Surviving the Petabyte Age: a Practitioner's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Surviving the Petabyte Age: a Practitioner's Guide • Cognizant 20-20 Insights Surviving the Petabyte Age: A Practitioner’s Guide Executive Summary The amount of time it takes for news to become common knowledge has shrunk, thanks to: The concept of “big data1” is gaining attention across industries and the globe. Among the drivers • An emerging network of social media and blogs are the growth in social media (Twitter, Facebook, that potentially makes everyone a publisher of blogs, etc.) and the explosion of rich content from good and bad news. other information sources (activity logs from the A rapid increase in the number of people who Web, proximity and wireless sources, etc.). The • are untethered from traditional information desire to create actionable insights from ever- receptacles and now have a highly mobile increasing volumes of unstructured and struc- means of collecting and ingesting information. tured data sets is forcing enterprises to rethink their approach to big data, particularly as tradi- • The meteoric rise of desktop tools housing a tional approaches have proved difficult, if even significant portion of information. Organiza- possible, to apply to structured data sets. tions need to understand the information and processes involved in the dispensation of desk- One challenge that many, if not most, enter- top-managed information (mostly Microsoft prises are attempting to address is the increas- Access and Excel). This information is most ing number of data sources made available for likely to be found in the form of: analysis and reporting. Those who have taken an Copies of operational data (including both early adopter stance and integrated non-tabular > sources and targets). information (a.k.a. unstructured data) into their pool of analysis data have exacerbated their data > Copies of operational data that is enriched management problems. (including the processes and sources used for enrichment, as well as the targets that A second challenge is the shrinking timeframe in receive the enriched information). which a business stays focused on a particular Processes bypassing the systematized pro- topic. Thanks to the highly integrated and com- > cesses (including the bypassed processes, municative global economy, and the great strides the sources used for these processes, the made in expanding communications bandwidth, actors in these processes and the results of both good and bad news circumnavigate the these processes). globe at a much faster pace than ever before. cognizant 20-20 insights | december 2011 This whitepaper lays out the concept of a business tion models cannot be maintained fast enough to information model as a vehicle to organize infor- appease their business constituents. Moreover, mation into separate categories, which directly once constructed and populated with information, influences the creation, capture or extraction of these models require new technologies to inter- business value and elevates it to a heightened face with the data. Adding insult to injury, all this focus. We will cover four main topics: data is largely introspective and serves merely to support the status quo. When disruptions occur, 1. Why companies dealing with big data in insights can only be gleaned from this data over 1 today’s Petabye Age need to stratify informa- a sufficient passage of time; in the meantime, tion so that trustworthy, relevant, actionable insights are derived from what is largely called and timely data can be found at a moment’s unstructured and semi-structured data, as well as notice. data obtained from outside the organization via 2. A business model that can be used to stratify social media, blogs, Web sites and a host of other information. sources that don’t fit into the neatly organized tools devised for insight generation. 3. A new definition of partitioning and a business process for formulating the partitions. A major shift is transforming the basic tenets of Partitions should deal with stratifying informa- data-driven insight generation. This shift requires tion based on its contribution to organizational a new way of combining and synthesizing data data, as well as the more traditional technical used for navigating the highly integrated and partitioning that is conducted for performance communicative global economy. and maintenance reasons. 