All posts by Ishfaq Ahmad

Bulk Contract Evaluator

Bulk contract evaluator automates analysis of contracts, such as lease abstraction, saving hours of legal time.

Law firms — especially those with an active merger and acquisition practice — frequently find themselves tasked with analyzing large number of similar documents looking for critical information.  When a retailer client purchases a competitor, they may inherit hundreds or thousands of new leases.  Which ones are about to come due?  Which ones are non-standard?  Which ones have a particular term or condition?

Rocky Mountain Technical Marketing, Inc. (RMTM) has developed a solution to evaluating large number of contracts to discover salient characteristics of interest to the client.  In the lease example cited above, the bulk contract analyzer can rapidly review each lease and classify those leases set to terminate within 60 days, those that have standard terms (e.g., triple net), those over/under a particular size range, etc., saving hundreds of hours of expensive attorney time.  The same approach can be applied to a wide array of documents of a similar type, such as service contracts, non-disclosure agreements, powers of attorney.

Privacy Policy Analyzer

Privacy policy analyzer alerts users to violations of their personal acceptability criteria.

Are you customers frustrated by being frequently asked to agree to web-site terms of use and privacy policies that they don’t have the patience to read, the expertise to understand, or the ability to change?

Rocky Mountain Technical Marketing, Inc. (RMTM) has developed a privacy policy analyzer that leverages artificial intelligence to compare a vendor privacy policy (or web-site terms-of-use contract) to a user’s acceptability criteria and highlight the exceptions.

RMTM offers the privacy policy analyzer as a value-added feature to be added to existing products or services, such as end-point security software publishers or internet service providers (ISPs),  to address their customer’s concerns about how their personal information is being exploited.  Including the tool in a present product or service offering offers unique differentiation from competitors in fields where differentiation is hard to find.

Custom Solutions

Rocky Mountain Technical Marketing, Inc. (RMTM) routinely develops creative solutions to difficult problems.  We can develop out-of-the box solutions to your difficult problems, as well.

Among the products we have developed are the following:

  • We managed the design effort to develop a fully automated, portable robotic factory for demilitarizing every weapon in the US chemical arsenal without human intervention.  Weapons ranged from small arms ammunition to airplane spray tanks.  The facility destroyed both explosive and chemical materials in environmentally sound ways.  The modular facility could be moved by freight car to different arsenals around the country.
  • We developed a solution to reduce IT deskside support costs by 30%, applying a technology originally developed for hard-disk backup.
  • We designed a solution to enable medical researchers to tap a wide range of medical records databases.  Our solution transparently (1) addresses the unique schema of each database, (2) maintains privacy of the individuals whose data is included and (3) adheres to the terms and conditions (including access fees) imposed by each database owner, and (4) complies with regulatory constraints such as HIPAA.
  • We conceived of an approach to get depressed patients to be more forthcoming about what they were experiencing on a daily basis through gamification.
  • We designed a self-powered, emergency communications solution for disaster areas (both natural and man-made) that allowed collaboration of resources in the area, as well as uplinks to global resources.  The portable network could be air-dropped into areas without power or communications infrastructure.  It included “stealth” capabilities to prevent adversaries from locating it or from using/compromising the network.  It could also leverage local power and communications infrastructure, if available.
  • We developed a technique to enable any blockchain to comply with the “Right To Be Forgotten/Right To Erasure” without compromising its immutability.

Let us design a solution for you.

Intellectual Property

Rocky Mountain Technical Marketing, Inc. (RMTM) has obtained patents on several technologies that may be of interest to innovators.

Current patents that are available for licensing include the following:

 

  • Methods and apparatus related to document processing based on a document type. (US 8,126,837 B2)

 

  • Methods and apparatus related to transmission of confidential information to a relying party (US 8,464,313)

 

  • Methods and apparatus for transacting with multiple domains based on a credential (US 8,549,589)

 

  • Methods and apparatus related to billing and accounting for assets that require more than two factors to establish asset value (US 8,296,214)

Business Process Management

Does your enterprise measure up to the competition?  Many enterprises do not even know how they measure up.  And discovering that there is room for improvement, they don’t know what is required to boost their efficiency and effectiveness.   Often, they don’t really know the details of how things are being done today – the baseline state upon which any subsequent improvement is likely to be built.  And once they decide on changes, how do they get the buy-in to ensure their effective implementation?

Rocky Mountain Technical Marketing, Inc. (RMTM) provides end-to-end business process support.  We assist clients develop processes that are implementable and sustainable and include the ongoing monitoring and management to measure their effectiveness.

RMTM business process management services include the following:

 

Process Design

 

Process Optimization

 

Process Automation

  • Business Process Management tool selection
  • Automation implementation

Software Package Selection

  • Map current business processes
  • Specify business process requirements that must be addressed by candidate packages
  • Provide gap analysis between business process requirements and candidate packages
  • Provide integration of business processes with selected package

Change Management

  • Organizational change management
  • Technical change management
  • Communications planning

Business Process Monitoring/Management

  • Create measurements to demonstrate success
  • Design management information system to facilitate management of business processes
  • Design-in continuous improvement feedback loop

Business Startup Support

Most new entrepreneurs who chose to start a business don’t know what they don’t know.  They have a brilliant idea for a product or service which fills a need in the marketplace.  They often have technical skills, but don’t appreciate the importance of management.  They don’t know how to raise capital.   They don’t appreciate the value of a business plan,  and they don’t know how to build one.  And they don’t know how to protect the intellectual property at the heart of their innovative approach.

