Customer credit-rating software , Computer Engineering

Assignment Help:

Gordon Grant, majority shareholder and Chief Executive Officer of Finance-IT Ltd, is determined to be one of the entrepreneurs making money out of the recession. He started the firm in 2005 with the aim of producing high-quality software aimed at helping banks identify and serve customer needs. In 2007 Finance-IT Ltd expanded its business interests by setting up the on-line payment firm SecurBuy which now handles 25% of on-line payments in the UK. Gordon is convinced that banks need his firm's services more than ever in the current recession. Finance-IT Ltd software customers include banks in the UK, US and EU.

The current market for customer credit-rating software is dominated by FiFind, software developed by Financial Solution Inc, of New Jersey, US.  Gordon believes that collecting more detailed data about customers - how people use their bank accounts, on-line bill-pay services, debit cards and credit cards - will make predictions of customer default more accurate than those provided by FiFind. Much of the required data could be collected from Finance-IT software already established in banks and over the last year half the Finance-IT computer engineers have been mapping out where these disparate pieces of data can be found. Gordon intends to hire mathematicians and data administrators to design algorithms that draw information from such data.

He has asked Valerie to produce a report using some projected figures to show the minority shareholders how investment in software development could result in increased profits despite the current economic downturn. Valerie has asked you to start work on this.


Related Discussions:- Customer credit-rating software

What are attributes, What are Attributes?  Attributes are declarative ...

What are Attributes?  Attributes are declarative tags in code that insert additional metadata into an assembly. There exist two types of attributes in the .NET Framework: Pred

Define the system users, Q. Define the System users? System users are d...

Q. Define the System users? System users are defined as the people who employ information systems or who are affected by information system on a regular basis i.e. validating,

How to select valid lines for secondary list, How to select valid lines for...

How to select valid lines for secondary list? To stop the user from selecting invalid lines, ABAP/4 offers various possibilities.  At the end of the processing block END-OF-SEL

Define security protocols used for e-commerce applications, Define various ...

Define various security protocols used for e-commerce applications. The e-commerce systems of today are composed of very many components as like: a commerce server, client soft

What are the update types possible, What are the update types possible? ...

What are the update types possible? The following update types are possible: Update type A: The matchcode data is updated asynchronously to database changes. Update

Illustrate what is a crest, Q. Illustrate what is a crest? Answer:- ...

Q. Illustrate what is a crest? Answer:- In electromagnetic waves or else ocean waves for that matter a crest is the peak or maximum height of the waveforms. A channel is t

Produce an analysis model of the proposed system, Question: Read the fo...

Question: Read the following case study and answer the questions based on it. The local airline company needs to develop a system for controlling air traffic at the airport

Form an 8 bit adder using 2 four bit adder IC's 7483, How will you form an ...

How will you form an 8 bit adder using 2 four bit adder IC's 7483? Ans: 4 bit adder IC is IC 7483. This has two four bit data inputs and output carry, 4 bit data output carr

Functions to remove common walls, We must also be able to remove common wal...

We must also be able to remove common walls between two cells. Write the function removewalls that accepts two cells and removes the wall that is common between the two (hint: any

Determine the process of kernel, What are the events done by the Kernel aft...

What are the events done by the Kernel after a process is being swapped out from the main memory? When Kernel changes the process out of the primary memory, it performs the fol

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd