Sunday, May 20, 2012

Nostalgia!

Nostalgia Slideshow: Bijay’s trip from Pokhara, Nepal to 4 cities New York City, Richmond, and Syracuse was created by TripAdvisor. See another United States slideshow. Create your own stunning slideshow with our free photo slideshow maker.

Tuesday, September 21, 2010

ICICI Bank--A detail study.

ICICI Bank A detail study

ICICI Bank is a major banking and financial service organization of India. It is the second largest bank in India in terms of market capitalization and is the largest private sector bank as of March 31st 2010 with a total asset of Rs. 3,634 billion (US $ 81 billion) It has a network of 2,035 branches and about 5,518 ATMs in India and presence in 18 countries (About Us: ICICI Bank, 2010).
ICICI Bank products include Investment banking, Commercial banking, Retail banking, Private banking Asset management, Mortgages and credit cards. The Bank’s subsidiaries include ICICI Prudential Life Insurance Company Limited, ICICI Lombard General Insurance Company Limited, ICICI Trusteeship Services Limited, ICICI Prudential Pension Funds Management Company Limited, ICICI Home Finance Company Limited and ICICI Securities Limited. ICICI Bank's equity shares are listed in India on Bombay Stock Exchange and the National Stock Exchange of India Limited and its American Depositary Receipts (ADRs) are listed on the New York Stock Exchange (NYSE).
On September 15th 2008 Lehman brothers filled a bankruptcy under chapter 11 bankruptcy protection act in front of the bankruptcy court. This event was widely covered by Indian media and news channels many investors were worried whether any of their banks or investment firms had a direct or indirect exposure to this event. Then some channels in the media started covering the news about ICICI bank’s exposure to the Lehman brother crises to clarify the matter ICICI Bank issued a press release on September 16, 2008 stating that ICICI Bank UK PLC holds Euro 57 million of senior bonds of Lehman Brothers Inc. as part of its treasury operations, ICICI Bank Limited has undertaken transactions with Lehman Brothers entities as counter-parties. The exposure to Lehman Brothers entities on account of these transactions and potential loss thereon are not material. The bank further clarified that at June 30, 2008, ICICI Bank and its subsidiaries had consolidated total assets of Rs.484, 643 crore. ICICI Bank UK PLC had total assets of about US$ 8.7 billion at that date. ICICI Bank PLC's investment of Euro 57 million (approximately US$ 80 mn) in senior bonds of Lehman Brothers Inc .constitutes less than 1% of ICICI Bank UK PLC's total assets and less than 0.1% of the consolidated total assets of the ICICI Group. ICICI Bank UK PLC already holds a provision of about US$ 12 million against investment in these bonds. Considering a 50% recovery estimate, the additional provision required would be about US$ 28 million. There is no other material impact on ICICI Bank or ICICI Bank UK PLC on account of exposure to Lehman Brothers (About Us: ICICI Bank, 2010).
This was a very crisp and aggressive response from a bank that was known for its aggressiveness; to come out in media on the second day when the news broke out and to accept its exposure to the crisis and to provide a clear picture of its loss was indeed a good achievement. But this aggressive behavior of the bank backfired. There was news in some section of media that some of the top management of the bank have been selling ICICI Bank shares for the last few days this helped in creating a wild fire that ICICI bank is in deep trouble internally. “The Ministry of Finance is worried that ICICI followed American banking model and created the same meltdown effect that has made American financial institutions the biggest joke of the world. ICICI bank competed with Citibank and others following the failed American business model they are now bankrupt just like the Americans”. (thakerey, 2008) The bank was quick in another press release on 17th September 2008 the bank released another press statement stating that ICICI Bank denies malicious rumours of sale of shares by top management the statement states that “It has been brought to the notice of ICICI Bank that a malicious rumor is being spread to the effect that some of the top management have been selling ICICI Bank shares for the last few days. These rumors are baseless and irresponsible, and no shares have been sold by members of the top management of the Bank during the current year. ICICI Bank is taking up this matter with regulatory authorities for necessary action against those responsible for the rumors” (About Us: ICICI Bank, 2010). But such was the impact of the rumors that long queues were seen outside the ATMs, people started flowing into the branches for withdrawal of their money and the bank shares drop by more than 56% then what it was at the start of the year (Bahree, 08). Not just with individuals the bank started losing corporate customers as well many IT companies were in the forefront to close their ties with the bank. The bank found itself amid huge crises, crises that had threatened its very existence.
