data force team - harvard university · case 1: branding modification related to acquisition during...

26
Brand Secure Final Prepared By The Data Force Executive Summary

Upload: others

Post on 15-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Brand Secure

Final

Prepared By

The Data Force

Executive Summary

Page 2: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

1.1 Brand Secure - COTS Software

Brand Secure is a proposed commercial off-the-shelf (COTS) software platform that manages branding content throughout an enterprise and beyond. We recently had two large corporations come to us with an urgent need to fix a branding problem that has been resonating for years. We helped both of them in the past with data and software issues, and we have now reached the stage where we are ready to run a pilot before moving towards installation. This paper proposes how the product will work once it has been implemented.

1.2 Business Problem

Through mergers and acquisitions, new development, and repositioning, organizations need to update branding on an ongoing basis. Content throughout the enterprise, such as logos and trademarks, will need to be updated with the subsequent brand material (up to thousands of documents per year). Manually updating this content is a tedious, error prone, and costly process.

Medium to large companies process thousands of documents. These consist of in-house products as well as acquired products from software companies they have bought. Maintaining the branding for each solution has become extremely difficult and time-consuming as each product evolves. This problem compounds as the corporate brand also undergoes changes every few years.

To democratize the efforts, each product has a small marketing team that works with the appropriate sales group to help provide materials. Many of the sales groups also help to create and maintain their own material. With so many brand contributors within the company, there are many repositories that contain branded materials. Any provided solution needs to account for this distributed data storage.

The outcome: branding that is not confluent throughout the organization. Incorrect branding creates many issues, such as the following:

● Undermines brand awareness with partners, clients, and consumers ● Brand confusion within the same groups ● Costly (time-consuming and potential legal consequences)

1.3 Proposed Solution

Brand Secure takes on the burden of finding and correcting branding problems and thereby reduces workload and mistakes, and increases speed and efficiency.

The main feature set includes the following: ● Ability to identify and learn the current company and product branding ● Identifies which brands have been sunset and allows for ways to mark documents as

such ● Identify branding content throughout the enterprise in various content repositories ● Analysis of modern and most popular multiple file types ● Centralized information about brand assets ● Reporting for updates, discrepancies, and failures

Page 3: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Brand Secure allows for continual, near real-time monitoring of files for all of these issues, thereby allowing firms more time to focus on new branding and sales materials - ultimately improving the bottom line and viability of the company.

1.4 Program Cost and Duration

Brand Secure has an on-premise and cloud infrastructure. Cost is driven by usage, and unlimited brands and document repositories are provided. Organizations will be able to purchase the software for on-premise use or pay a subscription for our cloud services. The charges are determined by the amount of data filtered, parsed, and cleaned. The current charge is $20 per GB of data and/or a negotiated amount of usage per year.

Usage terms continue until the customer decides to re-define/terminate the contract based on its future needs. The usage has a large upfront cost because it has to assimilate and analyze all of the initial files, but this cost will drop dramatically in future months as the algorithm begins to pick up new and or updated files. All sunset files will be excluded after the initial analysis.

1.5 Business Benefits

Primary Benefit

● Dramatically improved time-to-market with new branding materials, improving sales cycles

Other Benefits

● Sales confidence in materials ● Reduced legal and compliance risks ● Reduction of administration time and error in managing brand in the large document

repositories ● Identification of sunset materials that could be offloaded to cheaper data storage and

make current processes and systems more efficient

1.6 Success Metrics (per 100 documents)

● 90% success rate in finding branding errors ● 55% reduction in time admins will spend on identifying and updating documents ● 65% reduction in duplication efforts and locating brand-specific files

1.7 Assumptions and Constraints

● Corporate can create accounts and push usage to the marketing/sales brand admins ● Brand secure internal document crawler has internet connectivity to cloud processing ● Document repositories can be configured and are reachable internally

Business Requirements Brand Secure facilitates an efficient process to reduce the business expense of updating documents through automation. The following key business objectives summarize Brand Secure’s function.

Page 4: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Key Business Objectives The key business objectives of Brand Secure are to:

● Reduce branding costs when ○ Acquiring new companies and converting brands ○ Modifying current brands

● Reduce time to update documents when ○ Acquiring new companies and converting brand ○ Changing/updating brands

● Identify and archive (sunset) obsolete brands to save storage cost ● Reduce human error by

○ Automating identification and brand updating ● Brand Compliance by

○ Reducing/eliminating brand inconsistencies ○ Intellectual property protection

● Manage other branding-related components, such as trademarks, through ○ Identifying out-of-date/obsolete trademarks ○ Automating content updates

