  • Bots are independent components of the application that have specific tasks to perform. In the case of induction bots, their primary tasks are to refine the item variable, item performance indicator and composite variable selection to reflect only causal variables and to produce formulas, (hereinafter, vectors) that summarize the relationship between the item variables, item performance indicators and composite variables and changes in the component or sub-component of value being examined. (Note: these variables are simply grouped together to represent an element vector when they are dependent). A series of induction bots are initialized at this stage because it is impossible to know in advance which induction algorithm will produce the “best” vector for the best fit variables from each model. The series for each model includes 4 induction bot types: entropy minimization, LaGrange, Bayesian and path analysis. The software in [0151] block 308 generates this series of induction bots for each set of variables stored in the element variables table (158) in the previous stage in processing. Every induction bot contains the information shown in Table 24.
    TABLE 24
    1. Unique ID number (based on date, hour, minute,
    second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Component or subcomponent of value
    6. Cluster (ID)
    7. Enterprise, Element or Sub-Element ID
    8. Variable Set
    9. Induction algorithm type
  • After the induction bots are initialized by the software in [0152] block 308 processing passes to a sotware block 309. In block 309 bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). Once activated, they retrieve the element variable information for each model from the element variable table (158) and sub-divides the variables into two sets, one for training and one for testing. The same set of training data is used by each of the different types of bots for each model. After the induction bots complete their processing for each model, the software in block 309 uses a model selection algorithm to identify the vector that best fits the data for each enterprise, element or sub-element being analyzed. For the system of the present invention, a cross validation algorithm is used for model selection. The software in block 309 saves the the best fit vector in the vector table (159) in the application database (50) and processing returns to advances to a block 310. The software in block 310 tests the value drivers or vectors to see if there are “missing” value drivers that are influencing the results. If the software in block 310 doesn't detect any missing value drivers, then system processing advances to a block 322. Alternatively, if missing value drivers are detected by the software in block 310, then processing advances to a software block 321.
  • The software in [0153] block 321 prompts the user (20) via the variable identification window (710) to adjust the specification(s) for the affected enterprise, element of value or subelement of value. After the input from the user (20) is saved in the system settings table (140) and/or the element of value definition table (155), system processing advances to a software block 323. The software in block 323 checks the in the system settings table (140) and/or the element of value definition table (155) to see if there any changes in structure. If there have been changes in the structure, then processing advances to a block 205 and the system processing described previously is repeated. Alternatively, if there are no changes in structure, then processing advances to a block 325.
  • The software in [0154] block 325 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 329. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 326.
  • The software in [0155] block 326 checks the bot date table (149) and deactivates any option bots with creation dates before the current system date. The software in block 326 then retrieves the information from the system settings table (140), the metadata mapping table (141), the basic financial system database (143), the external database table (146) and the advanced finance system table (147) as required to initialize option bots for the organization, the industry and each enterprise in the organization before processing advances to a block 327.
  • Bots are independent components of the application that have specific tasks to perform. In the case of option bots, their primary tasks are to calculate the cost of capital (if the user ([0156] 20) hasn't specified the cost of capital in the system settings table (140)) and value the real options for the industry, the organization, and each enterprise in the organization. The base cost of capital is calculated using a well known formula for the industry and each enterprise. The bots then use the data regarding the similarity of the “soft” asset profiles between the proposed real option activity and the existing industry, organization and enterprise profiles to determine the multiple on the cost of capital that will be used in valuing the real option. The closer the real option profile is to the existing profile, the closer the multiple is to one. If sufficient data is available, pattern matching algorithms can be used to replace the assessment by the user (20). After the cost of capital multiple has been determined, the value of the real option is calculated using dynamic programming algorithms in a manner that is well known and stored in the real option value table (162). Real option values are calculated using dynamic programming algorithms. The real option can be valued using other algorithms including binomial, neural network or Black Scholes algorithms. The software in block 326 generates option bots for the industry, the organization and each enterprise in the organization.
  • Option bots contain the information shown in Table 25. [0157]
    TABLE 25
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Organization or Enterprise ID
    6. Real Option Type (Industry, Organization or Enterprise)
    7. Real Option
    8. Allocation % (if applicable)
  • After the option bots are initialized by the software in [0158] block 326 processing passes to a block 327. In block 327 the bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information for the organization, the industry and each enterprise in the organization from the basic financial system database (143), the external database table (146) and the advanced finance system table (147) as required to complete the option valuation. After the cost of capital multiple has been determined the value of the real option is calculated using dynamic programming algorithms in a manner that is well known. The resulting values are then saved in the real option value table (162) in the application database (50) before processing advances to a block 328.
  • The software in [0159] block 328 uses the item performance indicators produced by DEA analysis in blocks 304, 308 and 314 and the percentage of industry real options controlled by the enterprise to determine the allocation percentage for industry options. The more dominant the organization and enterprise—as indicated by the industry rank for the intangible element indicators, the greater the allocation of industry real options. After the software in block 328 saves the information regarding the allocation of industry real options to the organization and each enterprise in the organization to the real option value table (162) in the application database (50) before advancing processing to a block 329.
  • The software in [0160] block 329 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 333. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 330.
  • The software in [0161] block 330 checks the bot date table (149) and deactivates any cash flow bots with creation dates before the current system date. The software in block 326 then retrieves the information from the system settings table (140), the metadata mapping table (141) and the component of value definition table (156) as required to initialize cash flow bots for the organization and each enterprise in the organization in accordance with the frequency specified by the user (20) in the system settings table (140) before processing advances to a block 331.
  • Bots are independent components of the application that have specific tasks to perform. In the case of cash flow bots, their primary tasks are to calculate the cash flow for the organization and each enterprise in the organization for every time period where data is available and to forecast a steady state cash flow for the organization and each enterprise in the organization. Cash flow is calculated using a well known formula where cash flow equals period revenue minus period expense plus the period change in capital plus non-cash depreciation/amortization for the period. The steady state cash flow is calculated for the organization and each enterprise in the organization using forecasting methods identical to those disclosed previously in U.S. Pat. No. 5,615,109 to forecast revenue, expenses, capital changes and depreciation seperately before calculating the cash flow. The software in [0162] block 326 generates cash flow bots for the organization and each enterprise in the organization.
  • Every cash flow bot contains the information shown in Table 26. [0163]
    TABLE 26
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Organization or Enterprise ID
    6. Components of value
  • After the cash flow bots are initialized by the software in [0164] block 330 processing passes to a block 331. In block 331 the bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated the bots retrieve the component of value information for the organization and each enterprise in the organization from the component of value definition table (156). The cash flow bots then complete the calculation and forecast of cash flow for the organization and each enterprise in the organization before saving the resulting values by period in the cash flow table (161) in the application database (50) before processing advances to a block 333.
  • The software in [0165] block 333 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 343. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 341.
  • The software in [0166] block 341 checks the bot date table (149) and deactivates any element life bots with creation dates before the current system date. The software in block 341 then retrieves the information from the system settings table (140), the metadata mapping table (141) and the element of value definition table (155) as required to initialize element life bots for each element and sub-element of value in the organization before processing advances to a block 342.
  • Bots are independent components of the application that have specific tasks to perform. In the case of element life bots, their primary task is to determine the expected life of each element and sub-element of value for each enterprise in the organization. There are three methods for evaluating the expected life of the elements and sub-elements of value. Elements of value that are defined by a population of members (such as: channel partners, customers, employees and vendors) will have their lives estimated by analyzing and forecasting the lives of the members of the population. The forecasting of member lives will be determined by the “best” fit solution from competing life estimation methods including the Iowa type survivor curves, Weibull distribution survivor curves, Gompertz-Makeham survivor curves, polynomial equations and the forecasting methodology disclosed in U.S. Pat. No. 5,615,109. Elements of value (such as some parts of Intellectual Property—patents) that have legally defined lives will have their lives calculated using the time period between the current date and the expiration date of the element or sub-element. Finally, elements of value and sub-element of value (such as brand names, information technology and processes) that do not have defined lives and that do not consist of a collection of members will have their lives estimated by comparing the relative strength and stability of the element vectors with the relative stability of the enterprise CAP. The resulting values are stored in the element of value definition table ([0167] 155) for each element and sub-element of value of each enterprise in the organization.
  • Every element life bot contains the information shown in Table 27. [0168]
    TABLE 27
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Element of Sub-Element of Value
    6. Life Estimation Method (population analysis, date calculation
    or relative CAP)
  • After the element life bots are initialized by the software in [0169] block 341 processing passes to block 342. In block 342 the element life bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information for each element and sub-element of value from the element of value definition table (155) as required to complete the estimate of element life. The resulting values are then saved in the element of value definition table (155) in the application database (50) before processing advances to a block 343.
  • The software in [0170] block 343 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 402. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 345.
  • The software in [0171] block 345 checks the bot date table (149) and deactivates any component capitalization bots with creation dates before the current system date. The software in block 341 then retrieves the information from the system settings table (140), the metadata mapping table (141) and the component of value definition table (156) as required to initialize component capitalization bots for the organization and each enteprise in the organization before processing advances to a block 346.
  • Bots are independent components of the application that have specific tasks to perform. In the case of component capitalization bots, their task is to determine the capitalized value of the components of value, forecast revenue, expense or capital requirements, for the organization and for each enterprise in the organization in accordance with the formula shown in Table 28. [0172]
    TABLE 28
    Value = Ff1/(1 + K) + Ff2/(1 + K)2 + Ff3/(1 + K)3 +
    Ff4/(1 + K)4 + (Ff4 × (1 + g))/(1 + K)5) +
    (Ff4 × (1 + g)2)/(1 + K)6) . . . +
    (Ff4 × (1 + g)N)/(1 + K)N+4)
    Ffx = Forecast revenue, expense or capital
    requirements for year x after valuation
    date (from advanced finance system)
    N = Number of years in CAP (from prior
    calculation)
    K = Cost of capital - % per year (from prior
    calculation)
    g = Forecast growth rate during CAP -
    % per year (from advanced finance system)
  • After the capitalized value of every component and sub-component of value is complete, the results are stored in the component of value definition table ([0173] 156) in the application database (50).
  • Every component capitalization bot contains the information shown in Table 29. [0174]
    TABLE 29
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Organization or Enterprise ID
    6. Component of Value (Revenue, Expense or Capital Change)
    7. Sub Component of Value
  • After the component capitalization bots are initialized by the software in [0175] block 345 processing passes to block 346. In block 346 the component capitalization bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information for each component and sub-component of value from the advanced finance system table (147) and the component of value definition table (156) as required to calculate the capitalized value of each component. The resulting values are then saved in the component of value definition table (156) in the application database (50) before processing advances to a block 347.
  • The software in [0176] block 347 checks the bot date table (149) and deactivates any valuation bots with creation dates before the current system date. The software in block 347 then retrieves the information from the system settings table (140), the metadata mapping table (141), the element of value definition table (155), the component of value definition table (156) as required to initialize valuation bots for each enterprise, element and sub-element of value in the organization before processing advances to a block 348.
  • Bots are independent components of the application that have specific tasks to perform. In the case of valuation bots, their task is to calculate the contribution of every enterprise, element of value and sub-element of value in the organization using the overall procedure outlined in Table 7. The first step in completing the calculation in accordance with the procedure outlined in Table 7, is determining the relative contribution of each enterprise and element of value by using a series of predictive models to find the best fit relationship between: [0177]
  • 1. the enterprise contribution vectors and the organization components of value; [0178]
  • 2. the element of value vectors and the enterprise components of value; and [0179]
  • 3. the sub-element of value vectors and the element of value they correspond to. [0180]
  • The system of the present invention uses 9 different types of predictive models to determine relative contribution: neural network; CART; projection pursuit regression; generalized additive model (GAM), redundant regression network; boosted Naïve Bayes Regression; MARS; linear regression; and stepwise regression to determine relative contribution. The model having the smallest amount of error as measured by applying the mean squared error algorithm to the test data is the best fit model. The “relative contribution algorithm” used for completing the analysis varies with the model that was selected as the “best-fit”. For example, if the “best-fit” model is a neural net model, then the portion of revenue attributable to each input vector is determined by the formula shown in Table 30. [0181]
    TABLE 30
    ( k = 1 k = m j = 1 j = n I jk × O k / j = 1 j = n I ik ) / k = 1 k = m j = 1 j = m I jk × O k
    Figure US20040210509A1-20041021-M00001
  • After the relative contribution of each enterprise, element of value and sub-element of value is determined, the results of this analysis are combined with the previously calculated information regarding element life and -capitalized component value to complete the valuation of each: enterprise contribution, element of value and sub-element using the approach shown in Table 31. [0182]
    TABLE 31
    Percent- Element
    Gross Value age Lif/CAP Net Value
    Revenue value = $120 M 20% 80% Value = $19.2 M
    Expense value = ($80 M) 10% 100%  Value = ($8.0) M
    Capital value = ($5 M)  5% 80% Value = ($0.2) M
    Total value = $35 M
    Net value for this element: Value = $11.0 M
  • The resulting values are stored in the element of value definition table ([0183] 155) for each element and sub-element of value of each enterprise in the organization.
  • Every valuation bot contains the information shown in Table 32. [0184]
    TABLE 32
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise Contribution, Element of Value or Sub-Element of Value
    6. Organization, Enteprise or Element of Value ID
  • After the valuation bots are initialized by the software in [0185] block 347 processing passes to block 348. In block 348 the valuation bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information from the element of value definition table (155) and the component of value definition table (156) as required to complete the valuation. The resulting values are then saved in the element of value definition table (155) in the application database (50) before processing advances to a block 349.
  • The software in [0186] block 349 checks the bot date table (149) and deactivates any residual bots with creation dates before the current system date. The software in block 349 then retrieves the information from the system settings table (140), the metadata mapping table (141) and the element of value definition table (155) as required to initialize residual bots for each enterprise in the organization.
  • Bots are independent components of the application that have specific tasks to perform. In the case of residual bots, their task is to retrieve data from the as required from the element of value definition table ([0187] 155) and the component of value definition table (156) and then calculate the residual going concern value for the organization and each enterprise in the organization in accordance with the formula shown in Table 33.
    TABLE 33
    Residual Going Concern Value = Total Current-Operation Value −
    Σ Financial Asset Values − Σ Elements of value
  • Every residual bot contains the information shown in Table 34. [0188]
    TABLE 34
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Organization or Enterprise ID
  • After the residual bots are initialized by the software in [0189] block 348 processing passes to block 349. In block 349 the residual bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information from the element of value definition table (155) and the component of value definition table (156) as required to complete the residual calculation for the organization or enterprise. After the calculation is complete, the resulting values are then saved in the element of value definition table (155) in the application database (50) before processing advances to a block 402.
  • ANALYZE MARKET SENTIMENT
  • The flow diagram in FIG. 7 details the processing that is completed by the portion of the application software ([0190] 400) that analyzes the market sentiment for the enterprises in the organization. Processing begins in a software block 402.
  • The software in [0191] block 402 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 409. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 404.
  • The software in [0192] block 404 checks the bot date table (149) and deactivates any sentiment calculation bots with creation dates before the current system date. The software in block 404 then retrieves the information from the system settings table (140), the metadata mapping table (141), the external database table (146), the element of value definition table (155), the component of value definition table (156) and the real option value table (162) as required to initialize sentiment calculation bots for each enterprise in the organization.
  • Bots are independent components of the application that have specific tasks to perform. In the case of sentiment calculation bots, their task is to retrieve data as required from: the external database table ([0193] 146), the element of value definition table (155), the component of value definition table (156) and the real option value table (162) then calculate the sentiment for each enterprise in the organization in accordance with the formula shown in Table 35.
    TABLE 35
    Sentiment = Total Market Value − Total Current-Operation Value −
    Σ Real Option Values
  • Every sentiment calculation bot contains the information shown in Table 36. [0194]
    TABLE 36
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise ID
  • After the sentiment calculation bots are initialized by the software in [0195] block 404 processing passes to block 405. In block 405 the sentiment calculation bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information from the external database table (146), the element of value definition table (155), the component of value definition table (156) and the real option value table (162) as required to complete the sentiment calculation for each enterprise. After the calculation is complete, the resulting values are then saved in the enterprise sentiment table (166) in the application database (50) before processing advances to a block 409.
  • The software in [0196] block 409 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 412. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 410.
  • The software in [0197] block 410 checks the bot date table (149) and deactivates any sentiment factor bots with creation dates before the current system date. The software in block 410 then retrieves the information from the system settings table (140), the metadata mapping table (141), the external database table (146), the element of value definition table (155), the component of value definition table (156) and the real option value table (162) as required to initialize sentiment factor bots for each enterprise in the organization.
  • Bots are independent components of the application that have specific tasks to perform. In the case of sentiment factor bots, their primary task is to calculate sentiment related attributes including cumulative total value, the period to period rate of change in value, the rolling average value, a series of time lagged values as well as pre-specified combinations of variables called composite variables. The bots also use attribute derivation algorithms such as the AQ program to create combinations of the variables that weren't pre-specified for combination. While the AQ program is used in the preferred embodiment of the present invention, other attribute derivation algorithms such as the LINUS algorithms, may be used to the same effect. The newly calculated sentiment factors are stored in the sentiment factor table ([0198] 169) before processing advances to a block 411.
  • Every sentiment factor bot contains the information shown in Table 37. [0199]
    TABLE 37
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise ID
  • After the sentiment factor bots are initialized by the software in [0200] block 410 processing passes to block 411. In block 411 the sentiment factor bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information from the external database table (146), the element of value definition table (155), the component of value definition table (156) and the real option value table (162) as required to generate the sentiment factors for each enterprise. After the calculation is complete, the resulting values are then saved in the sentiment factors table (169) in the application database (50) before processing advances to a block 412.
  • The software in [0201] block 412 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 502. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 413.
  • The software in [0202] block 413 checks the bot date table (149) and deactivates any sentiment analysis bots with creation dates before the current system date. The software in block 413 then retrieves the information from the system settings table (140), the metadata mapping table (141), the external database table (146), the element of value definition table (155), the component of value definition table (156), the real option value table (162), the enteprise sentiment table (166) and the sentiment factors table (169) as required to initialize sentiment analysis bots for each enterprise in the organization.
  • Bots are independent components of the application that have specific tasks to perform. In the case of sentiment analysis bots, their primary task is determine the relationship between sentiment factors and the calculated sentiment for each enterprise in the organization. A series of predictive model bots are initialized at this stage because it is impossible to know in advance which predictive model type will produce the “best” predictive model for the data from each commercial enterprise. The series for each model includes 9 predictive model bot types: neural network; CART; projection pursuit regression; generalized additive model (GAM), redundant regression network; boosted Naive Bayes Regression; MARS; linear regression; and stepwise regression. [0203]
  • Every sentiment analysis bot contains the information shown in Table 38. [0204]
    TABLE 38
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Enterprise ID
  • After the sentiment analysis bots are initialized by the software in [0205] block 413 processing passes to block 414. In block 411 the sentiment analysis bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information from the the system settings table (140), the metadata mapping table (141), the enteprise sentiment table (166) and the sentiment factors table (169) and randomly partition sentiment factors for each enterprise into a training set and a test set. The software in block 414 uses “bootstrapping” where the different training data sets are created by re-sampling with replacement from the original training set, so data records may occur more than once. The same sets of data will be used to train and then test each predictive model bot. When the predictive model bots complete their training and testing, the resulting sets of “best fit” factors are then saved in the sentiment factors table (169) in the application database (50) before processing advances to a block 415.
  • The software in [0206] block 415 combines the results from the sentiment analysis from each bot type to determine the best set of sentiment factors for each enterprise. The models having the smallest amount of error as measured by applying the mean squared error algorithm to the test data are given preference in determining the best set of variables. As a result of this processing the best set of variables contain the sentiment factors that correlate most strongly with changes in the components of value. The best set of variables will hereinafter be referred to as the “sentiment drivers”. The software in block 415 saves an indicator in each item record identifying the sentiment factors that are “sentiment drivers” before processing advances to block 502.
  • DISPLAY AND PRINT RESULTS
  • The flow diagram in FIG. 8 details the processing that is completed by the portion of the application software ([0207] 500) that creates and displays financial management reports, optionally prints financial management reports and optionally trades company equity securities. The financial management reports use the Value Map® report format to summarize information about the categories of business value for the organization and each enterprise in the organization. If there are prior valuations, then a Value Creation report will be created to highlight changes in the categories of business value during the period between the prior valuation and the current valuation date.
  • System processing in this portion of the application software ([0208] 900) begins in a block 502. The software in block 502 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 505. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 504.
  • The software in [0209] block 504 checks the bot date table (149) and deactivates any report bots with creation dates before the current system date. The software in block 504 then retrieves the information from the system settings table (140) and the report table (164) as required to determine the format (Value Map® & Value Creation format and/or traditional: balance sheet, income & cash flow statement format) and type of report (text or graphical) bots that need to be created for the organization, each enterprise in the organization and the sub-elements of value before processing advances to block 505.
  • Bots are independent components of the application that have specific tasks to perform. In the case of report bots, their primary tasks are to: retrieve data from the system settings table ([0210] 140), the basic finance system table (143), the advanced finance system table (147), the element of value definition table (155), the component of value definition table (156) and the real option value table (162), calculate market equity using the formula shown in Table 39 and generate the reports in the specified formats for the specified time period(s).
    TABLE 39
    Market Equity = (Current Operation Value) +
    (Σ Real Option Values) − (Σ Short Term Liabilities) −
    (Σ Contingent & Long Term Liabilities) − (Book Value of Equity)
  • Every report bot contains the information shown in Table 40. [0211]
    TABLE 40
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Organization, Enterprise or Element of ValueID
    6. Report Format (text or graphical)
    7. Report Type (Value Map ®/Value Creation format or traditional
    format)
  • The general format of the Value Map® Reports is shown in Table 41 and Table 42. [0212]
    TABLE 41
    Value Map ™ Report XYZ Corporation
    ASSETS 12/31/19XX 12/31/XXXX
    Current Operation:
    Financial Assets
    Cash and Marketable Securities: $7,871,230 $15,097,057
    Accounts Receivable $39,881,200 $42,234,410
    Inventory $19,801,140 $21,566,540
    Property, Plant & Equipment $22,800,000 $21,221,190
    Prepaid Expenses $2,071,440 $1,795,890
    Subtotal Current Operation Assets: $92,425,010 $101,915,087
    Cash Generating “Soft” Assets
    Brandnames $17,000,000 $12,000,000
    Customer Base $62,000,000 $49,500,000
    Employees $10,750,000 $8,250,000
    Strategic Alliances $33,250,000 $33,500,000
    Vendors $11,500,000 $9,750,000
    General Going Concern Value $31,250,000 $31,750,000
    Subtotal Cash Generating Assets $165,750,000 $144,750,000
    Subtotal Current Operation $258,175,010 $246,665,087
    Real Options:
    GUI Market Option $12,500,000 $10,000,000
    IPX Market Option $17,000,000 $12,500,000
    Subtotal Enterprise Options $29,500,000 $22,500,000
    Industry Growth Options: $80,000,000 $60,000,000
    Subtotal Real Options $109,500,000 $82,500,000
    Total Assets & Options $367,675,010 $329,165,087
    Market Sentiment $27,123,116 $18,273,698
    Total Market Value $394,798,126 $347,438,785
  • [0213]
    TABLE 42
    Value Map ™ Report XYZ Corporation
    LIABILITIES &
    SHAREHOLDER EQUITY
    Liabilities:
    Accounts Payable $15,895,585 $18,879,949
    Salaries Payable $8,766,995 $10,468,305
    Short Term Debt, Notes $20,189,900 $11,506,130
    Payable
    Taxes Payable $12,430,120 $9,099,880
    Subtotal Short Term $57,282,600 $49,954,264
    Liabilities
    Contingent Liabilities $5,100,000 $4,800,000
    Long Term Debt $17,800,000 $20,916,650
    Total Liabilities $80,182,600 $75,670,914
    Shareholder's Equity:
    Stock $2,000,000 $2,000,000
    Market Equity $27,123,116 $18,273,698
    Retained Earnings $15,342,410 $29,044,173
    Future Earnings $270,150,000 $222,450,000
    Total Shareholder's Equity $314,615,526 $271,767,871
    Total Liabilities & $394,798,126 $347,438,785
    Shareholder Equity
  • After the report bots are initialized by the software in [0214] block 504 processing passes to a block 505. In block 505 the bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information for the organization, enterprise or element of value from the element of value definition table (155), the component of value definition table (156) and the real option value table (1) as required to complete the report in accordance with the pre-specified format. The resulting reports are then saved in the report table (164) in the application database (50). The software in block 505 creates and displays all Value Map® reports and Value Creation Statement reports the user (20) requests using the report selection and display data window (705) in the general format shown in Table 41. Graphical reports such as those in a Hyperbolic Tree format that have been saved over time can be displayed like a “movie” shows the evolution of value over time. The software in block 505 also prompts the user (20) using the report selection and display data window (705) to select reports for printing. After the user's input regarding reports to print has been stored in the reports table (164), processing advances to block 507. If the user doesn't provide any input, then only the default reports specified by the user (20) in the system settings table (140) will be produced for storage.
  • The software in [0215] block 507 checks the reports tables (164) to determine if any reports have been designated for printing. If reports have been designated for printing, then processing advances to a block 506. The software in block 506 sends the designated reports to the printer (118). After the reports have been sent to the printer (118), processing advances to a software block 509. Alternatively, if no reports were designated for printing then processing advances directly from block 507 to block 509.
  • The software in [0216] block 509 checks the system settings table (140) in the application database (50) to determine if trading in enterprise equity is authorized. If trading in enterprise equity is not authorized, then processing advances to a software block 507. Alternatively, if trading in enterprise equity is authorized, then processing advances to a software block 510.
  • The software in [0217] block 510 retrieves information from the system settings table (140) and the advanced finance system table (147) that is required to calculate the minimum amount of cash that will be available for investment in enteprise equity during the next 12 month period. The system settings table (140) contains the minimum amount of cash and available securities that the user (20) indicated was required for enterprise operation while the advanced finance system table (147) contains a forecast of the cash balance for the enterprise for each period during the next 12 months. After the amount of available cash for each enterprise is calculated and stored in the equity purchase table (165), processing advances to a software block 511. The software in block 511 checks the equity purchase table (165) and enterprise sentiment table (166) to see if there is negative sentiment in any enterprise with available cash. If there are no enterprises with negative sentiment and available cash, then processing advances a software block 602. Alternatively, if there are enterprises with available cash and negative sentiment, then processing advances to a software block 512.
  • The software in [0218] block 512, retrieves the current enterprise equity price from the external database table (146), calculates the number of shares that can be purchased using the available cash and then generates a purchase order for the number of shares that can be purchased. The software in block 512 then prompts the user (20) via the purchase shares and confirm data window (706) to confirm the purchase. Once the user (20) confirms the equity purchase, the software in block 512 retrieves the on-line equity account information from the system settings table (140) and transmits and confirms the order to purchase the shares with the on-line broker via the network (45). The details of equity purchase transaction and confirmation are saved in the equity purchase table (156) before processing advances to block 602.
  • GENERATE AND ANALYZE VALUE IMPROVEMENTS
  • The flow diagram in FIG. 9 details the processing that is completed by the portion of the application software ([0219] 600) that generates and analyzes value improvements. Processing in this portion of the application starts in software block 602.
  • The software in [0220] block 602 checks the system settings table (140) in the application database (50) to determine if the current calculation is a new calculation or a structure change. If the calculation is not a new calculation or a structure change, then processing advances to a software block 606. Alternatively, if the calculation is new or a structure change, then processing advances to a software block 603.
  • The software in [0221] block 603 checks the bot date table (149) and deactivates any improvement bots with creation dates before the current system date. The software in block 603 then retrieves the information from the system settings table (140), the soft asset system table (148), the element of value definition table (155) and the component of value definition table (156) as required to initialize improvement bots before processing advances to a block 604.
  • Bots are independent components of the application that have specific tasks to perform. In the case of improvement bots, their primary task is to analyze and prioritize potential changes to value drivers for each enterprise in the organization. The analysis of value driver changes closely mirrors the calculation of profit improvement that was completed in the related U.S. Pat. No. 5,615,109 a “Method of and System for Generating Feasible, Profit Maximizing Requisition Sets”. The capital efficiency of the potential improvements identified by the improvement bots is evaluated in accordance with the formula shown in Table 43. [0222]
    TABLE 43
    Capital Change (+) Capital Change (−)
    Capital RevenueΔ − ExpenseΔ RevenueΔ − ExpenseΔ −
    efficiency Capital Δ Capital Δ
    Where: Revenue Δ = revenue impact of 1% change in value driver
    Expense Δ = expense impact of 1% change in value driver
    Capital Δ = capital impact of 1% change in value driver
  • The software in [0223] block 604 generates a list of potential improvements for each element of value defined and measured by the system of the present invention.
  • Every improvement bot contains the information shown in Table 44. [0224]
    TABLE 44
    1. Unique ID number (based on date, hour, minute, second of creation)
    2. Creation date (day, hour, minute, second)
    3. Mapping information
    4. Storage location
    5. Element of ValueID
    6. Soft Asset System
    7. Value Driver
  • After the improvement bots are initialized by the software in [0225] block 603 processing passes to a block 604. In block 604 the bots activate in accordance with the frequency specified by the user (20) in the system settings table (140). After being activated, the bots retrieve information for the element of value from the system settings table (140), the soft asset system table (148), the element of value definition table (155) and the component of value definition table (156) as required to complete the analyses in accordance with the formula shown in Table 40. The soft asset management system that corresponds to the element of value being analyzed may also have generated a list of potential improvements. If it has generated a list, these improvements are analyzed in the same manner that the improvements generated by the system of the present invention are analyzed. The resulting list of prioritized improvements are then saved in the value driver change table (167) in the application database (50) before processing advances to a block 605.
  • The software in [0226] block 605 prepares a list of the potential value improvements in capital efficiency order and prompts the user (20) via a value driver and structure change window (707) to modify and/or select the improvements and/or structure changes that should be included in the revised forecast. If the user (20) chooses not to enter any selections, then the software in block 605 will select the potential improvements that produce the most benefit within the constraints imposed by the available cash. The information regarding the improvement selections made by the user (20) or the system are stored in the value driver change table (167) in the application database (50). In a similar fashion, if the user made any changes to the structure, the information regarding the new change is stored in the system settings table (140) before processing advances to a software block 606.
  • The software in block [0227] 606 checks the system settings table (140) in the application database (50) to determine if the current calculation is a structure change. If the calculation is new or a structure change, then processing advances to software block 204 and the processing described above is repeated. Alternatively, if the calculation is not a structure change, then processing advances to a software block 610.
  • The software in [0228] block 610 retrieves information from the system settings table (140), the element of value definition table (155), the component of value definition table (156) and the value driver change table (167) as required to define and initialize a probabilistic simulation model. The preferred embodiment of the probabilistic simulation model is a Markov Chain Monte Carlo model, however, other simulation models can be used with similar results. The information defining the model is then stored in the simulation table (168) before the software in block 610 iterates the model as required to ensure the convergence of the frequency distribution of the output variables. After the simulation calculations have been completed, the software in block 610 saves the resulting information in the simulation table (168) before displaying the results of the simulation to the user (20) via a Value Mentor™ Reports data window (708) that uses a summary Value Map™ report format to display the mid point and the range of estimated future values for the various elements of each enterprise and the changes in value drivers, user-specified or system generated, that drove the future value estimate. The user (20) is prompted to indicate when the examination of the displayed report is complete and to indicate if any reports should be printed. If the user (20) doesn't provide any information regarding reports to display or print, then no reports are displayed or printed at this point and system processing continues. The information entered by the user (20) is entered in to the report table (164) before processing advances to a block 611.
  • The software in [0229] block 611 checks the reports tables (164) to determine if any additional reports have been designated for printing. If additional reports have been designated for printing, then processing advances to a block 612 which prepares and sends the designated reports to the printer (118). After the reports have been sent to the printer (118), processing advances to a software block 614. If the software in block 611 determines that no additional reports have been designated for printing, then processing advances directly to block 614.
  • The software in [0230] block 614 checks the system settings table (140) in the application database (50) to determine if the current calculation is a continuous calculation. If the calculation is a continuous calculation, then processing advances to software block 204 where the processing described previously is repeated continuously. Alternatively, if the calculation is not continuous, then processing advances to a software block 615 where processing stops.
  • Thus, the reader will see that the system and method described above transforms extracted transaction data, corporate information and information from the internet into detailed valuations for an organization, the enterprises in the organization and for specific elements of value within the enterprise. The level of detail contained in the business valuations allows users of the system to monitor and manage efforts to improve the value of the business in a manner that is superior to that available to users of traditional accounting systems and business valuation reports. [0231]
  • While the above description contains many specificity's, these should not be construed as limitations on the scope of the invention, but rather as an exemplification of one preferred embodiment thereof. Accordingly, the scope of the invention should be determined not by the embodiment illustrated, but by the appended claims and their legal equivalents. [0232]