The firm was always quick in dealing with the rumor but the rumor was so widespread that addition steps were necessary to prevent any serious damage to the business. The firm decided to implement two plans first on a short term and then on a long term basis to prevent any such crises.
In a short term basis the firm was aware that any liquidity crunch can create a very negative impact and can help in escalation of such rumors. The bank was quick to deal with the Reserve bank of India to prevent such liquidity crisis from occurring the reserve bank was quick to provide support to ICICI Bank by operating overtime and arranging to provide adequate cash to the bank. All the ATM’s of the bank were continuously replenished with money and the bank without any hesitation allowed its customers to break their fixed deposits. This actually helped in creating an impression on the mind of the customer that everything was fine. Every measure was taken that normal day to day activity of the branch runs smoothly.
The bank requested the Reserve bank of India to release a statement about its financial condition and such statement was released by the reserve bank on 30th September 2010.The top level management team travelled to Gujarat where the impact was tremendous and tried to meet people and explain about the sound financial condition of the bank. The bank also reduced its NRI deposit rates to prevent further damage. The rumors were also forwarded by using SMS and emails to counter such rumors ICICI bank started a massive email and messaging campaign, it sent SMS and emails to its 27 million strong customer database stating that the financial status of the bank was sound. The bank almost used all forms of communication to regain the trust of its customers Having learned that some broker were also there in spreading such rumors, ICICI Bank filed a police complaint in Coimbatore and Mumbai on Sunday 13th October 2008, the report said a bear cartel of certain high-profile BSE brokers, who have been actively selling the bank’s shares for quite some time, may have also been behind the rumors (News: Banking/Finance: The Economics times, 2008). ICICI Bank, also filed a complaint with the Economic Offences Wing (EOW) of Maharashtra on 14th October 2008, said that “It could well be possible that due investigation by EOW can reveal whether this is a new form of economic terrorism akin to how counterfeit currency is put into circulation.” (News: Banking/Finance: The Economics times, 2008). Finally when the matter was going out of hands the bank requested the Finance ministry to intervene, in a statement, the finance ministry clarified that the financial status of the bank was sound and that there was no possibility of the bank going bankrupt in the near future. After few months the rumor subsides.
There was a huge loss to the bank because of the rumor. The feeling that any big private organization can go bankrupt anytime was still fresh in peoples mind. To get back the trust of its customers the bank stated a unique long term campaign to connect to its customers at a personal level, the bank began to identify its privileged customers and provide them with a service that was well beyond professional level and provided a personal touch. These privilege customers were made to feel like home. All branches started a unique ‘Milap’ program (a customer’s meets) to identify and address the customer’s grievances. The bank also launched a new massive add campaign which says “Vishwas hai toh sab kutch hai” if there is trust everything is smooth. The bank tried hard to distinguish itself from other bank in terms of the level of service, the level of service was raised considerably after the incident. The bank also decided to focus more on sale and tries to improve its CASA (current account and savings accounts) to the old level by pitching every customer about the benefits of opening an account with the bank.
This crisis had a long term effect on both the risk management and the policy of the organization, now the organization gives more importance to high systematic liquidity and RS. 1.30 trillion Is lent to RBI on a regular basis. The importance of improving CASA deposit and the importance of reducing the proportion of wholesale deposits also gets mentioned in the position balance sheet for the next phase of growth. The position balance sheet for the next phase of growth also mentions the importance of maintaining a high capital adequacy and the importance of reducing cost on operating expenses. More focus is given in the opportunities from mortgage, project finance and commercial banking then unsecured retail portfolio (About Us: ICICI Bank, 2010).
There was a series of change in the architecture in terms of distribution and collection like
Distribution