Current Processes for Brand Management We have identified three business use cases that are prevalent across Brand Secure’s customer base: Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent branding (and branding-related trademark) information embedded in thousands of documents, marketing material, websites, and other content. However, these necessary changes often lag. For example, logos of both the purchased and acquiring company may co-exist on the same content. Slowly, the parent company logo may replace old logos, but it’s an unnecessarily slow process. Naturally, as these changes occur, existing content will be out of sync with the current brand, creating many branding inconsistencies and confusion and leading to a loss of time and money. The current process manually identifies documents that require modification, a tedious undertaking. For example, a document may contain a company logo in the header and trademarks, branding images or brand text referencing throughout the document. Manually identifying this information, in one document alone, can be a cumbersome undertaking. In addition to the time and money wasted, another side effect precipitates: errors. Errors can cost

Page 5: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

money in several ways - someone will have to take time to correct the error which costs roughly $20 per document. During a merger/acquisition, this type of error could infringe upon intellectual property rights. There is also the intangible value of losing business due to perceived unprofessionalism. Case 2: Brand Updating within an Organization Some organizations frequently change brands over time, and therefore those need to be updated. For example, a logo change results in a ripple effect where suddenly all content throughout an organization must now reflect these changes. Past examples of logo updates include: Pepsi, which has changed its logo 16 times, Coca-cola - 12 times, and McDonalds - 10 times.

Case 3: Compliance Some organizations need to comply with federal, state and other regulatory standards. Sometimes, organizations fail to follow these compliance standards, leading to serious consequences, including revocation of funding, etc. For example, in 1999, Pfizer was fined $143 million for intentionally using another company’s trademark. In 2008, Payless ShoeSource had to pay $305 million to Adidas for trademark infringement.

Page 6: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

The aforementioned cases present the current process of manually changing and updating branding material and ensuring that all entities comply with regulations are tedious processes that are resource-expensive and facilitate environments subject to human error. As a result, many organizations will simply ignore the matter as they can’t justify the time and cost to keep branding in sync, despite potential non-compliance issues. Proposed New Process The new process will change the manual and error prone process of managing branding changes to an automated system that manages these changes. Companies need automation to efficiently manage branding content and to reduce time and costs. This automation will provide key features to assist in managing brands. These features include the following capabilities:

● Identify outdated logos and trademarks ● Locate old branding information, product names, and other branding-related content

within unstructured text ● Make automatic, global changes to content that is identified with old branding ● Identify duplicate content ● Allow access and management of the content regardless of where it physically exists

Required Features

● Discovery ○ Allow connecting to any datasource/content repository within the organization

Page 7: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

● Extraction ○ Allow reading the content from each item within the data source

● Analysis ○ Perform analysis of the content to identify characteristics by analyzing images

and text ● Identification

○ Tag the content with certain characteristics (old brand, new brand, etc) ○ Ranking of importance by document type (forms, contracts)

● Search ○ Allow easily finding documents matching those characteristics

● Process ○ Automatically update batches of content ○ Archive outdated/obsolete content ○ Remove duplicated content

● Access ○ Allow an easy way to access the content without having to use different tools

(like Sharepoint or Documentum) to read/update ● Analytics

○ Visualizations providing statistics around: ■ Items with old branding (count) ■ Items with new branding (count) ■ Items automatically updated ■ Items requiring manual intervention ■ Errors/anomalies occurring during automatic updates

● Auditing ○ Provide a running list of changes and thereby providing transparency for

management or clients to view the evolution of each document

Financials The following cases show the current cost associated with manual management of branding and the cost of using a tool to automate. It will also discuss hidden branding data costs of manual management. Financial Justification

Page 8: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

The table below depicts different scenarios with existing costs for manual management of branding content. The assumption is that finding, scanning, and updating a document can take an average of 1 hour. Accessing multiple repositories within an organization can extend this time as it adds complexity to knowing how to use the software for each repository. Case 1: Company ABC acquires Company XYZ and obtains 100,000 documents Case 2: Coca Cola changes their brand for the 17th time

Case Documents AverageTimeFinding/AccessingDocument(minutes)

AverageTimePerDocument(minutes)

TotalHours HourlyRate

Cost

1 100,000 30 30 100,000 20 $2,000,000

2 500,000 30 30 500,000 20 $10,000,000

This table represents the current costs and time related to brand modification. In Case 2 above, assuming a 40 hour work week, it would take 240 people focused solely on this task for one whole year to complete this process. Even within this time frame, a company may change brands or acquire another company. Consider the time cost below:

Case TotalHours AverageHoursPerYear/Worker

Workers(FullTime)

TotalTime

1 100,000 2000 50 1Year

2 500,000 2000 50 5Years

Brand Secure Costs Brand Secure saves a considerable amount of time by quickly identifying those documents that need attention. The time associated with finding/accessing documents is reduced from minutes to seconds. It also identifies where branding information is located within the document, eliminating the need to manually scan the document.