Claims (49)

1. Independent software components that extract and store organization related data in accordance with a common schema defined by xml metadata to support organization processing.
2. The software components of claim 1 where an organization is a single product, a group of products, a division, a company, a multi-company corporation or a value chain.
3. The software components of claim 1 where the data is stored in tables.
4. The software components of claim 1 where the common schema includes an organization designation.
5. The software components of claim 1 where the common schema includes a data dictionary.
6. The software components of claim 1 where the data dictionary defines standard data attributes from the group consisting of account numbers, components of value, currencies, elements of value, units of measure and time periods.
7. The software components of claim 1 where organization related data is obtained from the group consisting of advanced financial systems, basic financial systems, alliance management systems, brand management systems, customer relationship management systems, channel management systems, estimating systems, intellectual property management systems, process management systems, supply chain management systems, vendor management systems, operation management systems, enterprise resource planning systems (ERP), material requirement planning systems (MRP), quality control systems, sales management systems, human resource systems, accounts receivable systems, accounts payable systems, capital asset systems, inventory systems, invoicing systems, payroll systems, purchasing systems, web site systems, external databases and combinations thereof.
8. The software components of claim 1 where at least a portion of the data is from the Internet or an external database.
9. The software components of claim 1 that convert data to match the common schema as required.
10. The software components of claim 1 that support processing for organization analysis.
11. Network models for aspects of organization financial performance that support organization analysis, management and optimization.
12. The network models of claim 11 that are selected from the group consisting of models that quantify the impact of sub elements of value on the elements of value, models that quantify the impact of elements of value on enterprise value, models that quantify the impact of each enterprise on organization value, two tiered models that quantify the impact of sub elements of value on the elements of value and the impact of elements of value on enterprise value, two tiered models that quantify the impact of elements of value on enterprise value and the impact of each enterprise on organization value and three tiered models that quantify the impact of sub elements of value on the elements of value, the impact of elements of value on enterprise value and the impact of each enterprise on organization value.
13. The network models of claim 12 where the inputs to the network models are selected from the group consisting of tangible indicators of element impact, combinations of tangible indicators of element impact and combinations thereof.
14. The network models of claim 12 where the impacts on elements of value, enterprise value and organization value are identified by category of value where the categories of value are selected from the group consisting of current operation, real options, market sentiment and combinations thereof.
15. The network models of claim 14 where the current operation category of value can be further subdivided by component of value where components of value are selected from the group consisting of revenue, expense, capital change and combinations thereof.
16. The network models of claim 12 where the hidden layer in the network models quantify the relationship between each input, the other inputs and the output measure.
17. The network models of claim 12 where the elements of value are selected from the group consisting of alliances, brands, channels, customers, customer relationships, employees, employee relationships, intellectual capital, intellectual property, partnerships, processes, production equipment, supply chain, vendors, vendor relationships and combinations thereof.
18. The network models of claim 12 where the subelements of value are selected from the group consisting of a single alliance, groups of alliances, a single brand, groups of brands, a single customer, groups of customers, a single customer relationship, groups of customer relationships, a single employee, groups of employees, a single employee relationship, groups of employee relationships, a single piece of intellectual property, groups of intellectual property, a single partnership, groups of partnerships, a single process, groups of processes, a single vendor, groups of vendors, a single vendor relationship, groups of vendor relationships and combinations thereof.
19. The network models of claim 11 that support organization analysis, management and optimization activities from the group consisting of automated equity trading, contribution analysis, element ranking, impact analysis, management reporting, multi-criteria optimization, network optimization, option discount rate calculation, pricing optimization, process optimization, purchasing optimization, simulation, element valuation, closed loop optimization and combinations thereof.
20. The network models of claim 11 that are developed by learning from the data.
21. The network models of claim 20 where the learning is completed on a continuous basis.
22. The network models of claim 11 that are selected from the group consisting of neural network models, bayesian models, regression models, multi-adaptive regression spline models and combinations thereof.
23. The network models of claim 11 where the aspects of organization financial performance are selected from the group consisting of revenue, expense, capital change, market sentiment, cash flow and market value.
24. A computer readable medium having sequences of instructions stored therein, which when executed cause the processors in a plurality of computers that have been connected via a network to perform an organization share price method, comprising:
integrating organization related data in accordance with a common schema,
developing a model of organization share price that identifies the value impact of each element of value using at least a portion of said data, and
identifying a trading price for organization shares using said model.
25. The computer readable medium of claim 24 where the value impact of each element is the product of the relative element contributions to each category of value and the value of the categories of value where the categories of value are selected from the group consisting of current operation, real option, market sentiment and combinations thereof.
26. The computer readable medium of claim 24 where the common schema further comprises a schema defined in accordance with an xml metadata standard.
27. The computer readable medium of claim 24 where the method further comprises:
completing one or more organization equity transactions based on the difference between market price and the trading price in an automated fashion.
28. The computer readable medium of claim 27 where the share trading price is the price where the value of organization market sentiment is negative.
29. The computer readable medium of claim 24 where the method further comprises:
displaying the value impacts for each of one or more elements of value using a paper document or electronic display.
30. The computer readable medium of claim 29 where the elements of value are selected from the group consisting of alliances, brands, channels, customers, customer relationships, employees, employee relationships, intellectual capital, intellectual property, partnerships, processes, production equipment, supply chain, vendors, vendor relationships and combinations thereof.
31. The computer readable medium of claim 24 where the method further comprises:
identifying a list of changes in indicators of element impact that will optimize one or more aspects of organization financial performance using said model, and
displaying the list of changes and the organization value after the changes.
32. The computer readable medium of claim 31 where the elements of value are selected from the group consisting of alliances, brands, channels, customers, customer relationships, employees, employee relationships, intellectual capital, intellectual property, partnerships, processes, production equipment, vendors, vendor relationships and combinations thereof.
33. The computer readable medium of claim 31 where the indicators of element impact are selected from the group consisting of composite variables, transaction averages, time lagged transaction averages, transaction ratios, time lagged transaction ratios, transaction trends, time lagged transaction trends, time lagged transaction data, transaction patterns, time lagged transaction patterns, geospatial measures, time lagged geospatial measures, relative rankings, links, frequencies, time periods, average time periods, cumulative time periods, rolling average time periods, cumulative total values, the period to period rates of change and combinations thereof.
34. The computer readable medium of claim 31 where aspects of organization financial performance are selected from the group consisting of revenue, expense, capital change, current operation value, real option value, market sentiment value, market value and combinations thereof.
35. The computer readable medium of claim 24 where organization related data are obtained from the group consisting of advanced financial systems, basic financial systems, alliance management systems, brand management systems, customer relationship management systems, channel management systems, estimating systems, intellectual property management systems, process management systems, supply chain management systems, vendor management systems, operation management systems, enterprise resource planning systems (ERP), material requirement planning systems (MRP), quality control systems, sales management systems, human resource systems, accounts receivable systems, accounts payable systems, capital asset systems, inventory systems, invoicing systems, payroll systems, purchasing systems, web site systems, external databases and combinations thereof.
36. The computer readable medium of claim 24 where the data includes historical data, forecast data and combinations thereof.
37. The computer readable medium of claim 24 where the data are transaction data, descriptive data, geospatial data, text data, linkage data and combinations thereof.
38. The computer readable medium of claim 24 where an organization is a single product, a group of products, a division, a company, a multi-company corporation or a value chain.
39. The computer readable medium of claim 24 that identifies and analyzes the factors that have an effect on facets of organization financial performance where the facets are selected from the group consisting of intellectual capital, elements of value, components of value, categories of value and combinations thereof.
40. Independent software components that integrate organization related data from a plurality of sources using a common data dictionary to support organization processing.
41. The software components of claim 40 where an organization is a single product, a group of products, a division, a company, a multi-company corporation or a value chain.
42. The software components of claim 40 where the data dictionary comprises part of an xml schema.
43. The software components of claim 40 where the data dictionary defines standard data attributes from the group consisting of account numbers, components of value, currencies, elements of value, units of measure and time periods.
44. The software components of claim 40 where organization related data is obtained from the group consisting of advanced financial systems, basic financial systems, alliance management systems, brand management systems, customer relationship management systems, channel management systems, estimating systems, intellectual property management systems, process management systems, supply chain management systems, vendor management systems, operation management systems, enterprise resource planning systems (ERP), material requirement planning systems (MRP), quality control systems, sales management systems, human resource systems, accounts receivable systems, accounts payable systems, capital asset systems, inventory systems, invoicing systems, payroll systems, purchasing systems, web site systems, external databases and combinations thereof.
45. The software components of claim 40 where at least a portion of the data is from the Internet or an external database.
46. The software components of claim 40 that convert data to match the common data dictionary as required.
47. The software components of claim 40 that support processing for organization analysis.
48. The software components of claim 40 that support processing for organization management.
49. The software components of claim 40 that support processing for organization optimization.
US10/743,417 1997-01-06 2003-12-22 Automated method of and system for identifying, measuring and enhancing categories of value for a value chain Abandoned US20040210509A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/743,417 US20040210509A1 (en) 1997-01-06 2003-12-22 Automated method of and system for identifying, measuring and enhancing categories of value for a value chain