4. Methods of rolling out an information infra- Overcoming this challenge requires organizations structure aligned with this new partitioning to solve three important issues (see Figure 1): definition. The realities of this new environ- • Data depth: How to derive insight from struc- ment are that the maintenance of a traditional tures that contain billions or more instances of enterprise information model happens at the data. These can include sessions in a Web log, speed of business and is in direct opposition entries obtained from social media, entries from to maintaining the focus of information that RFID activities or mobile-sourced activities. One directly contributes to enterprise value. thing is sure: The sheer size of these pools of data will continue to grow, resulting in techni- Three Issues to Solve cal hurdles that challenge traditional methods The Petabyte Age2 is creating a multitude of for efficiently and effectively using such large challenges for IT organizations, as they find that pools of like data. Most solutions that deal with their well-honed, carefully constructed informa- big data attempt to meet this challenge. Data Challenges of the Petabyte Age Figure 1 cognizant 20-20 insights 2 • Focus on enterprise value: How to quickly Sheer Depth of Similar Data determine which data requires the most focus Specialized tools have emerged to address this at any point in time. Thanks to our tightly issue of enormous pools of similar data. These connected global economy, news travels tools originate from the realization that the time- around the world more quickly than ever, honored structured query language tools, as well which requires rapid rethinking of enterprise as other tools built around database technologies, strategies and tactics. This requires the ability are ill-equipped to efficiently deal with billions, to quickly change which data is focused upon. if not trillions, of rows of data. Spawned from Traditional information models that are con- Google’s attempt to deal with the data accumu- structed to synthesize business knowledge lated from all the interactions that occur with the from the deluge of available data impede the Google software suite, a whole new framework nimbleness required to meet the needs of the built around the MapReduce technology has been modern-day enterprise. borne, and an emerging suite of tools has begun • Less introspective view: How to make the to appear on this new stack of technologies. whole information fabric less introspective. Using information derived from inside the There will no doubt be a refinement of the tech- organization can predict future trajectories niques that are maturing to deal with this concept only if the status quo is assumed. However, of big data. The only thing we can be sure of is when there is a high degree of turbulence, that the big-data business issues addressed by knowledge obtained from internally-generat- MapReduce and the related suite of technologies ed information is woefully inadequate in the are not going away. short term; insights are obtainable only after Just as the technologies available for launching sufficient time has passed and several cycles the initial collection of Web sites were immature, have been interpreted. The resulting organi- so are the tools for developing solutions for big zational missteps are covered regularly in the data. Much has been said about how technology news media. What is required is an ability to has taken a major step back from what is com- wield information as an early-warning system monly available for business intelligence and data for understanding changes in enterprise tra- warehousing solutions — but this is much less a jectories. Such data sources are external to statement about the problem of big data than it the enterprise until enough time has passed is about the immaturity of the technologies avail- for a history of data points to be inferred from able for solving the big-data problem set. internal data. Converting Big Data Into Value Relevant Actionable Trustworthy Acquired & Data Learned Created Knowledge Just-in- Inference Focused Time Capabilities Customers Markets Channels Value Risks Chain Insight Regulatory Expected Investors Disruptions Outcomes Heard Innovation Inference Action Extracted Originated Value Value Value Captured Captured Transaction Captured Value Value Stream Figure 2 cognizant 20-20 insights 3 Managing Opportunity and Risk Managing Operational n tio Risk A ra ct o io b People Capabilitie n a s s ll T echn o Customers olo C gy L A B E R Media N S Competitors E Diffusing Focused Enhancing Disruptive Information Sustainable Events Value Markets Geographies P Financing cs ro tri R duct Me e n g Inn s i ovation Proces a u h la C to e rs Defining lu Enterprise Va Strategies Figure 3 Interestingly, the problem of large pools of data nal and external sources), learned inferences, is the primary issue, which today is tackled by heard inferences and innovations, some of which introducing technologies to tackle each of the will serve as disruptions to others in the partici- challenges outlined above independently. Com- pating marketplaces. panies that thrive in the Petabyte Age will be able to consolidate the technologies so their busi- It is the business model itself that must provide ness constituency is faced with a single interface the focus into what is pertinent to the business that addresses their full complement of informa- at a particular point in time and that serves as tional needs. the point of contention. The enterprise busi- ness models used as the basis for synthesizing Focus on Influencers information as the means of gaining insight are of Enterprise Value devised to map all data rather than “tiering” data The intent of business intelligence is to take into focus areas.