Case Docs AverageTime AverageTime Total Hourly Cost Purchase TotalSavings

Page 9: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Finding/AccessingDocument(seconds)

PerDocument(seconds)

Hours Rate

1 100,000 30 30 1600 20 $32,000 $1,000,000 $968,000

2 500,000 30 30 8300 20 $166,000 $1,000,000 $8,834,000

Brand Secure considerably cuts time-related costs, offering realistic timelines to update branding content. The timelines below now offer what previously could not be achieved:

Case TotalHours AverageHoursPerYear/Worker

Workers(FullTime)

TotalTime

1 1600 2000 4 ~4Weeks

2 8300 2000 4 ~6Months

Financial Benefit The scenarios above show a significant reduction in time, leading to enormous cost savings and providing a realistic timeline to complete branding updates throughout the entire organization. Business Benefits

● Reduce branding costs ● Reduce time to update documents with new branding ● Identify and archive obsolete brands (sunsetting) to save storage cost ● Reducing human error ● Improve regulatory compliance ● Efficiently manage trademark

Technology Overview Using Brand Secure’s technology, content throughout the organization can be discovered then indexed, similar to the process of a library or a bookstore where the content is identified and organized in such a way that users can easily find content with specific characteristics. Not only can content be discovered throughout the enterprise, but it can also be opened and read from within the portal, allowing the identification of images (logos), trademarks, taglines and descriptive text (and other branding material). Once identified according to type of branding, tagging allows it to be categorized. This tagging/categorization allows ease of finding

Page 10: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

this content later. Tagging can reveal other characteristics, such as if the document can automatically have the old brand replaced vs. needing manual intervention. Once the content has been discovered and tagged, users can easily find these documents through a standard user interface, similar to how they find clothing or other material on an eCommerce site (like Amazon). When documents are found, the interface also allows processing of the documents. Those identified/tagged as having characteristics that allow automatic updates can be added to a “cart”, similar to eCommerce sites. Once in the cart, the user can run tasks against the items, such as: update logos, update trademarks, or update text. The software can also identify obsolete or duplicated content and tag it as such, and provide processing tasks to delete or archive that content. The software provides an easy way to access the source content, regardless of its current location: Sharepoint, AWS S3, File server, etc. It can then be accessed, updated and saved back to the original repository without having to go to the source repository user interface to do so. It offers a common user interface, capable of managing content without requiring the user to know which underlying repository the content is located in. If the user does want to know where the content is stored, this information can be provided. The system includes role based access management, allowing different groups to read, update, delete, or otherwise manage documents. Overview of Features Brand Secure provides many features to efficiently manage branding content throughout the enterprise and beyond. Those features include:

● Discovery ○ Connecting to any datasource/content repository within the organization

● Extraction ○ Reading the content from each item within the data source

● Analysis ○ Analyzing content to identify characteristics in images and text

● Identification

Page 11: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

○ Tagging content with certain characteristics (old brand, new brand, etc) ■ The modules used in the tagging system are configurable and the main 4

modules and their technical details are discussed more in the pipeline section later in this document.

○ Categorization and ranking of content based on its importance to the organization. Importance will be defined in the system configuration based on document type (for example, legal contracts would be considered more important)

● Search

○ Easily finding documents matching the characteristics that are tagged during identification

● Process

○ Automatically updating batches of content ○ Archiving outdated/obsolete content ○ Removing duplicated content ○ Capturing historical data/versions so changed content so it can later be audited

● Access

○ Easy access to content without having to use different tools (like Sharepoint or Documentum) to read/update

● Summary Snapshots ○ Visualizations providing statistics around:

■ Items with old branding (count) ■ Items with new branding (count)

Page 12: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

■ Items automatically updated ■ Items requiring manual intervention ■ Errors/anomalies occurring during automatic update

Technology Features in Depth Discovery Brand Secure provides the capability to connect to the most popular repositories in use today, including relational databases such as Oracle or SQL Server. Additionally, Brand Secure can connect to web services and discover content outside of traditional repositories, along with the ability to crawl websites/webpages to identify content within markup such as HTML. For those content repositories that aren’t supported out of the box, Brand Secure provides the ability to create custom repository connectors and easily drop them in as add ins. These custom connectors can be written in various popular languages such as Java, Python, JavaScript, and C#, just to name a few. There are also open source custom connectors maintained by the community that readily available.

Brand Secure - Adding Content Repositories

Extraction Once identified, the content then requires extraction. Reading the content is a required process for analyzing branding information. Brand Secure provides extractors to handle the most common file formats: PDF, DOCX, PPTX, PAGES, JPEG, PNG, etc. For those formats that aren’t supported out of the box, Brand Secure provides the ability to create custom extractors. Like connectors, custom extractors can be easily dropped in and can be developed with various popular programming languages. Additionally, open source custom extractors are available from the community.