Rocky Mountain Technical Marketing, Inc. (RMTM) provides startup businesses of all sizes with the targeted strategic discipline to raise financing and launch successful operations.  We have helped startups to raise hundreds of millions of dollars in first-round financing and developed business processes to effectively execute the business plan.

RMTM business startup support services include the following:

 

Business Plan Development

  • Build comprehensive business plans that demonstrate value and credibility to all prospective stakeholders (e.g., financiers, executives, board, staff, the press)

 

Intellectual Property (IP) Assessment

  • Evaluate client patents, trade secrets, copyrights to determine criticality to business
  • Conceive extended applications/markets for existing client IP
  • Assess competitive work-arounds that pose a threat to client IP

 

Intellectual Property Protection Strategy

  • Assist in design of IP protection strategy (e.g., legal protection, first-to-market) to exert/maintain competitive advantage

 

Implementation of programmatic discipline

  • Define key performance measurements
  • Define organizational requirements
  • Design business structure
  • Design high-level business processes
  • Design business process management strategy

Cross-Cultural Consulting

Cultural differences often create an invisible barrier to effective execution. Whether the differences are international or merely inter-departmental, the clash of cultures can impair the ability of an enterprise to succeed. What’s worse, they often go unrecognized. An enterprise opening up a new office in another country discovers that its operations are not achieving expected results. They are using processes that they have used successfully for decades at home and never question their effectiveness in the new culture. Instead, they treat the symptoms by blaming the manager. After changing management a few times, they then withdraw altogether. They may never recognize that the underlying cause of the symptoms was a cultural difference that impaired the effectiveness of their proven process.

In other situations, the failure of the IT department to acknowledge the need for flexibility of an operating department causes the operating group to create their own solution. The new solution is not only inefficient from an enterprise perspective, but presents various security vulnerabilities which lead to exploitation by an adversary.

Rocky Mountain Technical Marketing, Inc. (RMTM) provides consulting to identity and resolve business process failures resulting from cultural differences. Cultural differences include national and regional differences, but also include behavior barriers that typically arise between departmental cultures (e.g., sales, accounting, or human resources) or among different generations of employees.

We work with clients to identify these often-hidden barriers that compromise the effectiveness of business processes that commonly overlook the friction created when processes cross cultural boundaries.

RMTM cross-cultural consulting includes the following:

 

International Operations Optimization

  • Identify the reasons that proven processes fail when exported to other national/regional markets
  • Modify processes to account for cultural differences
  • Create communications plan to address cultural barriers
  • Manage organizational change to resolve cultural differences

 

Inter-departmental Facilitation

  • Identify the reasons that processes that cross departmental barriers fail
  • Devise solutions to overcome barriers
  • Create communications plan to address cultural barriers
  • Manage organizational change to resolve cultural differences

 

Trans-generational Facilitation

  • Facilitate understanding of unique values and motivators among different generations
  • Create communications plan to address cultural barriers
  • Develop management metrics that reflect effective motivators
  • Manage organizational change to resolve cultural differences

Government Business Capture

The US federal government is the largest purchaser of goods and services in the world.  The sheer size of its purchases tantalizes most any businessman.  But selling to the government is not the same as selling to other businesses.  To the uninitiated, this market is a vast wilderness of unique procurement regulations and arcane processes.  Crossing this wilderness alone may take years.  Finding the shortcuts through this wilderness demands a experienced guide with a map, a compass, and the knowledge of how to use them.  Even the largest federal contractors with decades of experience utilize outside guides to help them find the best path through.

Rocky Mountain Technical Marketing, Inc. (RMTM) provides comprehensive business capture support with decades of experience focused on federal business capture.  Our lengthy experience includes both Defense and Civilian agencies, as well as state-government and commercial opportunities – many valued in the hundreds of millions of dollars.  We support both contract and grant opportunities.

RMTM business capture services include the following:

 

Capture Strategy

  • Work with executive management to assess and prioritize opportunities, devise customer communication plans to cultivate relationships and influence specifications, vet solution concepts, and demonstrate credibility
  • Work closely with capture managers, business development personnel and business unit leads to develop bid strategy, themes and discriminators, with the creative ability to thread solutions into a compelling proposal that will win
  • Assist in identifying teaming opportunities and evaluating prospective teaming partners
  • Provide in-depth understanding of the federal procurement cycle and commercial-sector sales cycle and the implications for capture, marketing, and proposal preparation
  • Provide the initiative, organization, stamina, attention to detail, flexibility, and ability to forecast resource requirements to produce winning proposals

 