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US08/779,109 US6393406B1 (en) 1995-10-03 1997-01-06 Method of and system for valving elements of a business enterprise
US99924597A 1997-12-10 1997-12-10
US09/135,983 US6321205B1 (en) 1995-10-03 1998-04-17 Method of and system for modeling and analyzing business improvement programs
US29333699A 1999-04-16 1999-04-16
US29533799A 1999-04-21 1999-04-21
US35896999A 1999-07-22 1999-07-22
US42155399A 1999-10-20 1999-10-20
US09/940,450 US10839321B2 (en) 1997-01-06 2001-08-29 Automated data storage system
US10/743,417 US20040210509A1 (en) 1997-01-06 2003-12-22 Automated method of and system for identifying, measuring and enhancing categories of value for a value chain

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/940,450 Continuation US10839321B2 (en) 1997-01-06 2001-08-29 Automated data storage system

Publications (1)

Publication Number Publication Date
US20040210509A1 true US20040210509A1 (en) 2004-10-21

Family

ID=32176726

Family Applications (5)

Application Number Title Priority Date Filing Date
US09/940,450 Expired - Lifetime US10839321B2 (en) 1997-01-06 2001-08-29 Automated data storage system
US10/645,099 Abandoned US20080140549A1 (en) 1997-01-06 2003-08-21 Automated method of and system for identifying, measuring and enhancing categories of value for a value chain
US10/743,417 Abandoned US20040210509A1 (en) 1997-01-06 2003-12-22 Automated method of and system for identifying, measuring and enhancing categories of value for a value chain
US10/750,792 Abandoned US20040172319A1 (en) 1997-01-06 2004-01-03 Value chain system
US13/555,047 Abandoned US20130073442A1 (en) 1999-10-20 2012-07-20 Trading system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US09/940,450 Expired - Lifetime US10839321B2 (en) 1997-01-06 2001-08-29 Automated data storage system
US10/645,099 Abandoned US20080140549A1 (en) 1997-01-06 2003-08-21 Automated method of and system for identifying, measuring and enhancing categories of value for a value chain

Family Applications After (2)

Application Number Title Priority Date Filing Date
US10/750,792 Abandoned US20040172319A1 (en) 1997-01-06 2004-01-03 Value chain system
US13/555,047 Abandoned US20130073442A1 (en) 1999-10-20 2012-07-20 Trading system

Country Status (1)

Country Link
US (5) US10839321B2 (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059484A1 (en) * 2000-11-16 2002-05-16 Tadao Matsuzuki Network building method, management report acquiring method and apparatus
US20030126583A1 (en) * 2001-12-28 2003-07-03 Cho Jin Hee Method and apparatus for identifying software components for use in an object-oriented programming system
US20060282228A1 (en) * 2005-06-10 2006-12-14 Pioneer Hi-Bred International, Inc. Method and system for use of environmental classification in precision farming
US20070005451A1 (en) * 2005-06-10 2007-01-04 Pioneer Hi-Bred International, Inc. Crop value chain optimization
US20070198421A1 (en) * 2005-12-19 2007-08-23 Muller Marcus S Systems and methods for dynamic digital asset resource management
US20080086340A1 (en) * 2006-10-04 2008-04-10 Pioneer Hi-Bred International, Inc. Crop quality insurance
US20080091747A1 (en) * 2006-10-17 2008-04-17 Anand Prahlad System and method for storage operation access security
US20080157990A1 (en) * 2006-12-29 2008-07-03 Pioneer Hi-Bred International, Inc. Automated location-based information recall
US20080249902A1 (en) * 2006-09-29 2008-10-09 Dun & Bradstreet Corp. Process and system for automated collection of business information from a business entity's accounting system
US20100280911A1 (en) * 2006-07-27 2010-11-04 Leverage, Inc. System and method for targeted marketing and consumer resource management
US20110010213A1 (en) * 2009-07-09 2011-01-13 Pioneer Hi-Bred International, Inc. Method for capturing and reporting relevant crop genotype-specific performance information to scientists for continued crop genetic improvement
US20110054974A1 (en) * 2009-09-01 2011-03-03 Pioneer Hi-Bred International, Inc. Allocation of resources across an enterprise
US20110131247A1 (en) * 2009-11-30 2011-06-02 International Business Machines Corporation Semantic Management Of Enterprise Resourses
US20110137740A1 (en) * 2009-12-04 2011-06-09 Ashmit Bhattacharya Processing value-ascertainable items
US8429428B2 (en) 1998-03-11 2013-04-23 Commvault Systems, Inc. System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services
US8434131B2 (en) 2009-03-20 2013-04-30 Commvault Systems, Inc. Managing connections in a data storage system
US9170890B2 (en) 2002-09-16 2015-10-27 Commvault Systems, Inc. Combined stream auxiliary copy system and method
US9898213B2 (en) 2015-01-23 2018-02-20 Commvault Systems, Inc. Scalable auxiliary copy processing using media agent resources
US9904481B2 (en) 2015-01-23 2018-02-27 Commvault Systems, Inc. Scalable auxiliary copy processing in a storage management system using media agent resources
US10459666B2 (en) 2017-03-03 2019-10-29 Commvault Systems, Inc. Using storage managers in respective data storage management systems for license distribution, compliance, and updates
US10614400B2 (en) 2014-06-27 2020-04-07 o9 Solutions, Inc. Plan modeling and user feedback
US11010261B2 (en) 2017-03-31 2021-05-18 Commvault Systems, Inc. Dynamically allocating streams during restoration of data
US11216478B2 (en) 2015-10-16 2022-01-04 o9 Solutions, Inc. Plan model searching
US11216765B2 (en) 2014-06-27 2022-01-04 o9 Solutions, Inc. Plan modeling visualization
US11216742B2 (en) 2019-03-04 2022-01-04 Iocurrents, Inc. Data compression and communication using machine learning
US11379781B2 (en) 2014-06-27 2022-07-05 o9 Solutions, Inc. Unstructured data processing in plan modeling

Families Citing this family (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020046143A1 (en) * 1995-10-03 2002-04-18 Eder Jeffrey Scott Method of and system for evaluating cash flow and elements of a business enterprise
US10839321B2 (en) 1997-01-06 2020-11-17 Jeffrey Eder Automated data storage system
US20050119922A1 (en) * 1997-01-06 2005-06-02 Eder Jeff S. Method of and system for analyzing, modeling and valuing elements of a business enterprise
US20040193503A1 (en) * 2000-10-04 2004-09-30 Eder Jeff Scott Interactive sales performance management system
US7107224B1 (en) * 2000-11-03 2006-09-12 Mydecide, Inc. Value driven integrated build-to-buy decision analysis system and method
US7991688B2 (en) * 2000-11-14 2011-08-02 Knowledge Works Inc. Methods and apparatus for automatically exchanging credit information
US7099885B2 (en) 2001-05-25 2006-08-29 Unicorn Solutions Method and system for collaborative ontology modeling
US7146399B2 (en) * 2001-05-25 2006-12-05 2006 Trident Company Run-time architecture for enterprise integration with transformation generation
US20030101170A1 (en) 2001-05-25 2003-05-29 Joseph Edelstein Data query and location through a central ontology model
US20060064666A1 (en) 2001-05-25 2006-03-23 Amaru Ruth M Business rules for configurable metamodels and enterprise impact analysis
US8412746B2 (en) 2001-05-25 2013-04-02 International Business Machines Corporation Method and system for federated querying of data sources
US20050038629A1 (en) * 2001-05-25 2005-02-17 Ruth Amaru Pricing of enterprise information resource management systems
US7877421B2 (en) * 2001-05-25 2011-01-25 International Business Machines Corporation Method and system for mapping enterprise data assets to a semantic information model
US20080027769A1 (en) 2002-09-09 2008-01-31 Jeff Scott Eder Knowledge based performance management system
US7426499B2 (en) * 2004-11-08 2008-09-16 Asset Trust, Inc. Search ranking system
US7881958B2 (en) * 2002-08-08 2011-02-01 Accenture Global Services Ltd. Business data analysis
US7493277B1 (en) 2002-08-21 2009-02-17 Mydecide Inc. Business opportunity analytics with dependence
US8019638B1 (en) 2002-08-21 2011-09-13 DecisionStreet, Inc. Dynamic construction of business analytics
GB0311026D0 (en) * 2003-05-14 2003-06-18 Salamander Organisation The Lt Organisation representation framework and design process
US8145535B2 (en) * 2003-10-24 2012-03-27 Sachin Goel Computer implemented methods for providing options on products
US8145536B1 (en) 2003-10-24 2012-03-27 Sachin Goel System for concurrent optimization of business economics and customer value
US7418409B1 (en) 2003-10-24 2008-08-26 Sachin Goel System for concurrent optimization of business economics and customer value satisfaction
US7983956B1 (en) 2003-10-24 2011-07-19 Sachin Goel System and method for providing options on products including flights
US8140399B1 (en) 2003-10-24 2012-03-20 Sachin Goel System for concurrent optimization of business economics and customer value
US7424449B2 (en) * 2003-10-24 2008-09-09 Sachin Goel Computer-implemented method to provide options on products to enhance customer experience
US7472080B2 (en) * 2003-10-24 2008-12-30 Sachin Goel Methods and associated systems for an airline to enhance customer experience and provide options on flights
GB2411977A (en) * 2004-02-03 2005-09-14 Patsystems Electronic trading system displaying market sentiment
US10049340B2 (en) * 2004-07-08 2018-08-14 One Network Enterprises, Inc. System and computer program for a global transaction manager in a federated value chain network
US8392228B2 (en) * 2010-03-24 2013-03-05 One Network Enterprises, Inc. Computer program product and method for sales forecasting and adjusting a sales forecast
US8352300B2 (en) * 2004-07-08 2013-01-08 One Network Enterprises, Inc. System, computer program and method for implementing and managing a value chain network
US10311455B2 (en) 2004-07-08 2019-06-04 One Network Enterprises, Inc. Computer program product and method for sales forecasting and adjusting a sales forecast
US8732004B1 (en) 2004-09-22 2014-05-20 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US8489407B2 (en) * 2005-01-04 2013-07-16 International Business Machines Corporation Method of evaluating business components in an enterprise
US8713025B2 (en) 2005-03-31 2014-04-29 Square Halt Solutions, Limited Liability Company Complete context search system
US20070038501A1 (en) * 2005-08-10 2007-02-15 International Business Machines Corporation Business solution evaluation
US20070038465A1 (en) * 2005-08-10 2007-02-15 International Business Machines Corporation Value model
US20080228539A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Using commercial share of wallet to manage vendors
US20080221947A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Using commercial share of wallet to make lending decisions
WO2007084251A2 (en) * 2005-11-17 2007-07-26 Kwok Alfred C System for intellectual property trading
US7761478B2 (en) * 2005-11-23 2010-07-20 International Business Machines Corporation Semantic business model management
US20070129981A1 (en) * 2005-12-07 2007-06-07 International Business Machines Corporation Business solution management
US20070150396A1 (en) * 2005-12-27 2007-06-28 Gridstock Inc. Stock value chains
US20070203718A1 (en) * 2006-02-24 2007-08-30 Microsoft Corporation Computing system for modeling of regulatory practices
US20070214025A1 (en) * 2006-03-13 2007-09-13 International Business Machines Corporation Business engagement management
US7774695B2 (en) * 2006-05-11 2010-08-10 International Business Machines Corporation Presenting data to a user in a three-dimensional table
US20080004924A1 (en) * 2006-06-28 2008-01-03 Rong Zeng Cao Business transformation management
US8036979B1 (en) 2006-10-05 2011-10-11 Experian Information Solutions, Inc. System and method for generating a finance attribute from tradeline data
US20080140484A1 (en) * 2006-12-08 2008-06-12 Ofer Akerman System and method for creating and managing intelligence events for organizations
US8606626B1 (en) 2007-01-31 2013-12-10 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
US8606666B1 (en) 2007-01-31 2013-12-10 Experian Information Solutions, Inc. System and method for providing an aggregation tool
FI20075349L (en) * 2007-05-14 2008-11-15 Stiftelsen Arcada Method and arrangement in quality control
US20090063501A1 (en) * 2007-08-31 2009-03-05 International Business Machines Corporation Systems, methods and computer products for generating policy based fail over configuration for darabase clusters
US7730091B2 (en) * 2007-08-31 2010-06-01 International Business Machines Corporation Systems, methods and computer products for database cluster modeling
US20090182596A1 (en) * 2008-01-15 2009-07-16 International Business Machines Corporation Method and system of analyzing choices in a value network
US8204772B2 (en) * 2008-06-04 2012-06-19 Accenture Global Services Limited Customer service experience comparative landscape tool
US20100030803A1 (en) * 2008-07-30 2010-02-04 Erik Rothenberg Method for generating business intelligence
US20100030799A1 (en) * 2008-07-30 2010-02-04 Parker Daniel J Method for Generating a Computer-Processed Financial Tradable Index
US8271319B2 (en) * 2008-08-06 2012-09-18 Microsoft Corporation Structured implementation of business adaptability changes
US8195504B2 (en) * 2008-09-08 2012-06-05 Microsoft Corporation Linking service level expectations to performing entities
US8150726B2 (en) 2008-09-30 2012-04-03 Microsoft Corporation Linking organizational strategies to performing capabilities
US20100082380A1 (en) * 2008-09-30 2010-04-01 Microsoft Corporation Modeling and measuring value added networks
US20100131311A1 (en) * 2008-11-21 2010-05-27 Parker Daniel J Method for modifying the terms of a financial instrument
US8655711B2 (en) 2008-11-25 2014-02-18 Microsoft Corporation Linking enterprise resource planning data to business capabilities
US8392896B2 (en) * 2009-03-06 2013-03-05 Microsoft Corporation Software test bed generation
US20110093420A1 (en) * 2009-10-16 2011-04-21 Erik Rothenberg Computer-processing system scoring subjects relative to political, economic, social, technological, legal and environmental (pestle) factors, utilizing input data and a collaboration process, transforming a measurement valuation system regarding the value of subjects against an agenda
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US8924314B2 (en) * 2010-09-28 2014-12-30 Ebay Inc. Search result ranking using machine learning
US20120239445A1 (en) * 2011-03-15 2012-09-20 Accenture Global Services Limited Analytics value assessment toolkit
US8825539B2 (en) * 2011-08-26 2014-09-02 Morgan Stanley & Co. Llc Computer-based systems and methods for computing market-adjusted elasticities for accounts
US8452679B2 (en) * 2011-08-26 2013-05-28 Bank Of America Corporation Financial statement analyzer
US20140298286A1 (en) * 2012-03-20 2014-10-02 Massively Parallel Technologies, Inc. Systems and Methods for Automatically Associating Software Elements and Automatic Gantt Chart Creation
US9607274B2 (en) * 2012-03-23 2017-03-28 Chairman's View, Inc. Enterprise value assessment tool
US9229688B2 (en) 2013-03-14 2016-01-05 Massively Parallel Technologies, Inc. Automated latency management and cross-communication exchange conversion
US9734266B2 (en) * 2013-03-15 2017-08-15 IronCAD, LLC Computer-aided design multi-user design negotiation system and method thereof
US20140358745A1 (en) * 2013-06-04 2014-12-04 LedgerPal Inc. Automated accounting method
US10262362B1 (en) 2014-02-14 2019-04-16 Experian Information Solutions, Inc. Automatic generation of code for attributes
US10445152B1 (en) 2014-12-19 2019-10-15 Experian Information Solutions, Inc. Systems and methods for dynamic report generation based on automatic modeling of complex data structures
US10528522B1 (en) 2016-03-17 2020-01-07 EMC IP Holding Company LLC Metadata-based data valuation
US11037208B1 (en) * 2016-12-16 2021-06-15 EMC IP Holding Company LLC Economic valuation of data assets
CN106971365A (en) * 2017-03-21 2017-07-21 武汉微诚科技股份有限公司 A kind of comprehensive control platform
US10673711B2 (en) * 2017-11-28 2020-06-02 International Business Machines Corporation Resource provisioning platform with optimized bundling
US11383377B2 (en) * 2018-10-09 2022-07-12 Jpmorgan Chase Bank, N.A. System and method for bot automation lifecycle management
EP3938850A1 (en) * 2019-03-15 2022-01-19 3M Innovative Properties Company Method of optimizing control signals used in operating vehicle
KR102471120B1 (en) * 2019-08-27 2022-11-25 (주)아이알엠 Data transmission system for transmitting and receiving medical information data and a data transmission method thereof
US11023149B1 (en) * 2020-01-31 2021-06-01 EMC IP Holding Company LLC Doubly mapped cluster contraction
US20220398604A1 (en) * 2021-06-09 2022-12-15 Jpmorgan Chase Bank, N.A. Systems and methods for dynamic cash flow modeling
US20220405859A1 (en) * 2021-06-16 2022-12-22 Intuit Inc. Recommendation system for recording a transaction
US20240062228A1 (en) * 2022-08-21 2024-02-22 Cogitaas AVA Pte Ltd System and method for determining consumer surplus factor

