Category Archives: Uncategorized

?-Funds™

One of the more popular groups of products in the new world of financial services is leveraged index products.  These products offer investors the unique opportunity to achieve leveraged returns on diversified portfolios of assets without running the risk of margin calls.  But, almost all current product offerings suffer from a pernicious problem:  their value declines in volatile markets, regardless of the whether the market trend is up, down, or sideways.  This includes mutual funds, Exchange Traded Funds (ETFs), Exchanged Traded Notes (ETNs), closed-end funds, hedge funds, and private wealth funds.  Regardless of the implementation, most current alternatives typically suffer from tracking error because of  “path dependence.”

?-Funds™ solves this problem.  ?-Funds™offer the benefits of leveraged returns on index products (e.g., S&P 500, gold price, treasury bill rates) that are path “independent.”  A ?-Fundinvestment can be held over unlimited lengths of time without incurring a tracking error penalty.

?-Funds are a patented technology that fund sponsors can offer to their clients that provide predictable results — regardless of the path of the market.  And because they are patented, fund sponsors can attain product exclusivity in their particular market.

A detailed description of ?-Funds can be found here.

 

 

Security, Privacy & Identity

Security, Privacy and Identity are all under increasing attack as the world becomes a more connected place.  The internet has galvanized massive changes in the way people, enterprises, and information interact, unleashing an explosion of benefits to all parties.  But this explosion has a dark side.  It enables fraud and espionage on a scale undreamed of thirty years ago, exposing our private lives, and compromising our fundamental identities.

Secure Identity Consulting (a division of Rocky Mountain Technical Marketing, Inc.) provides a wide range of services relating to information security, privacy, and identity.  Our experience includes:

  • Managing the design of security solutions for remediating Advanced Persistent Threats (APTs) infecting global enterprises.
  • Developing multi-level security systems to support both classified and unclassified material.
  • Conceiving the original trust framework meta-model.
  • Designing user-centric solutions for the transfer of Personally Identifiable Information (PII) among third parties.

Secure Identity Consulting services include the following:

Security

Security Policy Development
Security Process & Procedures Development
Security Process Validation
Security Compliance Reviews
Advanced Persistent Threat (APT) Remediation Strategy
Continuing Operations (COOP)/Disaster Recovery Strategy
Continuing Operations (COOP) /Disaster Recovery Process Development/Testing

Privacy

Privacy Policy Development
Privacy Process & Procedures Development
Privacy Process Validation
Privacy Compliance Reviews
Implementation
Secure transfer of Personally Identifiable Information (PII)

Identity and Access Management (IAM)

IAM Strategy Development
IAM Implementation and Process Guidance
IAM Federation Planning

Trust Frameworks

Trust Framework architecture
Trust Framework development
Trust Framework meta-model specification

US Government HSPD-12 compliant credentialing systems

HSPD-12 Solution Design
HSPD-12 Policy Development
HSPD-12 Process & Procedures Development
HSPD-12 Certification & Accreditation Support

 Disaster Collaboration and Communications

Secure Identity Consulting develops solutions to support collaboration and communications in remote areas suffering from either Natural   Disasters or Political/Military Conflicts.  Our solutions provide secure local collaboration via cell phone and wireless LAN, with uplink capabilities to either local infrastructure (if it is secure) or secure satellite link.  The low-power systems include their own power options when local power is not available.  They are portable and low-profile to minimize discovery by adversaries.

 Remote Communications/Collaboration Concept of Operations (CONOPS) Development
 Remote Communications/Collaboration Platform Development

Bulk Contract Evaluator

Law firms – especially those with an active merger and acquisition practice – frequently find themselves tasked with analyzing large number of similar documents looking for critical information.  When a retailer client purchases a competitor, they may inherit hundreds or thousands of new leases.  Which ones are about to expire?  Which ones are non-standard?  Which ones have a particular term or condition?

Rocky Mountain Technical Marketing, Inc. (RMTM) has developed a solution to evaluating large number of contracts to discover salient characteristics of interest to the client.  In the lease example cited above, the bulk contract evaluator can rapidly review each lease and classify those leases set to terminate within 60 days, those that have standard terms (e.g., triple net), those over/under a particular size range, etc., saving hundreds of hours of expensive attorney time.  The same approach can be applied to a wide array of documents of a similar type, such as service contracts, non-disclosure agreements, powers of attorney.