Recommended publications
  • Annual Report 2016
    4 AUDIT +1.0 % 202.0 CHF million Net revenues 2016 Lukas Marty Head of Audit Transformation as a source of strength This past year the audit business was driven more than usual by transactions, restructuring and relocations. KPMG’s technologically innovative, interdisciplinary services were extremely successful on the market. The faster the transformation, the more important the peace of mind offered by auditors. The more companies change, the greater the potential for auditors to make a vital contribution. And this is something KPMG has been quite successful at over the past year. Digitization raises demand for advisory services On the other hand, technological transformation There are multiple factors at play here. On the has intensified even further. Many clients one hand, Swiss businesses and companies are restructuring their IT systems, often with located in Switzerland have been involved far-reaching consequences: Companies are in numerous deals which need to be assessed being reorganized and their age-old structures by auditors, even if they take place outside radically dismantled. Standardized IT solutions Switzerland. The bustling acquisition schedule now make it possible for tasks previously is partly attributable to the strong franc, which performed across a large number of subsidiaries has boosted the purchasing power of Swiss to be assigned to just a few global shared corporations enormously. Yet the strong franc service centers. Not only that, but standardized has also prompted both foreign and Swiss firms IT solutions also allow global guidelines to be to take a more critical look at which activities established within corporations, industries and they want to keep in high-priced Switzerland and even beyond.
    [Show full text]
  • DLT RIDER to MANUFACTURER END USER TERMS (For Public Sector End Users)
    DLT RIDER TO MANUFACTURER END USER TERMS (For Public Sector End Users) 1. Scope. This DLT Rider to Infor, Inc. (“Manufacturer”) End User Terms (“DLT Rider”) establishes the terms and conditions enabling DLT Solutions, LLC (“DLT”) to provide Manufacturer’s Offerings to Public Sector Government Agencies to include the Federal, State and Local entities (the “Licensee” or “Customer”). 2. Applicability. The terms and conditions in the attached Manufacturer Terms are hereby incorporated by reference to the extent that they are consistent with Public Sector Laws (e.g., the Anti-Deficiency Act, the Contracts Disputes Act, the Prompt Payment Act, the Anti-Assignment statutes). To the extent the terms and conditions in the Manufacturer's Terms or any resulting Customer Order are inconsistent with the following clauses, they shall be deemed deleted and the following shall take precedence: a. Advertisements and Endorsements. Unless specifically authorized by Customer in writing, use of the name or logo of Customer is prohibited. b. Assignment. All clauses regarding Assignment are subject to Assignment of Claims and Novation and Change-of-Name Agreements. All clauses governing Assignment in the Manufacturer Terms are hereby deemed to be deleted. c. Audit. During the term of a Customer order subject to this Rider: (a) If Customer's security requirements included in the Order are met, Manufacturer or its designated agent may audit Customer's facilities and records to verify Customer's compliance with this Agreement. Any such audit will take place only during Customer's normal business hours contingent upon prior written notice and adherence to any security measures the Customer deems appropriate, including any requirements for personnel to be cleared prior to accessing sensitive facilities.
    [Show full text]
  • UNITED STATES DISTRICT COURT SOUTHERN DISTRICT of NEW YORK ------X : : : : in the MATTER of a WARRANT to : SEARCH a CERTAIN EMAIL ACCOUNT : No
    UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - x : : : : IN THE MATTER OF A WARRANT TO : SEARCH A CERTAIN EMAIL ACCOUNT : No. 13 Mag. 2814 CONTROLLED AND MAINTAINED BY : MICROSOFT CORPORATION : : : : - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - x MEMORANDUM OF LAW OF AMICUS CURIAE INFOR IN SUPPORT OF MICROSOFT CORPORATION’S MOTION TO VACATE THE SEARCH WARRANT GIBSON, DUNN & CRUTCHER LLP Orin Snyder Alexander H. Southwell Jane Kim 200 Park Avenue New York, NY 10166 Telephone: (212) 351-4000 Fax: (212) 351-4035 Thomas G. Hungar (pro hac vice pending) [email protected] 1050 Connecticut Avenue, NW Washington, DC 20036 Telephone: (202) 955-8500 Fax: (202) 467-0539 Attorneys for Amicus Curiae Infor TABLE OF CONTENTS Page INTEREST OF AMICUS CURIAE ................................................................................................. 1 INTRODUCTION .......................................................................................................................... 2 ARGUMENT .................................................................................................................................. 4 I. Infor Joins The Arguments Set Forth In The Amicus Curiae Briefs Of Verizon Communications, Inc., Apple Inc., And Cisco Systems, Inc. ............................................. 4 II. U.S. Technology Companies Will Be Substantially Harmed Should ECPA Warrants Apply Extraterritorially. .....................................................................................