Citations (101)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US16758A (en) * 1857-03-03 Machine fob husking corn
US23034A (en) * 1859-02-22 Xfiee-plug
US52820A (en) * 1866-02-27 Improved railway-brake
US3749892A (en) * 1971-02-16 1973-07-31 Qeleg Ltd Accountancy system
US3933305A (en) * 1974-08-23 1976-01-20 John Michael Murphy Asset value calculators
US4414629A (en) * 1979-04-02 1983-11-08 Waite John H Method and apparatus for making correlations and predictions using a finite field of data of unorganized and/or partially structured elements
US4839304A (en) * 1986-12-18 1989-06-13 Nec Corporation Method of making a field effect transistor with overlay gate structure
US4989141A (en) * 1987-06-01 1991-01-29 Corporate Class Software Computer system for financial analyses and reporting
US5128861A (en) * 1988-12-07 1992-07-07 Hitachi, Ltd. Inventory control method and system
US5191522A (en) * 1990-01-18 1993-03-02 Itt Corporation Integrated group insurance information processing and reporting system based upon an enterprise-wide data structure
US5193055A (en) * 1987-03-03 1993-03-09 Brown Gordon T Accounting system
US5224034A (en) * 1990-12-21 1993-06-29 Bell Communications Research, Inc. Automated system for generating procurement lists
US5237495A (en) * 1990-05-23 1993-08-17 Fujitsu Limited Production/purchase management processing system and method
US5237946A (en) * 1989-01-23 1993-08-24 Copson Alex G Apparatus and method for transferring material to subaqueous levels
US5311421A (en) * 1989-12-08 1994-05-10 Hitachi, Ltd. Process control method and system for performing control of a controlled system by use of a neural network
US5317504A (en) * 1991-10-23 1994-05-31 T.A.S. & Trading Co., Ltd. Computer implemented process for executing accounting theory systems
US5361201A (en) * 1992-10-19 1994-11-01 Hnc, Inc. Real estate appraisal using predictive modeling
US5406477A (en) * 1991-08-30 1995-04-11 Digital Equipment Corporation Multiple reasoning and result reconciliation for enterprise analysis
US5414621A (en) * 1992-03-06 1995-05-09 Hough; John R. System and method for computing a comparative value of real estate
US5638492A (en) * 1992-09-08 1997-06-10 Hitachi, Ltd. Information processing apparatus and monitoring apparatus
US5644727A (en) * 1987-04-15 1997-07-01 Proprietary Financial Products, Inc. System for the operation and management of one or more financial accounts through the use of a digital communication and computation system for exchange, investment and borrowing
US5649181A (en) * 1993-04-16 1997-07-15 Sybase, Inc. Method and apparatus for indexing database columns with bit vectors
US5668951A (en) * 1988-04-22 1997-09-16 Digital Equipment Corporation Avoiding congestion system for reducing traffic load on selected end systems which utilizing above their allocated fair shares to optimize throughput at intermediate node
US5706495A (en) * 1996-05-07 1998-01-06 International Business Machines Corporation Encoded-vector indices for decision support and warehousing
US5737581A (en) * 1995-08-30 1998-04-07 Keane; John A. Quality system implementation simulator
US5742775A (en) * 1995-01-18 1998-04-21 King; Douglas L. Method and apparatus of creating financial instrument and administering an adjustable rate loan system
US5761442A (en) * 1994-08-31 1998-06-02 Advanced Investment Technology, Inc. Predictive neural network means and method for selecting a portfolio of securities wherein each network has been trained using data relating to a corresponding security
US5768475A (en) * 1995-05-25 1998-06-16 Pavilion Technologies, Inc. Method and apparatus for automatically constructing a data flow architecture
US5774761A (en) * 1997-10-14 1998-06-30 Xerox Corporation Machine set up procedure using multivariate modeling and multiobjective optimization
US5774873A (en) * 1996-03-29 1998-06-30 Adt Automotive, Inc. Electronic on-line motor vehicle auction and information system
US5802501A (en) * 1992-10-28 1998-09-01 Graff/Ross Holdings System and methods for computing to support decomposing property into separately valued components
US5809282A (en) * 1995-06-07 1998-09-15 Grc International, Inc. Automated network simulation and optimization system
US5812404A (en) * 1996-04-18 1998-09-22 Valmet Corporation Method for overall regulation of the headbox of a paper machine or equivalent
US5812988A (en) * 1993-12-06 1998-09-22 Investments Analytic, Inc. Method and system for jointly estimating cash flows, simulated returns, risk measures and present values for a plurality of assets
US5875431A (en) * 1996-03-15 1999-02-23 Heckman; Frank Legal strategic analysis planning and evaluation control system and method
US5887120A (en) * 1995-05-31 1999-03-23 Oracle Corporation Method and apparatus for determining theme for discourse
US5889823A (en) * 1995-12-13 1999-03-30 Lucent Technologies Inc. Method and apparatus for compensation of linear or nonlinear intersymbol interference and noise correlation in magnetic recording channels
US5933345A (en) * 1996-05-06 1999-08-03 Pavilion Technologies, Inc. Method and apparatus for dynamic and steady state modeling over a desired path between two end points
US5938594A (en) * 1996-05-14 1999-08-17 Massachusetts Institute Of Technology Method and apparatus for detecting nonlinearity and chaos in a dynamical system
US6026388A (en) * 1995-08-16 2000-02-15 Textwise, Llc User interface and other enhancements for natural language information retrieval system and method
US6064972A (en) * 1997-09-17 2000-05-16 At&T Corp Risk management technique for network access
US6064971A (en) * 1992-10-30 2000-05-16 Hartnett; William J. Adaptive knowledge base
US6073115A (en) * 1992-09-30 2000-06-06 Marshall; Paul Steven Virtual reality generator for displaying abstract information
US6078901A (en) * 1997-04-03 2000-06-20 Ching; Hugh Quantitative supply and demand model based on infinite spreadsheet
US6092056A (en) * 1994-04-06 2000-07-18 Morgan Stanley Dean Witter Data processing system and method for financial debt instruments
US6112188A (en) * 1992-10-30 2000-08-29 Hartnett; William J. Privatization marketplace
US6173276B1 (en) * 1997-08-21 2001-01-09 Scicomp, Inc. System and method for financial instrument modeling and valuation
US6189011B1 (en) * 1996-03-19 2001-02-13 Siebel Systems, Inc. Method of maintaining a network of partially replicated database system
US6207936B1 (en) * 1996-01-31 2001-03-27 Asm America, Inc. Model-based predictive control of thermal processing
US6209124B1 (en) * 1999-08-30 2001-03-27 Touchnet Information Systems, Inc. Method of markup language accessing of host systems and data using a constructed intermediary
US6219649B1 (en) * 1999-01-21 2001-04-17 Joel Jameson Methods and apparatus for allocating resources in the presence of uncertainty
US6249768B1 (en) * 1998-10-29 2001-06-19 International Business Machines Corporation Strategic capability networks
US6266645B1 (en) * 1998-09-01 2001-07-24 Imetrikus, Inc. Risk adjustment tools for analyzing patient electronic discharge records
US20010009590A1 (en) * 1997-03-24 2001-07-26 Holm Jack M. Pictorial digital image processing incorporating image and output device modifications
US6278981B1 (en) * 1997-05-29 2001-08-21 Algorithmics International Corporation Computer-implemented method and apparatus for portfolio compression
US6278899B1 (en) * 1996-05-06 2001-08-21 Pavilion Technologies, Inc. Method for on-line optimization of a plant
US6282531B1 (en) * 1998-06-12 2001-08-28 Cognimed, Llc System for managing applied knowledge and workflow in multiple dimensions and contexts
US6321212B1 (en) * 1999-07-21 2001-11-20 Longitude, Inc. Financial products having a demand-based, adjustable return, and trading exchange therefor
US6347306B1 (en) * 1998-07-21 2002-02-12 Cybershift.Com, Inc. Method and system for direct payroll processing
US6366934B1 (en) * 1998-10-08 2002-04-02 International Business Machines Corporation Method and apparatus for querying structured documents using a database extender
US6416448B1 (en) * 1995-03-20 2002-07-09 Andreas Hassler Therapy and training device
US20020097245A1 (en) * 2000-12-27 2002-07-25 Il-Kwon Jeong Sensor fusion apparatus and method for optical and magnetic motion capture systems
US6546381B1 (en) * 1998-11-02 2003-04-08 International Business Machines Corporation Query optimization system and method
US6584507B1 (en) * 1999-03-02 2003-06-24 Cisco Technology, Inc. Linking external applications to a network management system
US6700923B1 (en) * 1999-01-04 2004-03-02 Board Of Regents The University Of Texas System Adaptive multiple access interference suppression
US6732095B1 (en) * 2001-04-13 2004-05-04 Siebel Systems, Inc. Method and apparatus for mapping between XML and relational representations
US6772136B2 (en) * 1997-08-21 2004-08-03 Elaine Kant System and method for financial instrument modeling and using Monte Carlo simulation
US6885975B2 (en) * 2000-11-14 2005-04-26 Rajagopalan Srinivasan Method and apparatus for managing process transitions
US6909708B1 (en) * 1996-11-18 2005-06-21 Mci Communications Corporation System, method and article of manufacture for a communication system architecture including video conferencing
US6934931B2 (en) * 2000-04-05 2005-08-23 Pavilion Technologies, Inc. System and method for enterprise modeling, optimization and control
US7006939B2 (en) * 2000-04-19 2006-02-28 Georgia Tech Research Corporation Method and apparatus for low cost signature testing for analog and RF circuits
US7047169B2 (en) * 2001-01-18 2006-05-16 The Board Of Trustees Of The University Of Illinois Method for optimizing a solution set
US7080207B2 (en) * 2002-04-30 2006-07-18 Lsi Logic Corporation Data storage apparatus, system and method including a cache descriptor having a field defining data in a cache block
US7219100B2 (en) * 2003-12-05 2007-05-15 Edgenet, Inc. Method and apparatus for database induction for creating frame based knowledge tree
US7542932B2 (en) * 2004-02-20 2009-06-02 General Electric Company Systems and methods for multi-objective portfolio optimization
US7558803B1 (en) * 2007-02-01 2009-07-07 Sas Institute Inc. Computer-implemented systems and methods for bottom-up induction of decision trees
US7561158B2 (en) * 2006-01-11 2009-07-14 International Business Machines Corporation Method and apparatus for presenting feature importance in predictive modeling
US7672889B2 (en) * 2004-07-15 2010-03-02 Brooks Kent F System and method for providing customizable investment tools
US7702615B1 (en) * 2005-11-04 2010-04-20 M-Factor, Inc. Creation and aggregation of predicted data
US7716108B2 (en) * 2003-05-08 2010-05-11 International Business Machines Corporation Software application portfolio management for a client
US7716333B2 (en) * 2001-11-27 2010-05-11 Accenture Global Services Gmbh Service control architecture
US7720782B2 (en) * 2006-12-22 2010-05-18 American Express Travel Related Services Company, Inc. Automated predictive modeling of business future events based on historical data
US7725374B2 (en) * 2003-10-10 2010-05-25 Julian Van Erlach Asset analysis according to the required yield method
US7743006B2 (en) * 2004-07-07 2010-06-22 Exxonmobil Upstream Research Co. Bayesian network triads for geologic and geophysical applications
US7747339B2 (en) * 2002-10-03 2010-06-29 Hewlett-Packard Development Company, L.P. Managing procurement risk
US7756770B2 (en) * 1999-11-26 2010-07-13 Research In Motion Limited System and method for trading off upside and downside values of a portfolio
US7769684B2 (en) * 2006-05-19 2010-08-03 Accenture Global Services Gmbh Semi-quantitative risk analysis
US7778856B2 (en) * 2001-12-05 2010-08-17 Algorithmics International Corp. System and method for measuring and managing operational risk
US7778910B2 (en) * 2004-03-02 2010-08-17 Accenture Global Services Gmbh Future value drivers
US7788195B1 (en) * 2006-03-24 2010-08-31 Sas Institute Inc. Computer-implemented predictive model generation systems and methods
US7899723B2 (en) * 2003-07-01 2011-03-01 Accenture Global Services Gmbh Shareholder value tool
US7912769B2 (en) * 2003-07-01 2011-03-22 Accenture Global Services Limited Shareholder value tool
US7921061B2 (en) * 2007-09-05 2011-04-05 Oracle International Corporation System and method for simultaneous price optimization and asset allocation to maximize manufacturing profits
US8010387B2 (en) * 2003-06-04 2011-08-30 California Institute Of Technology Method, computer program product, and system for risk management
US8108920B2 (en) * 2003-05-12 2012-01-31 Microsoft Corporation Passive client single sign-on for web applications
US8141155B2 (en) * 2007-03-16 2012-03-20 Prevari Predictive assessment of network risks
US8185486B2 (en) * 2000-10-17 2012-05-22 Asset Trust, Inc. Segmented predictive model system
US8230477B2 (en) * 2007-02-21 2012-07-24 International Business Machines Corporation System and method for the automatic evaluation of existing security policies and automatic creation of new security policies
US8255346B2 (en) * 2009-11-11 2012-08-28 International Business Machines Corporation Methods and systems for variable group selection and temporal causal modeling
US8386401B2 (en) * 2008-09-10 2013-02-26 Digital Infuzion, Inc. Machine learning methods and systems for identifying patterns in data using a plurality of learning machines wherein the learning machine that optimizes a performance function is selected
US8401950B2 (en) * 2010-01-25 2013-03-19 Fair Isaac Corporation Optimizing portfolios of financial instruments