1. Various branch networks were enhanced as focal point for customer relationship
2. Branches were made responsible for customer acquisition, sales and class servicing
3. Select "mega branches“were identified for commercial banking opportunities; headed by senior employees these branches were given special powers to satisfy the needs of the customers.
Collection:
1. In-housing of collections was decided for specific products and buckets
2. Dedicated pre-delinquency management cell was set up
3. Changes in field agency management and incentives were implement to accomplish proper collection procedures
Human resource: A major retraining and redeployment of staff was undertaken for this new responsibility in the branch.
There was also a series of change in the risk management practices.
Risk management of ICICI Bank: As a financial intermediary, ICICI Bank is primarily exposed to credit risk, market risk, liquidity risk, operational risk and legal risk. ICICI Bank has a central Risk, Compliance and Audit Group with a mandate to identify, assess, monitor and manage all of ICICI Bank’s principal risks in accordance with well-defined policies and procedures. The Risk, Compliance and Audit Group coordinate with representative of the business units to implement ICICI Bank’s risk methodologies.
Changes in Credit risk assessment policy:
After the crises ICICI Bank changed its Credit strategy, ICICI began to moderate its credit growth from the year 2008 because of the risk associated with it.
In this process it started the moderation in the system non food credit growth from 22.3% in FY2008 to 15.4% at mid July 2009.
To keep a balance to the credit growth ICICI bank is now focusing on mortgages, project finance and commercial banking.
Change in Market risk assessment policy:
After the financial crisis ICICI has changed its International expansion plans and there has been a limited growth in the overall international balance sheet.
Term deposit mobilization capabilities in UK and Canada subsidiaries are selectively deployed and are primarily linked to Indian assets only.

Lessons learned:
ICICI Bank is an aggressive bank and has always been in the forefront to try new things. It was the first bank to bring phone banking and internet banking services in India this shows that it always takes initiative and hence is regularly prone to risk. ICICI has an entire department dedicated for risk management their ability to manage the increased complexity of the risks that they face following their rapid international growth, future levels of impaired loans, growth and expansion in domestic and overseas markets, the adequacy of their allowance for credit and investment losses, technological changes, investment income, their ability to market new products, cash flow projections, the outcome of any legal, tax or regulatory proceedings in India and in other jurisdictions will largely define the success of this bank in the future. If this department can function properly as it has done during the last crisis situation, then this bank will be an immensely successful organization.
As one of the few Indian banks thoroughly integrated with the global economy, it will probably enjoy a stock surge if markets bounce back elsewhere. But when global times are tough, ICICI will take a beating!

Glossary:
CASA: Current account and savings account
Bibliography
About Us: ICICI Bank. (2010, September 18). Retrieved September 18, 2010, from ICICI Bank: http://www.icicibank.com/aboutus/about-us.html
Bahree, M. (08, 09 30). Business: Forbes.com. Retrieved 09 19, 2010, from Forbes.com: http://www.forbes.com/2008/09/30/banking-india-icici-biz-wall-cz_mb_0930icici.html
News: Banking/Finance: The Economics times. (2008, 10 13). Retrieved 09 19, 2010, from The Economics times: http://economictimes.indiatimes.com/news/news-by-industry/banking/finance/banking/ICICI-Bank-files-FIR-over-malicious-SMS/articleshow/3587810.cms
thakerey, B. (2008, October 16th). Samana . Samana . Mumbai, Maharahtra, India.

Friday, September 10, 2010

Business rules.

BEST PRACTISE PAPER BUSINESS RULES


Introduction
Business rules represent the language and fundamental structure of an organization (Hay,
2003). Every organization follows its own sets of rules and is governed by its policies and procedures. Today’s business relationships are complex, hence to represent such a complex relationship; a good data model is of extreme importance. Business rules are usually atomic i.e. it cannot be broken further into much details hence business rules are the pillars of information systems. Business rules helps in creating a complete view in analyzing companies data, they provide with the medium to communicate between the users and designers. Business rules provides the application layer with data’s that are preliminarily filtered using various rules and constraints such rules can either be embedded in the codes or can be written separately using triggers and stored procedures, hence business rules forms the heart of any business logic. So what factor should determine a business rule? Is it the technological aspects or the business regulations? Is every business rule covered in a model? How a business rules be written, what are the various aspects that a business rule should cover. Well there can be many answers to these questions as business rules changes from organization to organization hence it’s up to the organization to research and find the best practice for its business rules.