    [Show full text]
  • A Day in the Life of Your Data
    A Day in the Life of Your Data A Father-Daughter Day at the Playground April, 2021 “I believe people are smart and some people want to share more data than other people do. Ask them. Ask them every time. Make them tell you to stop asking them if they get tired of your asking them. Let them know precisely what you’re going to do with their data.” Steve Jobs All Things Digital Conference, 2010 Over the past decade, a large and opaque industry has been amassing increasing amounts of personal data.1,2 A complex ecosystem of websites, apps, social media companies, data brokers, and ad tech firms track users online and offline, harvesting their personal data. This data is pieced together, shared, aggregated, and used in real-time auctions, fueling a $227 billion-a-year industry.1 This occurs every day, as people go about their daily lives, often without their knowledge or permission.3,4 Let’s take a look at what this industry is able to learn about a father and daughter during an otherwise pleasant day at the park. Did you know? Trackers are embedded in Trackers are often embedded Data brokers collect and sell, apps you use every day: the in third-party code that helps license, or otherwise disclose average app has 6 trackers.3 developers build their apps. to third parties the personal The majority of popular Android By including trackers, developers information of particular individ- and iOS apps have embedded also allow third parties to collect uals with whom they do not have trackers.5,6,7 and link data you have shared a direct relationship.3 with them across different apps and with other data that has been collected about you.
    [Show full text]
  • Driving High Performance in Government: Maximizing the Value of Public-Sector Shared Services High Performance in Government
    The Government Executive Series Driving High Performance in Government: Maximizing the Value of Public-Sector Shared Services High performance in government What characterizes high performance in government? Through our extensive research and experience in the public sector, Accenture has found that true high-performance govern- ments bear unmistakable hallmarks. High-performance governments generate maximum public value. They are relentlessly citizen centered and outcome focused. Their capabilities and operational activities all support the delivery of outcomes defined by their mission, and they measure their performance based on those outcomes—not just inputs and outputs. At the same time, high-performance governments are committed to cost-effectiveness. They hold themselves accountable; they actively accept their role as stewards of the public trust; and they make their operations and results transparent to all. They are innovative and flexible, continually striving to improve value delivery, and are able to respond creatively to new challenges and opportunities. They work in open and collaborative ways, understanding that their organization is part of a larger system, and cultivate working relationships with other agencies, organizations and stakeholders. Finally, high-performance governments reflect their enthusiasm for delivering public value. This evident passion engages both internal staff and external stakeholders in active support of their organizations’ missions. Shared services enables high performance. It allows governments
    [Show full text]
  • Code Rules: a Playbook for Managing at the Crossroads
    Code Rules A Playbook for Managing at the Crossroads By Malcolm Frank, Paul Roehrig and Ben Pring | FUTURE OF WORKTM © Cognizant Technology Solutions U.S. Corporation 2013, all rights reserved. Preface Today’s high-flying companies — the outliers in revenue growth and value creation — are winning with a new set of rules. They are dominating their sectors by managing the information that surrounds people, organizations, processes and products — what we call Code HalosTM— to build new business and operating models. 1 Code Halos contain a richness of business meaning that forms the new basis of competition. When Code Halos scale, they spark new commercial models in a predictable five-step model that can take entire industries to “the Crossroads,” a compressed period of time in which market dominance can dramatically flip from industry stalwarts to challengers. In this white paper, we define the new rules of success by decoding the business of meaning and the pattern of success that has emerged. 2 FUTURE OF WORK June 2013 CODE RULES: A PLAYBOOK FOR MANAGING AT THE CROSSROADS 3 Executive Summary What separates today’s high-flying outliers — such as Apple, Google, Amazon, Netflix and Pandora — from fast-followers and wannabes? It’s the ability to disrupt markets by capturing customer insight and market meaning from the flood of data swirling around us all. The data — or the Code Halo™ that accom- panies people, organizations and devices — contains a richness of potential business meaning that far outstrips the value of bricks, mortar and other physical assets that have historically powered market leadership.