Family Cites Families (424)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2470414A1 (en) 1979-11-27 1981-05-29 Flonic Sa ELECTRICAL CONNECTION SYSTEM AND MEMORY CARD APPLYING THE SYSTEM
IT1127329B (en) 1980-01-07 1986-05-21 Welch Henry H AUTOMATIC MULTI-CHANNEL APPARATUS TO CARRY OUT URGENCY ANALYSIS IN PARTICULAR CHEMICAL-CLINICAL ANALYSIS ON BIOLOGICAL LIQUIDS
DE3020902A1 (en) 1980-06-02 1981-12-17 Robert Bosch Gmbh, 7000 Stuttgart ELECTRONIC CONTROL UNIT, IN PARTICULAR FOR MOTOR VEHICLES
FR2591007B1 (en) 1985-12-02 1988-02-19 Remery Patrick ELECTRONIC PAYMENT METHOD USING A MEMORY CARD
US5508731A (en) * 1986-03-10 1996-04-16 Response Reward Systems L.C. Generation of enlarged participatory broadcast audience
US5093787A (en) 1986-06-12 1992-03-03 Simmons John C Electronic checkbook with automatic reconciliation
US4839804A (en) * 1986-12-30 1989-06-13 College Savings Bank Method and apparatus for insuring the funding of a future liability of uncertain cost
US4930077A (en) 1987-04-06 1990-05-29 Fan David P Information processing expert system for text analysis and predicting public opinion based information available to the public
US5852811A (en) 1987-04-15 1998-12-22 Proprietary Financial Products, Inc. Method for managing financial accounts by a preferred allocation of funds among accounts
US5471811A (en) 1989-05-04 1995-12-05 Marylyn House Combination traffic barrier and retaining wall and method of construction
US5295256A (en) * 1990-12-14 1994-03-15 Racal-Datacom, Inc. Automatic storage of persistent objects in a relational schema
US5221838A (en) 1990-12-24 1993-06-22 Motorola, Inc. Electronic wallet
JPH04264957A (en) 1991-02-20 1992-09-21 Toshiba Corp Security sales decision making supporting device
US7142307B1 (en) 1991-03-01 2006-11-28 Stark Edward W Method and apparatus for optical interactance and transmittance measurements
GB9105367D0 (en) 1991-03-13 1991-04-24 Univ Strathclyde Computerised information-retrieval database systems
US5377116A (en) 1991-07-01 1994-12-27 Valenite Inc. Method and system for designing a cutting tool
US6134536A (en) 1992-05-29 2000-10-17 Swychco Infrastructure Services Pty Ltd. Methods and apparatus relating to the formulation and trading of risk management contracts
EP0587290B1 (en) 1992-07-30 2000-01-26 Teknekron Infoswitch Corporation Method and system for monitoring and/or controlling the performance of an organization
US5999908A (en) * 1992-08-06 1999-12-07 Abelow; Daniel H. Customer-based product design module
US7941326B2 (en) 2001-03-14 2011-05-10 Health Hero Network, Inc. Interactive patient communication development system for reporting on patient healthcare management
JPH06348584A (en) 1993-06-01 1994-12-22 Internatl Business Mach Corp <Ibm> Data processing system
US5920847A (en) 1993-11-01 1999-07-06 Visa International Service Association Electronic bill pay system
US5644778A (en) 1993-11-02 1997-07-01 Athena Of North America, Inc. Medical transaction system
US6018722A (en) * 1994-04-18 2000-01-25 Aexpert Advisory, Inc. S.E.C. registered individual account investment advisor expert system
US6061515A (en) * 1994-07-18 2000-05-09 International Business Machines Corporation System and method for providing a high level language for mapping and accessing objects in data stores
US5737736A (en) 1994-07-29 1998-04-07 Oracle Corporation Method and apparatus for storing objects using a c-structure and a bind descriptor
US5592378A (en) 1994-08-19 1997-01-07 Andersen Consulting Llp Computerized order entry system and method
US5704045A (en) 1995-01-09 1997-12-30 King; Douglas L. System and method of risk transfer and risk diversification including means to assure with assurance of timely payment and segregation of the interests of capital
US5513144A (en) * 1995-02-13 1996-04-30 Micron Technology, Inc. On-chip memory redundancy circuitry for programmable non-volatile memories, and methods for programming same
US5680305A (en) 1995-02-16 1997-10-21 Apgar, Iv; Mahlon System and method for evaluating real estate
US6245347B1 (en) 1995-07-28 2001-06-12 Zars, Inc. Methods and apparatus for improved administration of pharmaceutically active compounds
US5727158A (en) 1995-09-22 1998-03-10 Integra Soft, Inc. Information repository for storing information for enterprise computing system
US20020046143A1 (en) * 1995-10-03 2002-04-18 Eder Jeffrey Scott Method of and system for evaluating cash flow and elements of a business enterprise
US5819237A (en) 1996-02-13 1998-10-06 Financial Engineering Associates, Inc. System and method for determination of incremental value at risk for securities trading
US5825653A (en) 1997-03-14 1998-10-20 Valmet Corporation Method for overall regulation of a former of a paper machine or equivalent
US6028938A (en) 1996-04-30 2000-02-22 Shana Corporation Secure electronic forms permitting layout revision
DE19627472A1 (en) 1996-07-08 1998-01-15 Ser Systeme Ag Database system
US6047280A (en) 1996-10-25 2000-04-04 Navigation Technologies Corporation Interface layer for navigation system
US5970490A (en) * 1996-11-05 1999-10-19 Xerox Corporation Integration platform for heterogeneous databases
US20050119922A1 (en) * 1997-01-06 2005-06-02 Eder Jeff S. Method of and system for analyzing, modeling and valuing elements of a business enterprise
US20010041996A1 (en) 1997-01-06 2001-11-15 Eder Jeffrey Scott Method of and system for valuing elements of a business enterprise
US10839321B2 (en) 1997-01-06 2020-11-17 Jeffrey Eder Automated data storage system
US20010034686A1 (en) 1997-12-10 2001-10-25 Eder Jeff Scott Method of and system for defining and measuring the real options of a commercial enterprise
GB9704187D0 (en) 1997-02-28 1997-04-16 Mayon White William M Business analysis tool and method
DE19711650C1 (en) * 1997-03-20 1998-06-10 Bayer Ag Hydroxy-silyl-functional carbo-silane dendrimer preparation in good yield with easy separation from by-product
US5990883A (en) 1997-04-28 1999-11-23 Microsoft Corporation Unified presentation of programming from different physical sources
US6182274B1 (en) 1997-05-01 2001-01-30 International Business Machines Corporation Reusing code in object-oriented program development
US6023578A (en) 1997-05-09 2000-02-08 International Business Macines Corporation Systems, methods and computer program products for generating an object oriented application for an object oriented environment
JP2002513489A (en) 1997-05-21 2002-05-08 カイメトリクス・インコーポレーテッド Method of controlled optimization of corporate planning model
US5991758A (en) * 1997-06-06 1999-11-23 Madison Information Technologies, Inc. System and method for indexing information about entities from different information sources
EP0989923B1 (en) * 1997-06-17 2003-12-03 WITZIG &amp; FRANK GmbH Highly flexible machine tool
US6012053A (en) * 1997-06-23 2000-01-04 Lycos, Inc. Computer system with user-controlled relevance ranking of search results
JP3288264B2 (en) 1997-06-26 2002-06-04 富士通株式会社 Design information management system, design information access device, and program storage medium
US5937409A (en) 1997-07-25 1999-08-10 Oracle Corporation Integrating relational databases in an object oriented environment
US6092068A (en) * 1997-08-05 2000-07-18 Netscape Communication Corporation Marked document tutor
US6301584B1 (en) * 1997-08-21 2001-10-09 Home Information Services, Inc. System and method for retrieving entities and integrating data
US6470386B1 (en) 1997-09-26 2002-10-22 Worldcom, Inc. Integrated proxy interface for web based telecommunications management tools
US6714979B1 (en) 1997-09-26 2004-03-30 Worldcom, Inc. Data warehousing infrastructure for web based reporting tool
US6151601A (en) 1997-11-12 2000-11-21 Ncr Corporation Computer architecture and method for collecting, analyzing and/or transforming internet and/or electronic commerce data for storage into a data storage area
US7376578B1 (en) * 1997-11-19 2008-05-20 I2 Technologies Us, Inc. Computer-implemented product valuation tool
US6681227B1 (en) 1997-11-19 2004-01-20 Ns Solutions Corporation Database system and a method of data retrieval from the system
US6055543A (en) * 1997-11-21 2000-04-25 Verano File wrapper containing cataloging information for content searching across multiple platforms
US5918232A (en) 1997-11-26 1999-06-29 Whitelight Systems, Inc. Multidimensional domain modeling method and system
US6324553B1 (en) 1997-11-26 2001-11-27 International Business Machines Corporation Apparatus and method for the manual selective blocking of images
US6125355A (en) 1997-12-02 2000-09-26 Financial Engines, Inc. Pricing module for financial advisory system
US6092058A (en) 1998-01-08 2000-07-18 The United States Of America As Represented By The Secretary Of The Army Automatic aiding of human cognitive functions with computerized displays
US6028605A (en) 1998-02-03 2000-02-22 Documentum, Inc. Multi-dimensional analysis of objects by manipulating discovered semantic properties
US6163776A (en) 1998-03-23 2000-12-19 Software Tree, Inc. System and method for exchanging data and commands between an object oriented system and relational system
US20010041995A1 (en) 1998-04-17 2001-11-15 Eder Jeffrey Scott Method of and system for modeling and analyzing business improvement programs
US6246672B1 (en) * 1998-04-28 2001-06-12 International Business Machines Corp. Singlecast interactive radio system
US7739224B1 (en) 1998-05-06 2010-06-15 Infor Global Solutions (Michigan), Inc. Method and system for creating a well-formed database using semantic definitions
US6317748B1 (en) 1998-05-08 2001-11-13 Microsoft Corporation Management information to object mapping and correlator
US6345278B1 (en) * 1998-06-04 2002-02-05 Collegenet, Inc. Universal forms engine
US6820235B1 (en) 1998-06-05 2004-11-16 Phase Forward Inc. Clinical trial data management system and method
US6493717B1 (en) 1998-06-16 2002-12-10 Datafree, Inc. System and method for managing database information
US6279011B1 (en) 1998-06-19 2001-08-21 Network Appliance, Inc. Backup and restore for heterogeneous file server environment
US6185580B1 (en) 1998-06-24 2001-02-06 International Business Machines Corporation Physical information and extensions file and file system translator
US6327574B1 (en) 1998-07-07 2001-12-04 Encirq Corporation Hierarchical models of consumer attributes for targeting content in a privacy-preserving manner
US6697997B1 (en) 1998-08-12 2004-02-24 Nippon Telegraph And Telephone Corporation Recording medium with a signed hypertext recorded thereon signed hypertext generating method and apparatus and signed hypertext verifying method and apparatus
US6567814B1 (en) 1998-08-26 2003-05-20 Thinkanalytics Ltd Method and apparatus for knowledge discovery in databases
US6535868B1 (en) 1998-08-27 2003-03-18 Debra A. Galeazzi Method and apparatus for managing metadata in a database management system
GB2343763B (en) 1998-09-04 2003-05-21 Shell Services Internat Ltd Data processing system
US6558431B1 (en) * 1998-09-11 2003-05-06 Macromedia, Inc. Storing valid and invalid markup language in strict and relaxed tables respectively
US6457053B1 (en) 1998-09-21 2002-09-24 Microsoft Corporation Multi-master unique identifier allocation
US6501491B1 (en) 1998-09-21 2002-12-31 Microsoft Corporation Extensible user interface for viewing objects over a network
US6324571B1 (en) 1998-09-21 2001-11-27 Microsoft Corporation Floating single master operation
US6317749B1 (en) 1998-09-30 2001-11-13 Daman, Inc. Method and apparatus for providing relationship objects and various features to relationship and other objects
US6681330B2 (en) 1998-10-02 2004-01-20 International Business Machines Corporation Method and system for a heterogeneous computer network system with unobtrusive cross-platform user access
US7162464B1 (en) 1998-10-02 2007-01-09 Ncr Corporation Data mining assists in a relational database management system
US6584459B1 (en) * 1998-10-08 2003-06-24 International Business Machines Corporation Database extender for storing, querying, and retrieving structured documents
US6519597B1 (en) * 1998-10-08 2003-02-11 International Business Machines Corporation Method and apparatus for indexing structured documents with rich data types
US6453310B1 (en) 1998-10-26 2002-09-17 Microsoft Corporation Installable schema for low-overhead databases
US6718320B1 (en) 1998-11-02 2004-04-06 International Business Machines Corporation Schema mapping system and method
US6523172B1 (en) 1998-12-17 2003-02-18 Evolutionary Technologies International, Inc. Parser translator system and method
US6424979B1 (en) * 1998-12-30 2002-07-23 American Management Systems, Inc. System for presenting and managing enterprise architectures
US6772180B1 (en) 1999-01-22 2004-08-03 International Business Machines Corporation Data representation schema translation through shared examples
US6487547B1 (en) 1999-01-29 2002-11-26 Oracle Corporation Database appliance comprising hardware and software bundle configured for specific database applications
US6330564B1 (en) 1999-02-10 2001-12-11 International Business Machines Corporation System and method for automated problem isolation in systems with measurements structured as a multidimensional database
US6275819B1 (en) 1999-03-16 2001-08-14 Novell, Inc. Method and apparatus for characterizing and retrieving query results
JP4168522B2 (en) * 1999-03-18 2008-10-22 株式会社日立製作所 Active storage device, storage control method thereof, and heterogeneous data integrated utilization system using the same
US6315735B1 (en) 1999-03-31 2001-11-13 Pulsion Medical Systems Ag Devices for in-vivo determination of the compliance function and the systemic blood flow of a living being
US6658625B1 (en) 1999-04-14 2003-12-02 International Business Machines Corporation Apparatus and method for generic data conversion
US20040215495A1 (en) 1999-04-16 2004-10-28 Eder Jeff Scott Method of and system for defining and measuring the elements of value and real options of a commercial enterprise
US6327590B1 (en) * 1999-05-05 2001-12-04 Xerox Corporation System and method for collaborative ranking of search results employing user and group profiles derived from document collection content analysis
US7249328B1 (en) * 1999-05-21 2007-07-24 E-Numerate Solutions, Inc. Tree view for reusable data markup language
US7089202B1 (en) 1999-05-27 2006-08-08 Cathleen Noland Method and system for internet banking and financial services
US6496842B1 (en) 1999-05-28 2002-12-17 Survol Interactive Technologies Navigating heirarchically organized information
AU5377900A (en) * 1999-06-02 2000-12-28 Algorithmics International Corp. Risk management system, distributed framework and method
US6330547B1 (en) 1999-06-02 2001-12-11 Mosaic Technologies Inc. Method and apparatus for establishing and enhancing the creditworthiness of intellectual property
WO2000075819A2 (en) * 1999-06-03 2000-12-14 Algorithmics International Corp. Risk management system and method providing rule-based evolution of a portfolio of instruments
US6792605B1 (en) 1999-06-10 2004-09-14 Bow Street Software, Inc. Method and apparatus for providing web based services using an XML Runtime model to store state session data
US6654469B1 (en) 1999-06-28 2003-11-25 Lucent Technologies Inc. Methods and devices for reducing sampling noise in analog signals using linear interpolation
US6874146B1 (en) 1999-06-30 2005-03-29 Unisys Corporation Metadata driven system for effecting extensible data interchange based on universal modeling language (UML), meta object facility (MOF) and extensible markup language (XML) standards
AU6118800A (en) 1999-07-23 2001-02-13 Netfolio, Inc. System and method for selecting and purchasing stocks via a global computer network
US6493719B1 (en) 1999-07-26 2002-12-10 Microsoft Corporation Method and system for scripting for system management information
US6959415B1 (en) 1999-07-26 2005-10-25 Microsoft Corporation Methods and apparatus for parsing Extensible Markup Language (XML) data streams
US6665665B1 (en) 1999-07-30 2003-12-16 Verizon Laboratories Inc. Compressed document surrogates
US6353825B1 (en) 1999-07-30 2002-03-05 Verizon Laboratories Inc. Method and device for classification using iterative information retrieval techniques
US6718363B1 (en) 1999-07-30 2004-04-06 Verizon Laboratories, Inc. Page aggregation for web sites
US7187662B1 (en) * 1999-08-11 2007-03-06 Klingman Edwin E Table driven call distribution system for local and remote agents
US6457003B1 (en) 1999-08-16 2002-09-24 International Business Machines Corporation Methods, systems and computer program products for logical access of data sources utilizing standard relational database management systems
US7051019B1 (en) * 1999-08-17 2006-05-23 Corbis Corporation Method and system for obtaining images from a database having images that are relevant to indicated text
US6463461B1 (en) 1999-08-30 2002-10-08 Zaplet, Inc. System for communicating information among a group of participants
US6578015B1 (en) * 1999-08-31 2003-06-10 Oracle International Corporation Methods, devices and systems for electronic bill presentment and payment
US6332163B1 (en) * 1999-09-01 2001-12-18 Accenture, Llp Method for providing communication services over a computer network system
US6738803B1 (en) * 1999-09-03 2004-05-18 Cisco Technology, Inc. Proxy browser providing voice enabled web application audio control for telephony devices
US6556992B1 (en) 1999-09-14 2003-04-29 Patent Ratings, Llc Method and system for rating patents and other intangible assets
US6567786B1 (en) 1999-09-16 2003-05-20 International Business Machines Corporation System and method for increasing the effectiveness of customer contact strategies
US6618727B1 (en) 1999-09-22 2003-09-09 Infoglide Corporation System and method for performing similarity searching
US6895551B1 (en) * 1999-09-23 2005-05-17 International Business Machines Corporation Network quality control system for automatic validation of web pages and notification of author
US6549922B1 (en) * 1999-10-01 2003-04-15 Alok Srivastava System for collecting, transforming and managing media metadata
US6772396B1 (en) 1999-10-07 2004-08-03 Microsoft Corporation Content distribution system for network environments
US7134072B1 (en) 1999-10-13 2006-11-07 Microsoft Corporation Methods and systems for processing XML documents
US6654921B1 (en) * 1999-10-15 2003-11-25 Cisco Technology, Inc. Decoding data from multiple sources
US6308178B1 (en) 1999-10-21 2001-10-23 Darc Corporation System for integrating data among heterogeneous systems
US7249080B1 (en) * 1999-10-25 2007-07-24 Upstream Technologies Llc Investment advice systems and methods
US8250617B2 (en) 1999-10-29 2012-08-21 Opentv, Inc. System and method for providing multi-perspective instant replay
US6968316B1 (en) 1999-11-03 2005-11-22 Sageworks, Inc. Systems, methods and computer program products for producing narrative financial analysis reports
US6675350B1 (en) * 1999-11-04 2004-01-06 International Business Machines Corporation System for collecting and displaying summary information from disparate sources
GB2359918A (en) * 2000-03-01 2001-09-05 Sony Uk Ltd Audio and/or video generation apparatus having a metadata generator
US7822636B1 (en) 1999-11-08 2010-10-26 Aol Advertising, Inc. Optimal internet ad placement
US7249318B1 (en) * 1999-11-08 2007-07-24 Adobe Systems Incorporated Style sheet generation
US7437304B2 (en) 1999-11-22 2008-10-14 International Business Machines Corporation System and method for project preparing a procurement and accounts payable system
US6782394B1 (en) * 1999-11-22 2004-08-24 Oracle International Corporation Representing object metadata in a relational database system
US6418448B1 (en) * 1999-12-06 2002-07-09 Shyam Sundar Sarkar Method and apparatus for processing markup language specifications for data and metadata used inside multiple related internet documents to navigate, query and manipulate information from a plurality of object relational databases over the web
US6826725B1 (en) 1999-12-16 2004-11-30 Microsoft Corporation Techniques for invoking system commands from within a mark-up language document
US6654649B2 (en) 1999-12-22 2003-11-25 Aspen Technology, Inc. Computer method and apparatus for optimized controller in a non-linear process
US7039608B2 (en) 1999-12-30 2006-05-02 Ge Capital Commercial Finance, Inc. Rapid valuation of portfolios of assets such as financial instruments
US7346518B1 (en) 1999-12-30 2008-03-18 At&T Bls Intellectual Property, Inc. System and method for determining the marketability of intellectual property assets
US7031936B2 (en) 1999-12-30 2006-04-18 Ge Capital Commerical Finance, Inc. Methods and systems for automated inferred valuation of credit scoring
US7275078B2 (en) 1999-12-30 2007-09-25 Texas Instruments Incorporated Distributed web CGI architecture
US6810429B1 (en) * 2000-02-03 2004-10-26 Mitsubishi Electric Research Laboratories, Inc. Enterprise integration system
US7356499B1 (en) * 2000-02-09 2008-04-08 Dean Amburn Method and apparatus for automated trading of equity securities using a real time data analysis
US7418417B2 (en) 2000-02-11 2008-08-26 Goldman Sachs & Co. Credit index, a system and method for structuring a credit index, and a system and method for operating a credit index
EP3367268A1 (en) * 2000-02-22 2018-08-29 Nokia Technologies Oy Spatially coding and displaying information
US7428500B1 (en) 2000-03-30 2008-09-23 Amazon. Com, Inc. Automatically identifying similar purchasing opportunities
JP4054507B2 (en) 2000-03-31 2008-02-27 キヤノン株式会社 Voice information processing method and apparatus, and storage medium
US6826521B1 (en) 2000-04-06 2004-11-30 Abb Automation Inc. System and methodology and adaptive, linear model predictive control based on rigorous, nonlinear process model
US7212996B1 (en) * 2000-04-20 2007-05-01 Jpmorgan Chase Bank, N.A. System and method for dynamic, multivariable comparison of financial products
US7451389B2 (en) 2000-06-06 2008-11-11 Microsoft Corporation Method and system for semantically labeling data and providing actions based on semantically labeled data
WO2001097076A2 (en) 2000-06-14 2001-12-20 Parabon Computation, Inc. Apparatus and method for providing sequence database comparison
JP2002149673A (en) 2000-06-14 2002-05-24 Matsushita Electric Ind Co Ltd Device and method for data processing
US7647340B2 (en) 2000-06-28 2010-01-12 Sharp Laboratories Of America, Inc. Metadata in JPEG 2000 file format
US7783500B2 (en) 2000-07-19 2010-08-24 Ijet International, Inc. Personnel risk management system and methods
EP1182599A1 (en) 2000-07-26 2002-02-27 Transmedia Network, Inc. System and method for providing consumer rewards
US7177822B2 (en) * 2000-08-08 2007-02-13 Daimlerchrysler Corporation Common database system for sales and marketing process
US7702522B1 (en) 2000-09-01 2010-04-20 Sholem Steven L Method and apparatus for tracking the relative value of medical services
US7657833B2 (en) 2000-09-15 2010-02-02 Hartford Fire Insurance Company Real-time single entry multiple carrier interface (SEMCI)
US20040193503A1 (en) 2000-10-04 2004-09-30 Eder Jeff Scott Interactive sales performance management system
US6901428B1 (en) 2000-10-11 2005-05-31 Ncr Corporation Accessing data from a database over a network
US7043566B1 (en) 2000-10-11 2006-05-09 Microsoft Corporation Entity event logging
DE60143848D1 (en) 2000-10-15 2011-02-24 Directv Group Inc METHOD AND SYSTEM FOR ADVERTISING DURING A PAUSE
US7188081B1 (en) 2000-10-30 2007-03-06 Microsoft Corporation Electronic shopping basket
US6725446B1 (en) 2000-11-01 2004-04-20 Digital Integrator, Inc. Information distribution method and system
US8515783B1 (en) 2000-11-06 2013-08-20 Swiss Reinsurance Company Ltd. Risk assessment method
US6408477B1 (en) * 2000-11-13 2002-06-25 Fay H. Culbreth Orthodontic toothbrush
US7444660B2 (en) 2000-11-16 2008-10-28 Meevee, Inc. System and method for generating metadata for video programming events
US6970883B2 (en) 2000-12-11 2005-11-29 International Business Machines Corporation Search facility for local and remote interface repositories
US6795089B2 (en) * 2000-12-20 2004-09-21 Microsoft Corporation Dynamic, live surface and model elements for visualization and modeling
US7523047B1 (en) * 2000-12-20 2009-04-21 Demandtec, Inc. Price optimization system
US7495792B2 (en) 2000-12-21 2009-02-24 Xerox Corporation Programmable physical document
US7805680B2 (en) 2001-01-03 2010-09-28 Nokia Corporation Statistical metering and filtering of content via pixel-based metadata
US7774279B2 (en) 2001-05-31 2010-08-10 Contentguard Holdings, Inc. Rights offering and granting
WO2002057917A2 (en) 2001-01-22 2002-07-25 Sun Microsystems, Inc. Peer-to-peer network computing platform
US7389265B2 (en) 2001-01-30 2008-06-17 Goldman Sachs & Co. Systems and methods for automated political risk management
US7536332B2 (en) * 2001-02-02 2009-05-19 Rhee Thomas A Real life implementation of modern portfolio theory (MPT) for financial planning and portfolio management
US20040215551A1 (en) * 2001-11-28 2004-10-28 Eder Jeff S. Value and risk management system for multi-enterprise organization
US7844475B1 (en) 2001-02-06 2010-11-30 Makar Enterprises, Inc. Method for strategic commodity management through mass customization
US7725423B1 (en) 2001-02-08 2010-05-25 Teradata Us, Inc. Analyzing associations in the order of transactions
US8166093B2 (en) 2001-02-08 2012-04-24 Warner Music Group, Inc. Method and apparatus for processing multimedia programs for play on incompatible devices
EP1233333A1 (en) 2001-02-19 2002-08-21 Hewlett-Packard Company Process for executing a downloadable service receiving restrictive access rights to al least one profile file
JP3980488B2 (en) * 2001-02-24 2007-09-26 インターナショナル・ビジネス・マシーンズ・コーポレーション Massively parallel computer system
US7899721B2 (en) 2001-02-27 2011-03-01 Accenture Global Services Gmbh E-commerce system, method and computer program product
US7565411B1 (en) * 2004-10-13 2009-07-21 Palmsource, Inc. Method and apparatus for device and carrier independent location systems for mobile devices
US7653552B2 (en) 2001-03-21 2010-01-26 Qurio Holdings, Inc. Digital file marketplace
US8473568B2 (en) 2001-03-26 2013-06-25 Microsoft Corporation Methods and systems for processing media content
US8533029B2 (en) 2001-04-02 2013-09-10 Invivodata, Inc. Clinical monitoring device with time shifting capability
US7373349B2 (en) 2001-04-18 2008-05-13 International Business Machines Corporation Process for data driven application integration for B2B
US7856420B2 (en) 2001-04-19 2010-12-21 Hewlett-Packard Development Company, L.P. Zero latency enterprise enriched publish/subscribe
WO2002086744A1 (en) 2001-04-23 2002-10-31 Schwegman, Lundberg, Woessner & Kluth, P.A. Methods, systems and emails to link emails to matters and organizations
GB2379288A (en) 2001-05-24 2003-03-05 Virgin Direct Personal Finance Financial management system and method
US7673282B2 (en) * 2001-05-25 2010-03-02 International Business Machines Corporation Enterprise information unification
FR2825783B1 (en) * 2001-06-06 2003-11-07 Snecma Moteurs HANGING OF CMC COMBUSTION CHAMBER OF TURBOMACHINE BY BRAZED LEGS
US7376610B2 (en) 2001-06-14 2008-05-20 International Business Machines Corporation Computerized method and system for score based evaluation of capital market investment decisions and strategies
US7840634B2 (en) 2001-06-26 2010-11-23 Eastman Kodak Company System and method for managing images over a communication network
US7298835B1 (en) 2001-06-26 2007-11-20 At&T Bls Intellectual Property, Inc. Systems and methods for implementing a parental control feature within a telecommunications network
US7698651B2 (en) 2001-06-28 2010-04-13 International Business Machines Corporation Heuristic knowledge portal