Best practice
Business rules written by a business analyst must be in a form that the business owner can immediately accept it or reject it. All business rules should be business and not technology oriented. It must be written in a way that it’s fairly easy to convert the business rules into operational system. It must be atomic, unambiguous¸ compact, consistent and Compatible. The
main source of business rules are company managers or policy makers and various written documents hence there should be a good communication process between the user and the analyst. Business rules can be divided into four part terms, facts, derivations and constraints Terms and Facts are structural assertion where as constraints are action assertion (Hay D. C., january 1,2002). Business rules development process can be broadly classified into three parts
1) Discovering
2) Analyzing and
3) Implementing
In the discovering part, the business rules that governs the organization should be observed carefully and be able to describe the operations of the organization using the plain simple translated language. This business rule is further analyzed.
In the analyzing part the analyst must be able to analyze, organize and manage the business rules discovered, the analyzing part is extremely important and must be done with proper discussion with the user. Different relationships are decided and hence mapping should be done accordingly, that the project architects should have proper training for creating business process and domain model. It’s extremely important to create and establish an organized repository of business rules. Since individual projects generally work on fragments of business processes and we have to assemble the whole project into a single project at the end.

In the implementation part proper entities and attributes are chosen and different data models are created using proper relationships. The end product is the Entity relationship diagram or the ERDs. There is no industry standard notation for ER model and the notation can be easily done using some drawing tools. A lot of time should be given in developing an enhancing accurately represented Data models. As change in business rules can change Data models, Data models should be able to accommodate any change in the business rules; hence a true data
model must possess the ability to inherit as well as to adapt to the change.
At the end the user can test whether the original business rules is validated. Business rules keeps on evolving and same business rules can be used by more than one application hence business rules should not be hard coded.

Assessment
A data model is created based on the business rules of the organization there are certain rules that a data models can and cannot represent. Terms and facts can be represented in the data model and some parts of derivations too i.e. derived attributes can be shown but not derivation formulae’s where as for constraints to be represented , some can be represented and some cannot.
The key benefit of using a business rule based repository model is that the information can be understood by the user as well as the IT professionals. Rules repositories will provide with a full system specification hence allowing independent decisions while handling business rules this holds good even when there is a lot of change in the architecture. Using proper business rule approach the system design can be changed when there is a change in the business rules, business rules can change as a result of new legislative mandates or emerging products,
services, partnership mergers and acquisitions or competition. Using business rule approach provides many advantages in the built system it makes the system simple provides with a theoretical base as well as small number of necessary non technical concepts which are very useful. Using business rule approach can make rule reuse easy and provides with a simplified system design as well as enhance performance. Business rules approaches are beneficial to the business community as well as software engineers. There can be few barriers in adopting such business rules approach like profit driven resistance and the existing culture of an organization to do such things.

Conclusion and recommendation
The business rule approach has made an initial successful entrance in the market and many companies are looking for developing there system using business rule approach. A system that is more flexible, a system that can change easily, a system that the business managers them self design. With different modeling techniques like the OODBMS and UML using business rules for development it is just a matter of time when business rule approach will be the standard way of developing almost all the systems.
All the business organization should use the repository of business rules for their system design in this way they can develop a system that is more flexible, cost effective and delivers high performance.

Glossary
Business rules A statement that defines or constraints some aspects of business rule.
ERD Entity relationship diagram.
UML Unified Modeling Language.
OODBMS Object oriented database management system.
BIBLOGRAPHY
Hay, D. C. (january 1,2002). A Repository Model- Business Rules. The Data Administration
Newsletter, Issue 13. .
Hay, D. (2003). What Exactly is a Data Model? DM review Vol 13,Issue 2.