    [Show full text]
  • INFOR, INC. (Exact Name of Registrant As Specified in Its Charter) DELAWARE 333-183494-06 01-0924667 (State Or Other Jurisdiction (Commission (I.R.S
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of Report (Date of earliest event reported): April 6, 2020 (March 31, 2020) INFOR, INC. (Exact name of registrant as specified in its charter) DELAWARE 333-183494-06 01-0924667 (State or other jurisdiction (Commission (I.R.S. Employer of incorporation or organization) File Number) Identification Number) 641 AVENUE OF THE AMERICAS NEW YORK, NEW YORK 10011 (Address of principal executive offices) (Zip Code) (646) 336-1700 (Registrant’s telephone number, including area code) Not Applicable (Former name or former address, if changed since last report) Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligations of the registrant under any of the following provisions: ☐ Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) ☐ Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) ☐ Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) ☐ Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (17 CFR 240.13e-4(c)) Securities registered pursuant to section 12(b) of the act: None Trading Name of exchange Title of each class Symbol on which registered N/A N/A N/A Indicate by check mark whether the registrant is an emerging growth company as defined in Rule 405 of the Securities Act of 1933 (§230.405 of this chapter) or Rule 12b-2 of the Securities Exchange Act of 1934 (§240.12b-2 of this chapter).
    [Show full text]
  • Detecting and Preventing Duplicate Invoice Payments
    White Paper Detecting and preventing duplicate invoice payments Executive summary Duplicate invoice payments occur far more frequently than most organizations realize. On average, approximately 0.1% to 0.05% of invoices paid are typically duplicate payments—which for a medium- size organization with annual costs of $100 million over a three year period, could represent a loss of $300,000. Within the public sector, this amount is far higher due to the typical size and volume of payments as can be seen from the results posted by the US Government Accountability Office (GAO) in their 2012 annual report, which indicates that the GAO helped to reduce “improper payments by about $1.4 billion for 22 federal programs.” 1 Table of Contents 1 Executive summary How control violations are performed 2 What are the main causes of duplication? 4 How to detect duplicate payments 16% Manual processing 4 Basic steps to reduce duplicate payments Data warehouse 20% processing 5 The Infor answer 64% Automated processing Figure 1. 64% of organizations rely on manual processing to detect duplicate invoice payments.2 While many duplicate invoice payments are recognized after high- integrity suppliers notice the mistake, many other duplicate payments require expensive recovery audits and/or intensive manual processes. Many are never identified or resolved. According to a 2012 KPMG poll, “64% of organizations still rely primarily on manual control testing to detect control violations such as duplicate invoice payments.”3 1 US Government Accountability Office, Summary of GAO’s Performance and Accountability Report Fiscal Year 2012; p. 8 2 Based on data published in: KPMG; Low Tech Approach to High Risk Challenges, KPMG Pulse Survey results from the 2012 RSA Archer GRC Summit; June 2012; p.1 3 KPMG, p.
    [Show full text]
  • June 12, 2013 Item No. 9
    June 12, 2013 Item No. 9 AUTHORIZATION TO ENTER INTO TWO (2) YEAR SERVICE AND SUPPORT AGREEMENTS WITH YARDI, INFOR, ORACLE AND SALESFORCE.COM FOR MAINTENANCE AND SUPPORT SERVICES FOR THEIR RESPECTIVE SOFTWARE AND SYSTEMS To the Honorable Board of Commissioners: RECOMMENDATION It is recommended that the Board of Commissioners authorizes the Chief Executive Officer (“CEO”) or his designee to enter into two (2) year agreements: (1) with Yardi in an amount not‐to‐exceed $540,000 for support and maintenance; (2) with Infor in an amount not‐to‐exceed $500,000 for support and maintenance; (3) with Oracle in an amount not‐to‐exceed $480,000 for support and maintenance; and (4) with Salesforce.com in an amount not‐to‐exceed $800,000 for subscription maintenance and support for fiscal years 2013 through 2015. The Executive Vice President (“EVP”) of Finance, the Office of the General Counsel and the Department of Procurement and Contracts have completed all necessary due diligence to support the submission of this initiative and recommend the approval of this item accordingly. CORPORATE GOAL The proposed program supports CHA’s corporate goals of ensuring that the CHA’s housing portfolio is safe, decent and sustainable. FUNDING: CHA General Fund SOLICITATION SUMMARY Vendor: Yardi Systems, Inc. 430 South Fairview Ave. Goletta, CA 93117 Contract Type: Professional Services Contract Amount: $540,000 Contract Period: July 1, 2013 through June 30, 2015 M/W/DBE Participation: 100% MBE Section 3: Hiring Not Applicable XX Vendor: Infor (US), Inc. 13560 Morris Road Alpharetta, GA 30004 Contract Type: Professional Services Contract Amount: $500,000 Contract Period: January 1, 2014 through December 31, 2015 M/W/DBE Participation: Waiver XX Section 3: Hiring Not Applicable XX Vendor: Oracle Corporation 233 S.