Proposal Management

  • Ensure that proposal submissions comply with the applicable RFP instructions and delivered on time
  • Work with proposal team and sponsoring executive to determine author assignments and with the sponsor’s Business Development Manager to integrate win strategy, themes and discriminators into proposal
  • Manage/coordinate/support the schedule, proposal content, and strategy
  • Provide leadership, insight, and guidance to authors on content and graphics development, and ensures proposal is ready for scheduled reviews and final delivery
  • Facilitate multi-organizational teams in planning, storyboarding and developing an effective customer-focused proposal
  • Identify and escalate issues
  • Serve as authors/editors as needed
  • Provide production and quality controls
  • Manage matrixed team of Subject-Matter Experts (SMEs) and authors from business units and teammates

 

 Proposal writing

  • Leverage client Subject-Matter Experts (SMEs) to compose RFP responses targeted at customer evaluation criteria to maximize proposal score
  • Define supporting graphics to make the story easily understandable to customer evaluators

 

Technical solution management

  • Guide client SMEs in developing technical solutions that resonate with customer
  • Capabilities across a wide range of technologies

 

Security-cleared resources

  • Top secret cleared resources available
  • Secret cleared resources available

Internet of Things (IoT)

The Internet of Things (IoT) captures the imagination with its potential to make out lives easier and extend our abilities to do things that we cannot achieve on our own, such as:

  • Home Management systems offer the ability to manage utility usage, security systems, irrigation systems remotely from a convenient control panel on a  computer or mobile device.  If you have a friend arriving from out-of-town before you get home, you can turn off your security system to let him in or provide him with a one-time pass code to keep him from setting off alarms.  “Smart” heating and air conditioning systems can learn your habits in order to reduce your utility bills without reducing your comfort.
  • Wearable systems can monitor your health and fitness and report it to your computer to track your progress and recommend activity levels to improve/maintain your fitness.
  • Industrial control systems can optimize complex processes (e.g., coordinating production, minimizing the cost of electricity production and distribution, minimizing pollutant generation).

Exploiting this promise will also expose a wide array of new and existing security and privacy vulnerabilities that could stifle this explosive market.

Rocky Mountain Technical Marketing, Inc. (RMTM) provides thought leadership in this nascent market to assist device makers in product targeting and selection, designing products — including the applications to support them, incorporating both security and Privacy by Design (PbD) into devices and their supporting applications, as well as assisting in the development of international standards for interfaces, protocols, security, and privacy.

RMTM IoT services include the following:

 

Product Development

  • Develop market segment and expertise targeting criteria
  • Develop product feature selection criteria
  • Determine component sourcing strategy (make vs. buy)
  • Product functional design support
  • Incorporating Security and Privacy by Design

 

IoT Standards Development and Support

  • Advising on applicable standards
  • Interfacing with standards bodies and trade groups to influence nascent standards

 

 

 

Security, Privacy & Identity

Security, Privacy and Identity are all under increasing attack as the world becomes a more connected place.  The internet has galvanized massive changes in the way people, enterprises, and information interact, unleashing an explosion of benefits to all parties.  But this explosion has a dark side.  It enables fraud and espionage on a scale undreamed of thirty years ago, exposing our private lives, and compromising our fundamental identities.

Secure Identity Consulting (a division of Rocky Mountain Technical Marketing, Inc.) provides a wide range of services relating to information security, privacy, and identity.  Our experience includes:

  • Managing the design of security solutions for remediating Advanced Persistent Threats (APTs) infecting global enterprises.
  • Developing multi-level security systems to support both classified and unclassified material.
  • Conceiving the original trust framework meta-model.
  • Designing user-centric solutions for the transfer of Personally Identifiable Information (PII) among third parties.

Secure Identity Consulting services include the following:

 

Security

  • Security Policy Development
  • Security Process & Procedures Development
  • Security Process Validation
  • Security Compliance Reviews
  • Advanced Persistent Threat (APT) Remediation Strategy
  • Continuing Operations (COOP)/Disaster Recovery Strategy
  • Continuing Operations (COOP) /Disaster Recovery Process Development/Testing

 

Privacy

  • Privacy Policy Development
  • Privacy Process & Procedures Development
  • Privacy Process Validation
  • Privacy Compliance Reviews
  • Implementation
  • Secure transfer of Personally Identifiable Information (PII)

 

Identity and Access Management (IAM)

  • IAM Strategy Development
  • IAM Implementation and Process Guidance
  • IAM Federation Planning

 

Trust Frameworks

  • Trust Framework architecture
  • Trust Framework development
  • Trust Framework meta-model specification

 

US Government HSPD-12 compliant credentialing systems

  • HSPD-12 Solution Design
  • HSPD-12 Policy Development
  • HSPD-12 Process & Procedures Development
  • HSPD-12 Certification & Accreditation Support

 

Disaster Collaboration and Communications

Secure Identity Consulting develops solutions to support collaboration and communications in remote areas suffering from either Natural Disasters or Political/Military Conflicts.  Our solutions provide secure local collaboration via cell phone and wireless LAN, with uplink capabilities to either local infrastructure (if it is secure) or secure satellite link.  The low-power systems include their own power options when local power is not available.  They are portable and low-profile to minimize discovery by adversaries.

  • Remote Communications/Collaboration Concept of Operations (CONOPS) Development
  • Remote Communications/Collaboration Platform Development