US7546629B2 (en) * 2002-03-06 2009-06-09 Check Point Software Technologies, Inc. System and methodology for security policy arbitration
US8560666B2 (en) 2001-07-23 2013-10-15 Hitwise Pty Ltd. Link usage
US20030028267A1 (en) * 2001-08-06 2003-02-06 Hales Michael L. Method and system for controlling setpoints of manipulated variables for process optimization under constraint of process-limiting variables
US7281260B2 (en) 2001-08-07 2007-10-09 Loral Cyberstar, Inc. Streaming media publishing system and method
US7386496B1 (en) 2001-08-15 2008-06-10 Jones Lang Lasalle Ip, Inc. System and method for evaluating real estate financing structures
US6947947B2 (en) 2001-08-17 2005-09-20 Universal Business Matrix Llc Method for adding metadata to data
US7735080B2 (en) 2001-08-30 2010-06-08 International Business Machines Corporation Integrated system and method for the management of a complete end-to-end software delivery process
US7536330B2 (en) * 2001-09-03 2009-05-19 Michihiro Sato Fixed rate financing instrument offering a dividend or partially guaranteed by third party to issuance, method for establishing a market for the same, method for directly public-offering the same on-line
US7950033B2 (en) 2001-10-10 2011-05-24 Opentv, Inc. Utilization of relational metadata in a television system
US20030078830A1 (en) 2001-10-22 2003-04-24 Wagner Todd R. Real-time collaboration and workflow management for a marketing campaign
US7069197B1 (en) * 2001-10-25 2006-06-27 Ncr Corp. Factor analysis/retail data mining segmentation in a data mining system
US8204929B2 (en) 2001-10-25 2012-06-19 International Business Machines Corporation Hiding sensitive information
US7444309B2 (en) 2001-10-31 2008-10-28 Icosystem Corporation Method and system for implementing evolutionary algorithms
US8108249B2 (en) 2001-12-04 2012-01-31 Kimberly-Clark Worldwide, Inc. Business planner
US7395219B2 (en) * 2001-12-08 2008-07-01 Kenneth Ray Strech Insurance on demand transaction management system
US8935297B2 (en) 2001-12-10 2015-01-13 Patrick J. Coyne Method and system for the management of professional services project information
US7506060B2 (en) 2001-12-11 2009-03-17 Hewlett-Packard Development Company, L.P. Technique for reducing network bandwidth for delivery of dynamic and mixed content
US7523065B2 (en) * 2001-12-12 2009-04-21 Asset Trust, Inc. Risk transfer supply chain system
US20050119959A1 (en) * 2001-12-12 2005-06-02 Eder Jeffrey S. Project optimization system
US20030115090A1 (en) * 2001-12-17 2003-06-19 Shahid Mujtaba Method to define an optimal integrated action plan for procurement, manufacturing, and marketing
US7143104B1 (en) 2001-12-21 2006-11-28 Unisys Corporation Converter for XML document type definition to internal XML element mapping tree
US7158967B1 (en) * 2001-12-21 2007-01-02 Unisys Corporation XML output definition table for transferring internal data into XML document
US7634420B2 (en) 2001-12-21 2009-12-15 Efficient Markets Corporation System for appraising life insurance and annuities
US20040215522A1 (en) 2001-12-26 2004-10-28 Eder Jeff Scott Process optimization system
US7870146B2 (en) 2002-01-08 2011-01-11 International Business Machines Corporation Data mapping between API and persistent multidimensional object
US7627521B1 (en) 2002-01-15 2009-12-01 Jpmorgan Chase Bank, N.A. System and method for processing mircotransactions
US7739121B2 (en) 2002-01-29 2010-06-15 One Network Enterprises, Inc. Method and apparatus for providing intelligent and controlled access to supply chain information
US7630932B2 (en) 2002-01-31 2009-12-08 Transunion Interactive, Inc. Loan rate and lending information analysis system
US20040236621A1 (en) 2002-02-07 2004-11-25 Eder Jeff Scott Business context layer
US7324970B2 (en) 2002-02-07 2008-01-29 Wells Fargo Bank, N.A. Home asset management account
US8392244B1 (en) 2002-02-08 2013-03-05 Laurence R. O'Halloran Direct onscreen advertising of pharmaceuticals targeted by patient diagnoses within the confines of a medical records software system
US7930230B2 (en) 2002-02-13 2011-04-19 Sap Ag Methods and systems for risk evaluation
US8001207B2 (en) 2002-02-15 2011-08-16 International Business Machines Corporation Common location-based service adapter interface for location based services
US7451065B2 (en) * 2002-03-11 2008-11-11 International Business Machines Corporation Method for constructing segmentation-based predictive models
US7324968B2 (en) 2002-03-25 2008-01-29 Paid, Inc. Method and system for improved online auction
US8095503B2 (en) 2002-03-29 2012-01-10 Panasas, Inc. Allowing client systems to interpret higher-revision data structures in storage systems
CA2381689A1 (en) * 2002-04-12 2003-10-12 Algorithmics International Corp. System, method and framework for generating scenarios
US7774611B2 (en) 2002-05-06 2010-08-10 Hewlett-Packard Development Company, L.P. Enforcing file authorization access
US8140622B2 (en) 2002-05-23 2012-03-20 International Business Machines Corporation Parallel metadata service in storage area network environment
US7970640B2 (en) * 2002-06-12 2011-06-28 Asset Trust, Inc. Purchasing optimization system
US7974906B2 (en) 2002-06-12 2011-07-05 Itg Software Solutions, Inc. System and method for estimating and optimizing transaction costs
CA2391717A1 (en) 2002-06-26 2003-12-26 Ibm Canada Limited-Ibm Canada Limitee Transferring data and storing metadata across a network
US7240109B2 (en) * 2002-06-27 2007-07-03 Sun Microsystems, Inc. Remote services system service module interface
US7769750B2 (en) 2002-07-22 2010-08-03 Microsoft Corporation Metadata based hypermedia management system
EP2322092B1 (en) 2002-08-13 2015-11-25 University Of Virginia Patent Foundation Method, system, and computer program product for processing of self-monitoring blood glucose (smbg) data to enhance diabetic self-management
US7822633B2 (en) 2002-11-15 2010-10-26 Accenture Global Services Limited Public sector value model
US7401057B2 (en) 2002-12-10 2008-07-15 Asset Trust, Inc. Entity centric computer system
US7865450B2 (en) 2003-01-16 2011-01-04 JurInnov Ltd. System and method facilitating management of law related service(s)
US7584114B2 (en) 2003-01-22 2009-09-01 International Business Machines Corporation System and method for integrating projects events with personal calendar and scheduling clients
US7555595B2 (en) * 2003-01-24 2009-06-30 Xyratex Technology Limited Methods and apparatus for writing servo frames to and/or verifying data areas of a storage medium
US8311865B2 (en) 2003-02-14 2012-11-13 Hewlett-Packard Development Company, L.P. Generating a resource allocation action plan
US7337137B2 (en) * 2003-02-20 2008-02-26 Itg, Inc. Investment portfolio optimization system, method and computer program product
US7346585B1 (en) * 2003-02-28 2008-03-18 Microsoft Corporation Computer software and services license processing method and system
US9342657B2 (en) 2003-03-24 2016-05-17 Nien-Chih Wei Methods for predicting an individual's clinical treatment outcome from sampling a group of patient's biological profiles
US8417322B2 (en) 2003-07-01 2013-04-09 Regents Of The University Of Michigan Method and apparatus for diagnosing bone tissue conditions
US7146353B2 (en) 2003-07-22 2006-12-05 Hewlett-Packard Development Company, L.P. Resource allocation for multiple applications
US8560379B2 (en) 2003-08-07 2013-10-15 International Business Machines Corporation Estimating the cost of ownership of a software product through the generation of a cost of software failure factor based upon a standard quality level of a proposed supplier of the software product
US8175908B1 (en) * 2003-09-04 2012-05-08 Jpmorgan Chase Bank, N.A. Systems and methods for constructing and utilizing a merchant database derived from customer purchase transactions data
US8554611B2 (en) 2003-09-11 2013-10-08 Catalina Marketing Corporation Method and system for electronic delivery of incentive information based on user proximity
US20060004631A1 (en) 2003-09-11 2006-01-05 Roberts Gregory B Method and system for generating real-time directions associated with product promotions
US7664795B2 (en) 2003-09-26 2010-02-16 Microsoft Corporation Apparatus and method for database migration
ATE360161T1 (en) * 2003-10-13 2007-05-15 Varibox Pty Ltd CONTINUOUSLY VARIABLE TRANSMISSION
US7778915B2 (en) 2003-10-14 2010-08-17 Ften, Inc. Financial data processing system
US7346485B2 (en) * 2003-11-11 2008-03-18 The Boeing Company Modeling an event using linked component modules provided in a spreadsheet environment
US7530490B1 (en) 2003-11-12 2009-05-12 Goldman Sachs & Co Systems and methods to perform credit valuation adjustment analyses
US8458073B2 (en) 2003-12-02 2013-06-04 Dun & Bradstreet, Inc. Enterprise risk assessment manager system
US7552961B2 (en) * 2003-12-02 2009-06-30 Danny John Eglinton Sheeting system for open-topped containers
US7283982B2 (en) * 2003-12-05 2007-10-16 International Business Machines Corporation Method and structure for transform regression
US7657475B1 (en) 2003-12-31 2010-02-02 Fannie Mae Property investment rating system and method
US7827557B2 (en) 2004-03-24 2010-11-02 Hewlett-Packard Development Company, L.P. Method and apparatus for allocating resources to applications using a linearized objective function
US7557941B2 (en) * 2004-05-27 2009-07-07 Silverbrook Research Pty Ltd Use of variant and base keys with three or more entities
US7747508B1 (en) 2004-06-07 2010-06-29 Goldman Sachs & Co. System and method for algorithmic trading strategies
GB2415268A (en) 2004-06-15 2005-12-21 Hewlett Packard Development Co Apparatus and method for process monitoring
US8301288B2 (en) 2004-06-16 2012-10-30 International Business Machines Corporation Optimized scheduling based on sensitivity data
US7366933B1 (en) 2004-07-09 2008-04-29 American Power Conversion Corporation Power event analysis
US7490356B2 (en) * 2004-07-20 2009-02-10 Reflectent Software, Inc. End user risk management
US7711623B2 (en) 2004-08-20 2010-05-04 Consulting Services Support Corporation Decision assistance platform configured for facilitating financial consulting services
US8160956B2 (en) 2004-08-31 2012-04-17 Thomas Franklin Comstock Insurance system and method for a high-risk asset purchaser or lessee
US8737699B2 (en) 2004-09-02 2014-05-27 Siemens Medical Solutions Usa, Inc. Combinational computer aided diagnosis
US8903919B2 (en) 2004-09-14 2014-12-02 International Business Machines Corporation Dynamic integration of application input and output in an instant messaging/chat session
US7224761B2 (en) 2004-11-19 2007-05-29 Westinghouse Electric Co. Llc Method and algorithm for searching and optimizing nuclear reactor core loading patterns
WO2006060481A2 (en) 2004-11-30 2006-06-08 Michael Dell Orfano System and method for creating electronic real estate registration
US7542938B1 (en) 2004-12-28 2009-06-02 Trading Technologies International, Inc. System and method for quick quote configuration
US7278163B2 (en) 2005-02-22 2007-10-02 Mcafee, Inc. Security risk analysis system and method
US8326659B2 (en) 2005-04-12 2012-12-04 Blackboard Inc. Method and system for assessment within a multi-level organization
CN100580670C (en) 2005-06-03 2010-01-13 国际商业机器公司 Method and computer system for content recovery due to user triggering
US8930254B2 (en) 2005-06-13 2015-01-06 CommEq Asset Management Ltd. Financial methodology to valuate and predict the news impact of major events on financial instruments
US7519588B2 (en) * 2005-06-20 2009-04-14 Efficient Frontier Keyword characterization and application
US7734488B2 (en) 2005-08-02 2010-06-08 The United States Of America As Represented By The Secretary Of The Army Functionality index (FI) for use with an engineering management system (EMS)
US7698188B2 (en) * 2005-11-03 2010-04-13 Beta-Rubicon Technologies, Llc Electronic enterprise capital marketplace and monitoring apparatus and method
US7552688B2 (en) * 2006-02-23 2009-06-30 Lundell John H Method and apparatus for converting animal waste into bedding or soil amendment
US7593878B2 (en) 2006-05-18 2009-09-22 Standard & Poor's Financial Services Llc Method of constructing an investment portfolio and computing an index thereof
US7747494B1 (en) * 2006-05-24 2010-06-29 Pravin Kothari Non-determinative risk simulation
US7752125B1 (en) 2006-05-24 2010-07-06 Pravin Kothari Automated enterprise risk assessment
US8082170B2 (en) 2006-06-01 2011-12-20 Teradata Us, Inc. Opportunity matrix for use with methods and systems for determining optimal pricing of retail products
US7720809B2 (en) * 2006-06-06 2010-05-18 Microsoft Corporation Application integration using XML
US7853577B2 (en) 2006-06-09 2010-12-14 Ebay Inc. Shopping context engine
US7556486B1 (en) * 2006-06-24 2009-07-07 Ronald James Zito Repair apparatus
US7895110B1 (en) 2006-07-21 2011-02-22 Thomas Edward Bleier Census investing and indices
US8392240B2 (en) * 2006-09-01 2013-03-05 Oracle Financial Services Software Limited System and method for determining outsourcing suitability of a business process in an enterprise
US7940899B2 (en) * 2006-10-06 2011-05-10 Pricewaterhousecoopers Llp Fraud detection, risk analysis and compliance assessment
US20080247629A1 (en) 2006-10-10 2008-10-09 Gilder Clark S Systems and methods for check 21 image replacement document enhancements
US9147171B2 (en) 2006-10-20 2015-09-29 Oracle International Corporation Planning a response to an unplanned event
US7991639B2 (en) 2006-12-22 2011-08-02 International Business Machines Corporation Determining readiness of an organization to utilize an information technology asset
US8554669B2 (en) 2007-01-09 2013-10-08 Bill Me Later, Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of sale
US9031874B2 (en) 2007-01-12 2015-05-12 Clean Power Finance, Inc. Methods, systems and agreements for increasing the likelihood of repayments under a financing agreement for renewable energy equipment
US8214248B1 (en) 2007-01-29 2012-07-03 Fluid Innovation Group, Inc. System and method for assessing viability and marketability of assets
US8290800B2 (en) 2007-01-30 2012-10-16 Google Inc. Probabilistic inference of site demographics from aggregate user internet usage and source demographic information
US8321249B2 (en) 2007-01-30 2012-11-27 Google Inc. Determining a demographic attribute value of an online document visited by users
US8108258B1 (en) 2007-01-31 2012-01-31 Intuit Inc. Method and apparatus for return processing in a network-based system
US8831972B2 (en) 2007-04-03 2014-09-09 International Business Machines Corporation Generating a customer risk assessment using dynamic customer data
US8108287B2 (en) 2007-04-09 2012-01-31 Goldman Sachs & Co. Fuel offering and purchase management system
US8566206B2 (en) * 2007-05-10 2013-10-22 Pensions First Analytics Limited Pension fund systems
US8090635B1 (en) 2007-05-19 2012-01-03 Igor Roitburg Mortgage payment insurance method and system
US8000986B2 (en) 2007-06-04 2011-08-16 Computer Sciences Corporation Claims processing hierarchy for designee
US8010391B2 (en) 2007-06-29 2011-08-30 Computer Sciences Corporation Claims processing hierarchy for insured
US8010389B2 (en) 2007-06-04 2011-08-30 Computer Sciences Corporation Multiple policy claims processing
US8010390B2 (en) 2007-06-04 2011-08-30 Computer Sciences Corporation Claims processing of information requirements
US8326746B1 (en) 2007-06-26 2012-12-04 Fannie Mae System and method for evaluating idiosyncratic risk for cash flow variability
US8150886B2 (en) 2007-08-29 2012-04-03 Microsoft Corporation Multiple database entity model generation using entity models
US8566128B2 (en) * 2007-10-24 2013-10-22 Joseph D. Koziol Insurance transaction system and method
US9817832B1 (en) 2007-10-31 2017-11-14 EMC IP Holding Company LLC Unified framework for policy-based metadata-driven storage services
US8326897B2 (en) 2007-12-19 2012-12-04 International Business Machines Corporation Apparatus and method for managing data storage
US7849004B2 (en) * 2008-02-29 2010-12-07 American Express Travel Related Services Company, Inc. Total structural risk model
US8095396B1 (en) 2008-03-27 2012-01-10 Asterisk Financial Group, Inc. Computer system for underwriting a personal guaranty liability by utilizing a risk apportionment system
US8156030B2 (en) 2008-04-03 2012-04-10 Gravity Investments Llc Diversification measurement and analysis system
US8639606B1 (en) 2008-04-14 2014-01-28 Barclays Capital Inc. Methods and systems for providing interest rate indices and notes
US8275644B2 (en) * 2008-04-16 2012-09-25 International Business Machines Corporation Generating an optimized analytical business transformation
US8676683B1 (en) 2008-05-29 2014-03-18 Bank Of America Corporation Business transaction facilitation system
US8321438B1 (en) 2008-06-18 2012-11-27 Bank Of America Corporation Integration layer for a data repository
FR2933396B1 (en) * 2008-07-02 2011-07-22 Air Liquide PROCESS FOR MANUFACTURING A TRAPPING STRUCTURE WITH CONTROL OF THE DRYING STEP
US8650108B1 (en) * 2008-07-29 2014-02-11 Bank Of America Corporation User interface for investment decisioning process model
US8055559B2 (en) 2008-08-01 2011-11-08 Hantz Group, Inc. Multi-company business accounting system and method for same including account receivable
US7890403B1 (en) 2008-08-15 2011-02-15 United Services Automobile Association (Usaa) Systems and methods for implementing real estate future market value insurance
US8204779B1 (en) * 2008-08-20 2012-06-19 Accenture Global Services Limited Revenue asset high performance capability assessment
US9100418B2 (en) 2008-08-21 2015-08-04 GM Global Technology Operations LLC Adaptive data verification for resource-constrained systems
US8266096B2 (en) 2008-10-24 2012-09-11 Bmc Software, Inc. Vendor portfolio management in support of vendor relationship management analysis, planning and evaluation
US8311882B2 (en) 2008-10-30 2012-11-13 Yahoo! Inc. System and method for forecasting an inventory of online advertisement impressions for targeting impression attributes
US8560359B2 (en) * 2008-10-31 2013-10-15 Hewlett-Packard Development Company, L.P. System and methods for modeling consequences of events
US8224692B2 (en) 2008-10-31 2012-07-17 Yahoo! Inc. System and method for pricing of overlapping impression pools of online advertisement impressions for advertising demand
US9147177B2 (en) 2008-11-07 2015-09-29 Oracle International Corporation Method and system for implementing a scoring mechanism
WO2010054349A2 (en) 2008-11-10 2010-05-14 Google Inc. Method and system for clustering data points
US8316347B2 (en) 2008-12-05 2012-11-20 International Business Machines Corporation Architecture view generation method and system
US8521566B2 (en) 2008-12-29 2013-08-27 Mukesh Chatter Systems and methods for determining optimal pricing and risk control monitoring of auctioned assets including the automatic computation of bid prices for credit default swaps and the like
US8589203B1 (en) 2009-01-05 2013-11-19 Sprint Communications Company L.P. Project pipeline risk management system and methods for updating project resource distributions based on risk exposure level changes
US8244618B1 (en) 2009-01-08 2012-08-14 Amherst Holdings, LLC Loan information analysis system and method
CN102282562B (en) 2009-01-13 2015-09-23 埃克森美孚上游研究公司 Optimizing well operating plans
US9576272B2 (en) 2009-02-10 2017-02-21 Kofax, Inc. Systems, methods and computer program products for determining document validity
US8892409B2 (en) 2009-02-11 2014-11-18 Johnathan Mun Project economics analysis tool
US8566219B2 (en) * 2009-03-24 2013-10-22 Trading Technologeis International, Inc. System and method for a risk check
US9037541B2 (en) 2009-04-30 2015-05-19 Microsoft Technology Licensing, Llc Metadata for data storage array
US8819442B1 (en) 2009-06-08 2014-08-26 Bank Of America Corporation Assessing risk associated with a computer technology
US8442908B2 (en) 2009-06-12 2013-05-14 MCMCAP Partners, LLC Systems and methods for asset valuation
US8645438B2 (en) 2009-06-30 2014-02-04 Sandisk Technologies Inc. File system and method of file access
US9147206B2 (en) 2009-08-31 2015-09-29 Accenture Global Services Limited Model optimization system using variable scoring
US8725554B2 (en) 2009-09-15 2014-05-13 Ntt Docomo, Inc. Household member number distribution estimation apparatus and household member number distribution estimation method
US9015723B2 (en) 2009-09-23 2015-04-21 International Business Machines Corporation Resource optimization for real-time task assignment in multi-process environments
US9235605B2 (en) 2009-10-14 2016-01-12 Trice Imaging, Inc. Systems and methods for converting and delivering medical images to mobile devices and remote communications systems
US8510197B2 (en) 2009-10-30 2013-08-13 Sap Ag Financial instrument position and subposition management
US8924242B2 (en) 2009-11-02 2014-12-30 Mac's Snow Removal, Inc. Weather risk management system
US8290965B2 (en) 2009-12-08 2012-10-16 Decernis, Llc Apparatus and method for the automatic discovery of control events from the publication of documents
US8510147B2 (en) 2009-12-09 2013-08-13 Infosys Limited System and method for calculating a comprehensive pipeline integrity business risk score
GB201000091D0 (en) 2010-01-05 2010-02-17 Mura Michael E Numerical Modelling Apparatus for Pricing,Trading and Risk Assessment
US8346665B2 (en) 2010-04-13 2013-01-01 Enservio, Inc. Dual-activation financial products
US9824108B2 (en) 2010-04-19 2017-11-21 Salesforce.Com, Inc. Methods and systems for performing transparent object migration across storage tiers
US8374899B1 (en) * 2010-04-21 2013-02-12 The Pnc Financial Services Group, Inc. Assessment construction tool
US9792298B1 (en) 2010-05-03 2017-10-17 Panzura, Inc. Managing metadata and data storage for a cloud controller in a distributed filesystem
US8473431B1 (en) * 2010-05-14 2013-06-25 Google Inc. Predictive analytic modeling platform
US8666768B2 (en) 2010-07-27 2014-03-04 At&T Intellectual Property I, L. P. Methods, systems, and products for measuring health
US8306849B2 (en) * 2010-09-16 2012-11-06 International Business Machines Corporation Predicting success of a proposed project
CA2744436A1 (en) 2010-10-15 2012-04-15 International Business Machines Corporation Optimizing business process management models
US8566222B2 (en) * 2010-12-20 2013-10-22 Risconsulting Group Llc, The Platform for valuation of financial instruments
US8818932B2 (en) 2011-02-14 2014-08-26 Decisive Analytics Corporation Method and apparatus for creating a predictive model
US9497184B2 (en) 2011-03-28 2016-11-15 International Business Machines Corporation User impersonation/delegation in a token-based authentication system
US8676742B2 (en) 2011-03-29 2014-03-18 Manyworlds, Inc. Contextual scope-based discovery systems
US8150777B1 (en) 2011-05-25 2012-04-03 BTPatent, LLC Method and system for automatic scoring of the intellectual properties
US9171294B2 (en) 2011-06-02 2015-10-27 Iii Holdings 1, Llc Methods and systems for providing mobile customer support
US8606695B1 (en) 2011-07-01 2013-12-10 Biz2credit Inc. Decision making engine and business analysis tools for small business credit product offerings
US8612332B1 (en) 2011-08-19 2013-12-17 Teucrium Trading, LLC Valuing futures contracts
US8626558B2 (en) * 2011-09-07 2014-01-07 Dow Corning Corporation Supply chain risk management method and device
US8886591B2 (en) 2011-09-09 2014-11-11 Oracle International Corporation Adaptive data model and warehouse palette
WO2013039911A1 (en) 2011-09-12 2013-03-21 Oktem Ulku Dynamic prediction of risk levels for manufacturing operations through leading risk indicators
US9147159B2 (en) 2011-12-30 2015-09-29 Certona Corporation Extracting predictive segments from sampled data
US8595845B2 (en) 2012-01-19 2013-11-26 Mcafee, Inc. Calculating quantitative asset risk
US8981905B2 (en) 2012-03-30 2015-03-17 A2B Tracking Solutions, Inc Secure asset tracking system
US9508083B2 (en) 2012-07-02 2016-11-29 Oracle International Corporation Extensibility for sales predictor (SPE)
US9779035B1 (en) 2012-08-08 2017-10-03 Amazon Technologies, Inc. Log-based data storage on sequentially written media
KR20140028454A (en) 2012-08-29 2014-03-10 삼성전자주식회사 Method and system for storing data of portable terminal
US9286284B2 (en) 2012-10-15 2016-03-15 International Business Machines Corporation Data filtering based on a cell entry
US9171092B2 (en) 2012-12-07 2015-10-27 Empire Technology Development Llc Personal assistant context building
US9898734B2 (en) 2012-12-19 2018-02-20 Deutsche Telekom Ag Method and system for terminal device-based communication between third-party applications and an electronic wallet
US9804930B2 (en) 2013-01-11 2017-10-31 Commvault Systems, Inc. Partial file restore in a data storage system
US9766987B2 (en) 2013-01-11 2017-09-19 Commvault Systems, Inc. Table level database restore in a data storage system
US10223327B2 (en) 2013-03-14 2019-03-05 Fisher-Rosemount Systems, Inc. Collecting and delivering data to a big data machine in a process control system
US9076182B2 (en) 2013-03-11 2015-07-07 Yodlee, Inc. Automated financial data aggregation
WO2014194337A1 (en) 2013-05-30 2014-12-04 Atlas Wearables, Inc. Portable computing device and analyses of personal data captured therefrom
US9665843B2 (en) 2013-06-03 2017-05-30 Abb Schweiz Ag Industrial asset health profile
US9195703B1 (en) 2013-06-27 2015-11-24 Google Inc. Providing context-relevant information to users
US9779187B1 (en) 2013-08-26 2017-10-03 Fair Isaac Corporation Automatic modeling farmer
US9645575B2 (en) 2013-11-27 2017-05-09 Adept Ai Systems Inc. Method and apparatus for artificially intelligent model-based control of dynamic processes using probabilistic agents
US9870569B2 (en) 2013-12-13 2018-01-16 Sap Se Flexible energy use offers
US9648100B2 (en) 2014-03-05 2017-05-09 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US10162843B1 (en) 2014-05-05 2018-12-25 EMC IP Holding Company LLC Distributed metadata management
US10491568B1 (en) 2014-05-21 2019-11-26 Amazon Technologies, Inc. Management of encrypted data storage
US9489630B2 (en) 2014-05-23 2016-11-08 DataRobot, Inc. Systems and techniques for predictive data analytics
US9939865B2 (en) 2014-06-13 2018-04-10 Seagate Technology Llc Selective storage resource powering for data transfer management
WO2015199574A1 (en) 2014-06-27 2015-12-30 Emc Corporation Techniques for automatically freeing space in a log-structured storage system
US9811546B1 (en) 2014-06-30 2017-11-07 EMC IP Holding Company LLC Storing data and metadata in respective virtual shards on sharded storage systems
US8966640B1 (en) 2014-07-25 2015-02-24 Fmr Llc Security risk aggregation and analysis
US9697469B2 (en) 2014-08-13 2017-07-04 Andrew McMahon Method and system for generating and aggregating models based on disparate data from insurance, financial services, and public industries
US9691104B2 (en) 2014-09-19 2017-06-27 Mastercard International Incorporated System and method for providing revenue protection based on weather derivatives and merchant transaction data
US9866634B1 (en) 2014-09-26 2018-01-09 Western Digital Technologies, Inc. Managing and accessing data storage systems
US10026051B2 (en) 2014-09-29 2018-07-17 Hartford Fire Insurance Company System for accessing business metadata within a distributed network
US9875031B2 (en) 2015-09-30 2018-01-23 Western Digital Technologies, Inc. Data retention management for data storage device
US9864753B1 (en) 2016-03-30 2018-01-09 EMC IP Holding Company LLC Data storage system with adaptive file system over-provisioning
US10031675B1 (en) 2016-03-31 2018-07-24 Emc Corporation Method and system for tiering data
US10043318B2 (en) 2016-12-09 2018-08-07 Qualcomm Incorporated Display synchronized image warping