    [Show full text]
  • Oracle HCM Leads with Platform Innovation Voice Assistants and Adaptive Mobile UX Elevate the Employee Experience
    September 23, 2019 OFFERING OVERVIEW Oracle HCM Leads with Platform Innovation Voice Assistants and Adaptive Mobile UX Elevate the Employee Experience Holger Mueller Vice President and Principal Analyst Copy Editor: Jim Donahue Layout Editor: Aubrey Coggins Produced exclusively for Constellation Research clients TABLE OF CONTENTS Executive Summary ......................................................................................3 About Oracle HCM ......................................................................................4 Functional Capabilities ..................................................................................9 Pricing ..................................................................................................21 Analysis and Observations .............................................................................22 Recommendations ......................................................................................26 Related Research .......................................................................................28 Endnotes ...............................................................................................30 Analyst Bio .............................................................................................32 About Constellation Research ..........................................................................33 © 2019 Constellation Research, Inc. All rights reserved. EXECUTIVE SUMMARY This report provides an overview of Oracle HCM and analyzes its capabilities to satisfy
    [Show full text]
  • Infor Fourth Shift RELEASE ROADMAP
    Infor Fourth Shift RELEASE ROADMAP APRIL 2021 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 Disclaimer This presentation reflects the direction Infor may take with regard to the products or services described herein, all of which is subject to change without notice. This presentation is not a commitment to you in any way and you should not rely on any content herein in making any decision. Infor is not committing to develop or deliver any specified enhancement, upgrade, product, service or functionality, even if such is described herein. Many factors can affect Infor’s product development plans and the nature, content and timing of future product releases, all of which remain in the sole discretion of Infor. This presentation, in whole or in part, may not be incorporated into any agreement. Infor expressly disclaims any liability with respect to this presentation. INFOR FOURTH SHIFT- Roadmap Release | April 2021 2 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 2020 - Recap Infor Fourth Shift 8.00B Technical Utility Mobility Microsoft 2019 New and improved functions New VisiBar Web Client Support Infor Fourth Shift Release | April 2021 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 HIGHLIGHT Microsoft Support Fourth Shift support for latest Microsoft platform. Benefits: Futureproof on latest versions Microsoft Windows Server 2019 Microsoft SQL Server 2019 Infor Fourth Shift Release | April 2021 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 HIGHLIGHT Fourth Shift 8.00B Manufacturing, Finance, Technical and performance improvements.
    [Show full text]
  • Money Issuance
    Money Issuance Alternative Monetary Systems A report commissioned by the Icelandic Prime Minister’s Office kpmg.is KPMG Contacts: Svanbjörn Thoroddsen Partner +354 545 6220 [email protected] Sigurvin B. Sigurjónsson Manager +354 545 6112 [email protected] This report is commissioned by the Icelandic Prime Minister’s Office. KPMG makes no representation or warranty, expressed or implied, as to the accuracy, reasonableness or completeness of the infor- mation contained in this document. KPMG expressly disclaims any and all liability for any information contained in, or errors in or omissions from this document or based on or relating to the readers’ use of the information contained within it. Details of our principal information sources are set out within the report and we have satisfied ourselves, so far as possible, that the information presented in our report is consistent with other information which was made available to us during the course of our work. We have not, however, sought to establish the reliability of the information. Alternative Monetary Systems | 3 Contents Terms and definitions .......................................................................................... 4 Executive summary .............................................................................................. 5 Introduction ................................................................................................................. 6 Fundamentals of Monetary Systems ................................ 7 Fundamentals of monetary systems ......................................................
    [Show full text]