Data Administration

Introduction
Databases are shared resources that belong to the entire enterprise; they are not the property of a single function or individual within the organization. Data administration is the custodian of the organizations data, the data administrator must develop procedures to protect and control resources and also resolve dispute that may arise when the data are centralized and shared among users and must play a significant role in defining where the data must be stored and managed. Data administration is a high level function that is responsible with the overall management in an organization including maintaining corporate wide data definition and standards.
The role of data administration has changed a lot from the traditional role of setting data policies procedures and standards, resolving data conflicts, managing the information repository and internal marketing to a more evolved approach which include a blend of data and database administration hence in modern term a data administration may refer to the way in which data integrity is maintained within a warehouse. With the rapid change in the business condition more specialized data administration roles have evolved like procedural DBA’s(database administrator), e-DBA’s, The PDA DBA’s etc hence modern DBA’s must be able to create and enforce data standard and policies. The role that such administrator will play largely depends on type of the organization, the size of the organization and size of the IT department.
The functions that a Data administration plays are
• Create standards for naming things: data elements, databases
• Ensure the integrity of data in an organization’s systems
• Deal with data access policies
• Manage metadata repositories (data dictionaries)
• Implement data warehouses
• Do data modeling for warehouse or other projects
• Build consensus between data users and technical personnel
Even today data naming is a key to maximize the value of data resource, sharing data with others meeting customer data needs and realizing other business benefits.
Best practice
The best practice for data administration should include creating an effective data naming program the data administrator should at a minimum develop
1) Policies for data naming: how data naming is administered; who can name data, rules for data name format, rules for data name content, rules for use of alternative names, criteria’s for adding to or modifying data naming rules.

2) Develop standard names for the organizations data: establish a list of prime word class word allowable abbreviation list, allowable acronyms list etc.
3) Develop rules for standard name: when standard name must be used and when it is not required.
4) Establish priorities for data naming: areas of priority include data that would be shared, community data, created or used by multiple organization, public data, data from current systems development or integration projects, data involved in current modeling efforts.
All names should be clear in proper format and brief it should be context free and should be stated as a single concepts all abbreviations and acronyms should be avoided unless absolutely necessary.
Other than establishing an effective naming program the data administration must also establish policies, procedures, guidelines, and standards for the planning, operation, and assessment of the Data Administration program. The data administration must Support data sharing and reuse within the organization, with other government agencies and private sector organizations, and with individuals, as appropriate; it should Recommend tools and techniques within the Data Administration program to ensure consistency and interoperability of information; it should also maintain a clear timeframe to provide education to staff on the principles, methods and techniques to achieve a shared data environment.
It should Identify planning, reporting, and resource requirements for effective Data Administration; and establish model-based methods to identify and document information needs, standardize data for maximum data-sharing capability; and Comply with organizational and national standards as appropriate before creating unique standards (e.g., postal code formats).
Assessment
There are numerous benefits of creating an effective naming standard. Some of the business benefits that we can utilize by using a good naming program are
1. Reduce cost associated with data creation.
2. Improved ability to meet customer needs
3. Reduce redundancy and better reliability
4. Ease of access for business users
5. Improved ability to develop quality data warehouses, data repository etc
By using proper naming standards the data administration can protect and control resources, resolve dispute that may arise when the data are centralized and shared among users and also the security of the system can increase drastically. By establishing policies, procedures, guidelines, and standards for the planning, operation, and assessment of the Data Administration program the data administrator can structure the organization to promote good data management and data quality and establish processes to maximize data quality and utility. Organization can design and maintain data, systems, and reporting mechanisms in a manner that promotes good data management they can develop tools that promote and foster good data management and data quality. They can comply with regulatory and contractual requirements when data is sourced, stored, and used.
A growing number of tools and techniques can be used to support data-management and data-quality. These include metadata repositories, data dictionaries, data models, data and process flows, master data management (MDM), detailed specifications, audits and controls, data and text mining, and encryption.
Conclusion and recommendation
If the reliability, availability, or timeliness of the data a company uses or produces is in jeopardy or doubt, the value of the data erodes. Less than optimal operational decisions can result and an organization may delay or misdirect corporate initiatives, personnel and customer dissatisfaction and frustration can arise. In this light, reestablishing the credibility of a company’s data assets can be costly
On the upside, with the potential for new and enhanced uses of data, the value of data assets can appreciate markedly. To continue to grow, prosper, and maintain a competitive advantage, a company will need more data of increased variety and sophistication. Maintaining the quality of that new data will require even more tools, as well as different data-management and control expertise hence creating a proper naming standard and data administration will become more important.

Glossary
DBA Database administrator
DWA Data warehouse administrator
e-DBA Database for web based application

Bibliography
(Information policy office, 1995)
Jeffry hoffer, M. b. (2007). Modern database management.

Word count: 1058

Saturday, March 27, 2010

Introduction

Hi This is Bijay Suvedi from Mumbai India