Patent Citations (102)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US16758A (en) * 1857-03-03 Machine fob husking corn
US23034A (en) * 1859-02-22 Xfiee-plug
US52820A (en) * 1866-02-27 Improved railway-brake
US3749892A (en) * 1971-02-16 1973-07-31 Qeleg Ltd Accountancy system
US3933305A (en) * 1974-08-23 1976-01-20 John Michael Murphy Asset value calculators
US4414629A (en) * 1979-04-02 1983-11-08 Waite John H Method and apparatus for making correlations and predictions using a finite field of data of unorganized and/or partially structured elements
US4839304A (en) * 1986-12-18 1989-06-13 Nec Corporation Method of making a field effect transistor with overlay gate structure
US5193055A (en) * 1987-03-03 1993-03-09 Brown Gordon T Accounting system
US5644727A (en) * 1987-04-15 1997-07-01 Proprietary Financial Products, Inc. System for the operation and management of one or more financial accounts through the use of a digital communication and computation system for exchange, investment and borrowing
US4989141A (en) * 1987-06-01 1991-01-29 Corporate Class Software Computer system for financial analyses and reporting
US5668951A (en) * 1988-04-22 1997-09-16 Digital Equipment Corporation Avoiding congestion system for reducing traffic load on selected end systems which utilizing above their allocated fair shares to optimize throughput at intermediate node
US5128861A (en) * 1988-12-07 1992-07-07 Hitachi, Ltd. Inventory control method and system
US5237946A (en) * 1989-01-23 1993-08-24 Copson Alex G Apparatus and method for transferring material to subaqueous levels
US5311421A (en) * 1989-12-08 1994-05-10 Hitachi, Ltd. Process control method and system for performing control of a controlled system by use of a neural network
US5191522A (en) * 1990-01-18 1993-03-02 Itt Corporation Integrated group insurance information processing and reporting system based upon an enterprise-wide data structure
US5237495A (en) * 1990-05-23 1993-08-17 Fujitsu Limited Production/purchase management processing system and method
US5224034A (en) * 1990-12-21 1993-06-29 Bell Communications Research, Inc. Automated system for generating procurement lists
US5406477A (en) * 1991-08-30 1995-04-11 Digital Equipment Corporation Multiple reasoning and result reconciliation for enterprise analysis
US5317504A (en) * 1991-10-23 1994-05-31 T.A.S. & Trading Co., Ltd. Computer implemented process for executing accounting theory systems
US5414621A (en) * 1992-03-06 1995-05-09 Hough; John R. System and method for computing a comparative value of real estate
US5638492A (en) * 1992-09-08 1997-06-10 Hitachi, Ltd. Information processing apparatus and monitoring apparatus
US6073115A (en) * 1992-09-30 2000-06-06 Marshall; Paul Steven Virtual reality generator for displaying abstract information
US5361201A (en) * 1992-10-19 1994-11-01 Hnc, Inc. Real estate appraisal using predictive modeling
US5802501A (en) * 1992-10-28 1998-09-01 Graff/Ross Holdings System and methods for computing to support decomposing property into separately valued components
US6112188A (en) * 1992-10-30 2000-08-29 Hartnett; William J. Privatization marketplace
US6064971A (en) * 1992-10-30 2000-05-16 Hartnett; William J. Adaptive knowledge base
US5649181A (en) * 1993-04-16 1997-07-15 Sybase, Inc. Method and apparatus for indexing database columns with bit vectors
US5812988A (en) * 1993-12-06 1998-09-22 Investments Analytic, Inc. Method and system for jointly estimating cash flows, simulated returns, risk measures and present values for a plurality of assets
US6092056A (en) * 1994-04-06 2000-07-18 Morgan Stanley Dean Witter Data processing system and method for financial debt instruments
US5761442A (en) * 1994-08-31 1998-06-02 Advanced Investment Technology, Inc. Predictive neural network means and method for selecting a portfolio of securities wherein each network has been trained using data relating to a corresponding security
US5742775A (en) * 1995-01-18 1998-04-21 King; Douglas L. Method and apparatus of creating financial instrument and administering an adjustable rate loan system
US6416448B1 (en) * 1995-03-20 2002-07-09 Andreas Hassler Therapy and training device
US5950182A (en) * 1995-05-25 1999-09-07 Pavilion Technologies, Inc. Method and apparatus for automatically constructing a data flow architecture
US5768475A (en) * 1995-05-25 1998-06-16 Pavilion Technologies, Inc. Method and apparatus for automatically constructing a data flow architecture
US5887120A (en) * 1995-05-31 1999-03-23 Oracle Corporation Method and apparatus for determining theme for discourse
US5809282A (en) * 1995-06-07 1998-09-15 Grc International, Inc. Automated network simulation and optimization system
US6026388A (en) * 1995-08-16 2000-02-15 Textwise, Llc User interface and other enhancements for natural language information retrieval system and method
US5737581A (en) * 1995-08-30 1998-04-07 Keane; John A. Quality system implementation simulator
US5889823A (en) * 1995-12-13 1999-03-30 Lucent Technologies Inc. Method and apparatus for compensation of linear or nonlinear intersymbol interference and noise correlation in magnetic recording channels
US6207936B1 (en) * 1996-01-31 2001-03-27 Asm America, Inc. Model-based predictive control of thermal processing
US5875431A (en) * 1996-03-15 1999-02-23 Heckman; Frank Legal strategic analysis planning and evaluation control system and method
US6189011B1 (en) * 1996-03-19 2001-02-13 Siebel Systems, Inc. Method of maintaining a network of partially replicated database system
US5774873A (en) * 1996-03-29 1998-06-30 Adt Automotive, Inc. Electronic on-line motor vehicle auction and information system
US5812404A (en) * 1996-04-18 1998-09-22 Valmet Corporation Method for overall regulation of the headbox of a paper machine or equivalent
US5933345A (en) * 1996-05-06 1999-08-03 Pavilion Technologies, Inc. Method and apparatus for dynamic and steady state modeling over a desired path between two end points
US6278899B1 (en) * 1996-05-06 2001-08-21 Pavilion Technologies, Inc. Method for on-line optimization of a plant
US5706495A (en) * 1996-05-07 1998-01-06 International Business Machines Corporation Encoded-vector indices for decision support and warehousing
US5938594A (en) * 1996-05-14 1999-08-17 Massachusetts Institute Of Technology Method and apparatus for detecting nonlinearity and chaos in a dynamical system
US6909708B1 (en) * 1996-11-18 2005-06-21 Mci Communications Corporation System, method and article of manufacture for a communication system architecture including video conferencing
US20010009590A1 (en) * 1997-03-24 2001-07-26 Holm Jack M. Pictorial digital image processing incorporating image and output device modifications
US6078901A (en) * 1997-04-03 2000-06-20 Ching; Hugh Quantitative supply and demand model based on infinite spreadsheet
US6278981B1 (en) * 1997-05-29 2001-08-21 Algorithmics International Corporation Computer-implemented method and apparatus for portfolio compression
US6173276B1 (en) * 1997-08-21 2001-01-09 Scicomp, Inc. System and method for financial instrument modeling and valuation
US6772136B2 (en) * 1997-08-21 2004-08-03 Elaine Kant System and method for financial instrument modeling and using Monte Carlo simulation
US6064972A (en) * 1997-09-17 2000-05-16 At&T Corp Risk management technique for network access
US5774761A (en) * 1997-10-14 1998-06-30 Xerox Corporation Machine set up procedure using multivariate modeling and multiobjective optimization
US6282531B1 (en) * 1998-06-12 2001-08-28 Cognimed, Llc System for managing applied knowledge and workflow in multiple dimensions and contexts
US6347306B1 (en) * 1998-07-21 2002-02-12 Cybershift.Com, Inc. Method and system for direct payroll processing
US6266645B1 (en) * 1998-09-01 2001-07-24 Imetrikus, Inc. Risk adjustment tools for analyzing patient electronic discharge records
US6366934B1 (en) * 1998-10-08 2002-04-02 International Business Machines Corporation Method and apparatus for querying structured documents using a database extender
US6249768B1 (en) * 1998-10-29 2001-06-19 International Business Machines Corporation Strategic capability networks
US6546381B1 (en) * 1998-11-02 2003-04-08 International Business Machines Corporation Query optimization system and method
US6700923B1 (en) * 1999-01-04 2004-03-02 Board Of Regents The University Of Texas System Adaptive multiple access interference suppression
US6219649B1 (en) * 1999-01-21 2001-04-17 Joel Jameson Methods and apparatus for allocating resources in the presence of uncertainty
US6584507B1 (en) * 1999-03-02 2003-06-24 Cisco Technology, Inc. Linking external applications to a network management system
US6321212B1 (en) * 1999-07-21 2001-11-20 Longitude, Inc. Financial products having a demand-based, adjustable return, and trading exchange therefor
US6209124B1 (en) * 1999-08-30 2001-03-27 Touchnet Information Systems, Inc. Method of markup language accessing of host systems and data using a constructed intermediary
US7756770B2 (en) * 1999-11-26 2010-07-13 Research In Motion Limited System and method for trading off upside and downside values of a portfolio
US6934931B2 (en) * 2000-04-05 2005-08-23 Pavilion Technologies, Inc. System and method for enterprise modeling, optimization and control
US7006939B2 (en) * 2000-04-19 2006-02-28 Georgia Tech Research Corporation Method and apparatus for low cost signature testing for analog and RF circuits
US8185486B2 (en) * 2000-10-17 2012-05-22 Asset Trust, Inc. Segmented predictive model system
US6885975B2 (en) * 2000-11-14 2005-04-26 Rajagopalan Srinivasan Method and apparatus for managing process transitions
US20020097245A1 (en) * 2000-12-27 2002-07-25 Il-Kwon Jeong Sensor fusion apparatus and method for optical and magnetic motion capture systems
US7047169B2 (en) * 2001-01-18 2006-05-16 The Board Of Trustees Of The University Of Illinois Method for optimizing a solution set
US6732095B1 (en) * 2001-04-13 2004-05-04 Siebel Systems, Inc. Method and apparatus for mapping between XML and relational representations
US7716333B2 (en) * 2001-11-27 2010-05-11 Accenture Global Services Gmbh Service control architecture
US7778856B2 (en) * 2001-12-05 2010-08-17 Algorithmics International Corp. System and method for measuring and managing operational risk
US7080207B2 (en) * 2002-04-30 2006-07-18 Lsi Logic Corporation Data storage apparatus, system and method including a cache descriptor having a field defining data in a cache block
US7747339B2 (en) * 2002-10-03 2010-06-29 Hewlett-Packard Development Company, L.P. Managing procurement risk
US7716108B2 (en) * 2003-05-08 2010-05-11 International Business Machines Corporation Software application portfolio management for a client
US8108920B2 (en) * 2003-05-12 2012-01-31 Microsoft Corporation Passive client single sign-on for web applications
US8010387B2 (en) * 2003-06-04 2011-08-30 California Institute Of Technology Method, computer program product, and system for risk management
US7899723B2 (en) * 2003-07-01 2011-03-01 Accenture Global Services Gmbh Shareholder value tool
US7912769B2 (en) * 2003-07-01 2011-03-22 Accenture Global Services Limited Shareholder value tool
US7725374B2 (en) * 2003-10-10 2010-05-25 Julian Van Erlach Asset analysis according to the required yield method
US7219100B2 (en) * 2003-12-05 2007-05-15 Edgenet, Inc. Method and apparatus for database induction for creating frame based knowledge tree
US7542932B2 (en) * 2004-02-20 2009-06-02 General Electric Company Systems and methods for multi-objective portfolio optimization
US7778910B2 (en) * 2004-03-02 2010-08-17 Accenture Global Services Gmbh Future value drivers
US7743006B2 (en) * 2004-07-07 2010-06-22 Exxonmobil Upstream Research Co. Bayesian network triads for geologic and geophysical applications
US7672889B2 (en) * 2004-07-15 2010-03-02 Brooks Kent F System and method for providing customizable investment tools
US7702615B1 (en) * 2005-11-04 2010-04-20 M-Factor, Inc. Creation and aggregation of predicted data
US7561158B2 (en) * 2006-01-11 2009-07-14 International Business Machines Corporation Method and apparatus for presenting feature importance in predictive modeling
US7788195B1 (en) * 2006-03-24 2010-08-31 Sas Institute Inc. Computer-implemented predictive model generation systems and methods
US7769684B2 (en) * 2006-05-19 2010-08-03 Accenture Global Services Gmbh Semi-quantitative risk analysis
US7720782B2 (en) * 2006-12-22 2010-05-18 American Express Travel Related Services Company, Inc. Automated predictive modeling of business future events based on historical data
US7558803B1 (en) * 2007-02-01 2009-07-07 Sas Institute Inc. Computer-implemented systems and methods for bottom-up induction of decision trees
US8230477B2 (en) * 2007-02-21 2012-07-24 International Business Machines Corporation System and method for the automatic evaluation of existing security policies and automatic creation of new security policies
US8141155B2 (en) * 2007-03-16 2012-03-20 Prevari Predictive assessment of network risks
US7921061B2 (en) * 2007-09-05 2011-04-05 Oracle International Corporation System and method for simultaneous price optimization and asset allocation to maximize manufacturing profits
US8386401B2 (en) * 2008-09-10 2013-02-26 Digital Infuzion, Inc. Machine learning methods and systems for identifying patterns in data using a plurality of learning machines wherein the learning machine that optimizes a performance function is selected
US8255346B2 (en) * 2009-11-11 2012-08-28 International Business Machines Corporation Methods and systems for variable group selection and temporal causal modeling
US8401950B2 (en) * 2010-01-25 2013-03-19 Fair Isaac Corporation Optimizing portfolios of financial instruments

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Standard Error (statistics), March 26, 2011, Wikipedia, 5 pp., last updated 10 March 2011. *
Stephen M. Stigler, Gauss and the Invention of Least Squares, 1981, The Annals of Statistics, Volume 9, No. 3, pp. 465-474 (1st page)) *

Cited By (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429428B2 (en) 1998-03-11 2013-04-23 Commvault Systems, Inc. System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services
US8966288B2 (en) 1998-03-11 2015-02-24 Commvault Systems, Inc. System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services
US20020059484A1 (en) * 2000-11-16 2002-05-16 Tadao Matsuzuki Network building method, management report acquiring method and apparatus
US7162708B2 (en) * 2001-12-28 2007-01-09 Electronics And Telecommunications Research Institute Method and apparatus for identifying software components for use in an object-oriented programming system
US20030126583A1 (en) * 2001-12-28 2003-07-03 Cho Jin Hee Method and apparatus for identifying software components for use in an object-oriented programming system
US9170890B2 (en) 2002-09-16 2015-10-27 Commvault Systems, Inc. Combined stream auxiliary copy system and method
US20060293913A1 (en) * 2005-06-10 2006-12-28 Pioneer Hi-Bred International, Inc. Method and system for licensing by location
US20090089224A1 (en) * 2005-06-10 2009-04-02 Pioneer Hi-Bred International, Inc. Method for using environmental classification to assist in financial management and services
US8046280B2 (en) 2005-06-10 2011-10-25 Pioneer Hi-Bred International, Inc. Method for using environmental classification to assist in financial management and services
US8249926B2 (en) 2005-06-10 2012-08-21 Pioneer Hi-Bred International, Inc. Method for using environmental classification to assist in financial management and services
US8032389B2 (en) 2005-06-10 2011-10-04 Pioneer Hi-Bred International, Inc. Method for use of environmental classification in product selection
US20060282299A1 (en) * 2005-06-10 2006-12-14 Pioneer Hi-Bred International, Inc. Method for use of environmental classification in product selection
US8290795B2 (en) 2005-06-10 2012-10-16 Pioneer Hi-Bred International, Inc. Method for using environmental classification to assist in financial management and services
US20060282296A1 (en) * 2005-06-10 2006-12-14 Pioneer Hi-Bred International, Inc. Method for using environmental classification to assist in financial management and services
US20090089171A1 (en) * 2005-06-10 2009-04-02 Pioneer Hi-Bred International, Inc. Method for using environmental classification to assist in financial management and services
US20070005451A1 (en) * 2005-06-10 2007-01-04 Pioneer Hi-Bred International, Inc. Crop value chain optimization
US20090112637A1 (en) * 2005-06-10 2009-04-30 Pioneer Hi-Bred International, Inc. Method for using environmental classification to assist in financial management and services
US8417602B2 (en) 2005-06-10 2013-04-09 Pioneer Hi-Bred International, Inc. Method for using environmental classification to assist in financial management and services
US20060282228A1 (en) * 2005-06-10 2006-12-14 Pioneer Hi-Bred International, Inc. Method and system for use of environmental classification in precision farming
US7818262B2 (en) 2005-12-19 2010-10-19 Commvault Systems, Inc. System and method for providing a flexible licensing system for digital content
US9009076B2 (en) * 2005-12-19 2015-04-14 Commvault Systems, Inc. Systems and methods for dynamic digital asset resource management
US20070203846A1 (en) * 2005-12-19 2007-08-30 Srinivas Kavuri System and method for providing a flexible licensing system for digital content
US20070198421A1 (en) * 2005-12-19 2007-08-23 Muller Marcus S Systems and methods for dynamic digital asset resource management
US10726439B2 (en) 2006-07-27 2020-07-28 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US9792619B2 (en) 2006-07-27 2017-10-17 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US11062342B2 (en) 2006-07-27 2021-07-13 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US10915917B2 (en) 2006-07-27 2021-02-09 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US10755298B2 (en) 2006-07-27 2020-08-25 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US9785962B2 (en) 2006-07-27 2017-10-10 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US10672022B2 (en) 2006-07-27 2020-06-02 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US20100280911A1 (en) * 2006-07-27 2010-11-04 Leverage, Inc. System and method for targeted marketing and consumer resource management
US10621611B2 (en) 2006-07-27 2020-04-14 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US11532010B2 (en) 2006-07-27 2022-12-20 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US11645669B2 (en) 2006-07-27 2023-05-09 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US10163121B2 (en) 2006-07-27 2018-12-25 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US11935089B2 (en) 2006-07-27 2024-03-19 Blackhawk Network, Inc. Enhanced rebate program
US9785961B2 (en) 2006-07-27 2017-10-10 Blackhawk Network, Inc. System and method for targeted marketing and consumer resource management
US8799116B2 (en) * 2006-09-29 2014-08-05 The Dun & Bradstreet Corporation Process and system for automated collection of business information from a business entity's accounting system
US20080249902A1 (en) * 2006-09-29 2008-10-09 Dun & Bradstreet Corp. Process and system for automated collection of business information from a business entity's accounting system
US20080086340A1 (en) * 2006-10-04 2008-04-10 Pioneer Hi-Bred International, Inc. Crop quality insurance
US8655914B2 (en) 2006-10-17 2014-02-18 Commvault Systems, Inc. System and method for storage operation access security
US8762335B2 (en) 2006-10-17 2014-06-24 Commvault Systems, Inc. System and method for storage operation access security
US20080091747A1 (en) * 2006-10-17 2008-04-17 Anand Prahlad System and method for storage operation access security
US8447728B2 (en) 2006-10-17 2013-05-21 Commvault Systems, Inc. System and method for storage operation access security
US8417534B2 (en) 2006-12-29 2013-04-09 Pioneer Hi-Bred International, Inc. Automated location-based information recall
US20080157990A1 (en) * 2006-12-29 2008-07-03 Pioneer Hi-Bred International, Inc. Automated location-based information recall
US9111320B2 (en) 2006-12-29 2015-08-18 Pioneer Hi-Bred International, Inc. Automated location-based information recall
US8434131B2 (en) 2009-03-20 2013-04-30 Commvault Systems, Inc. Managing connections in a data storage system
US8769635B2 (en) 2009-03-20 2014-07-01 Commvault Systems, Inc. Managing connections in a data storage system
US20110010213A1 (en) * 2009-07-09 2011-01-13 Pioneer Hi-Bred International, Inc. Method for capturing and reporting relevant crop genotype-specific performance information to scientists for continued crop genetic improvement
US20110054974A1 (en) * 2009-09-01 2011-03-03 Pioneer Hi-Bred International, Inc. Allocation of resources across an enterprise
US20110131247A1 (en) * 2009-11-30 2011-06-02 International Business Machines Corporation Semantic Management Of Enterprise Resourses
US20110137740A1 (en) * 2009-12-04 2011-06-09 Ashmit Bhattacharya Processing value-ascertainable items
US8751294B2 (en) 2009-12-04 2014-06-10 E2Interactive, Inc. Processing value-ascertainable items
US20120221425A1 (en) * 2009-12-04 2012-08-30 Ashmit Bhattacharya Processing value-ascertainable items
US10614400B2 (en) 2014-06-27 2020-04-07 o9 Solutions, Inc. Plan modeling and user feedback
US11216765B2 (en) 2014-06-27 2022-01-04 o9 Solutions, Inc. Plan modeling visualization
US11379774B2 (en) 2014-06-27 2022-07-05 o9 Solutions, Inc. Plan modeling and user feedback
US11379781B2 (en) 2014-06-27 2022-07-05 o9 Solutions, Inc. Unstructured data processing in plan modeling
US11816620B2 (en) 2014-06-27 2023-11-14 o9 Solutions, Inc. Plan modeling visualization
US10168931B2 (en) 2015-01-23 2019-01-01 Commvault Systems, Inc. Scalable auxiliary copy processing in a data storage management system using media agent resources
US10346069B2 (en) 2015-01-23 2019-07-09 Commvault Systems, Inc. Scalable auxiliary copy processing in a data storage management system using media agent resources
US9898213B2 (en) 2015-01-23 2018-02-20 Commvault Systems, Inc. Scalable auxiliary copy processing using media agent resources
US10996866B2 (en) 2015-01-23 2021-05-04 Commvault Systems, Inc. Scalable auxiliary copy processing in a data storage management system using media agent resources
US9904481B2 (en) 2015-01-23 2018-02-27 Commvault Systems, Inc. Scalable auxiliary copy processing in a storage management system using media agent resources
US11513696B2 (en) 2015-01-23 2022-11-29 Commvault Systems, Inc. Scalable auxiliary copy processing in a data storage management system using media agent resources
US11216478B2 (en) 2015-10-16 2022-01-04 o9 Solutions, Inc. Plan model searching
US11651004B2 (en) 2015-10-16 2023-05-16 o9 Solutions, Inc. Plan model searching
US11188271B2 (en) 2017-03-03 2021-11-30 Commvault Systems, Inc. Using storage managers in data storage management systems for license distribution, compliance, and updates
US10459666B2 (en) 2017-03-03 2019-10-29 Commvault Systems, Inc. Using storage managers in respective data storage management systems for license distribution, compliance, and updates
US11573744B2 (en) 2017-03-03 2023-02-07 Commvault Systems, Inc. Using storage managers in data storage management systems for quota distribution, compliance, and updates
US11010261B2 (en) 2017-03-31 2021-05-18 Commvault Systems, Inc. Dynamically allocating streams during restoration of data
US11615002B2 (en) 2017-03-31 2023-03-28 Commvault Systems, Inc. Dynamically allocating streams during restoration of data
US11468355B2 (en) 2019-03-04 2022-10-11 Iocurrents, Inc. Data compression and communication using machine learning
US11216742B2 (en) 2019-03-04 2022-01-04 Iocurrents, Inc. Data compression and communication using machine learning

Also Published As

Publication number Publication date
US20040172319A1 (en) 2004-09-02
US20040088239A1 (en) 2004-05-06
US10839321B2 (en) 2020-11-17
US20080140549A1 (en) 2008-06-12
US20130073442A1 (en) 2013-03-21

Similar Documents

Publication Publication Date Title
US10839321B2 (en) Automated data storage system
US8185486B2 (en) Segmented predictive model system
US20050144106A1 (en) Method of and system for defining and measuring the real options of a commercial enterprise
US7873567B2 (en) Value and risk management system
US8498915B2 (en) Data processing framework for financial services
US6321205B1 (en) Method of and system for modeling and analyzing business improvement programs
US7580848B2 (en) Method of and system for analyzing, modeling and valuing elements of a business enterprise
US20050251468A1 (en) Process management system
US20160239919A1 (en) Predictive model development system applied to organization management
US20160171398A1 (en) Predictive Model Development System Applied To Enterprise Risk Management
US6393406B1 (en) Method of and system for valving elements of a business enterprise
US20010034628A1 (en) Detailed method of and system for modeling and analyzing business improvement programs
US20010041995A1 (en) Method of and system for modeling and analyzing business improvement programs
US20080027841A1 (en) System for integrating enterprise performance management
US20050119922A1 (en) Method of and system for analyzing, modeling and valuing elements of a business enterprise
US20080004922A1 (en) Detailed method of and system for modeling and analyzing business improvement programs
US20080015871A1 (en) Varr system
US20010041996A1 (en) Method of and system for valuing elements of a business enterprise
US20040215495A1 (en) Method of and system for defining and measuring the elements of value and real options of a commercial enterprise
US20020046143A1 (en) Method of and system for evaluating cash flow and elements of a business enterprise
US20090030771A1 (en) Performance management platform
Van der Walt A materials management information system (MMIS) in a steel industry
mySAP et al. 5.1 General Overview

Legal Events

Date Code Title Description
AS Assignment

Owner name: VALUEMINER, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EDER, JEFF;REEL/FRAME:015047/0128

Effective date: 20040202

AS Assignment

Owner name: ASSET TRUST, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VALUEMINER, INC.;REEL/FRAME:015991/0127

Effective date: 20050510

AS Assignment

Owner name: ASSET RELIANCE, INC., WASHINGTON

Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:EDER, JEFF;REEL/FRAME:031909/0921

Effective date: 20120623

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: EDER, JEFFREY, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ASSET RELIANCE INC;REEL/FRAME:040639/0394

Effective date: 20161214