Page 13: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Brand Secure - Content Extractors

Summary Snapshots After discovery and during extraction, the content can be viewed as snapshots through dashboards. Brand Secure allows one to view snapshot summaries of the stages throughout the extraction process, from pre-extraction, extraction, to post-extraction. This provides the flexibility to choose the most practical time to oversee the content for a more efficient extraction process. During these stages, snapshots capture the series of steps. These steps are run through what is called the Pipeline. The Pipeline The pipeline is where the data flows from extracting the raw source data to a NoSql database where Brand Secure places the content text, images, metadata, performs tagging and also allows storage of other information. This store of data is then used for search and analysis. The pipeline allows a series of steps to be added that are executed as the data flows through the “Pipe”. These allow reading, writing, and enrichment of data as it is streamed from the source data into the Brand Secure data store. Brand Secure provides many pipeline steps out of the box that handle common use cases. See the Identification section below for more details on those pipeline steps. It also provides the ability to easily drop in custom pipeline steps. These custom pipeline steps can be written in various popular programming languages including Java, JavaScript, Python, and C#, to name a few. Pipelines are chosen by the client. Some of the pipelines will have a setup project that will be completed during the initial implementation. These typically consist of training the machine learning pipelines with a default baseline. During implementation, there will also be the initial software configuration such as file repository locations and access credentials, supported file types, % error to allow for auto updates. These can always be changed later if needed.

Page 14: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Brand Secure - Example Pipeline

Identification Brand Secure uses custom pipeline modules to identify the elements that are important to manage. As the data is extracted, these pipeline modules analyze the content. The modules using Machine Learning along with different sets of algorithms to identify images and text, then tag the items as they are stored in the Brand Secure data lake. Tagging provides a way to easily identify items later with characteristics such as “old brand”, “not compliant”, or “duplicate”. These tags can also be ranked to later show items by relevance. Default Pipeline Modules Module 1: Identify Branding Conflicts This pipeline step uses machine learning to “understand” the brand and looks for specific branding issues, such as colors, logos, themes, taglines, etc. Determining the brand and how to process is a two-step process. There are two Machine Learning networks running per brand type. One will be for all brand images discovered (new and old) in addition to one for only the current brand.

As images pass through the system, they run through the all brand ML network first to get a read on whether it is a brand image. If it passes with a configured percentage, it will run through a second pass to determine if it is current.

An optional configuration allows for specific ML networks to be setup for versions of each archived brand.

For the image analysis, we will create a classification per brand using a Siamese network running on TensorFlow and Keras. These frameworks work together, are both open source and have a large developer network.

Page 15: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Depending on the number of brand images that are available to train, the system will determine the exact configuration of these networks.

If there is a low number (down to only one) of images to train the system, then we will create a “One Shot Learning” configuration to determine branding matches.

If there are more images available for training, we use them in a standard Siamese network configuration to improve the validity of the final output score.

Module 2: Identify Trademark Conflicts This pipeline step uses a proprietary algorithm to search specific items identified in the first pipeline step to make sure that the proper trademarks are inserted into the documents. This uses a standard Siamese network with the same configuration of TensorFlow and Keras but specifically trained to look for the TM symbol in the images. It also includes a localization algorithm for feedback on the location of the TM symbol. Module 3: Identify Duplicate Content This pipeline step uses a proprietary text comparison algorithm along with an MD5 hash to compare files and sections of documents to find duplicate content. Search After extraction is complete, data can be searched, summarized through snapshots, and processed. Brand Secure provides the ability to customize the Search user interface, with no coding required, to create a search experience tailored to many different use cases. Brand Secure creates a display showing the tagged fields in the search results, and also configures faceted filtering using those tags. This allows the user to narrow results down to just “old brand” items, or with a combination of tags.

Brand Secure - Search

Page 16: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Process Now that content can be easily identified through search, those items discovered can be processed. Brand Secure provides an eCommerce like approach where search results can be added to a cart. From the cart, the user can execute various processing tasks. Brand Secure provides many common processing tasks out of the box, or like the pipeline, custom tasks can easily be developed and dropped in. Brand Secure uses custom processing tasks to update Branding content. Based on identification, tags such as “Auto” identify content where an old brand can automatically be updated. The “Update Brand” task can be executed against these items and the content will be checked out from its original source repository, updated, and checked back in. The user doesn’t have to know where the content resides.

Brand Secure - Using the Cart to Update Branding Content

Processing Tasks As mentioned above, all content that has flowed through the pipeline can be placed into the cart. Once in the cart, the user can select Tasks to process the content. Brand Secure provides several default Tasks for fixing Branding content. One of the most popular tasks is highlighted below. Task: Report Branding Issues Identifies branding issues and provides an interactive report.

Page 17: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Branding Issues Interactive Report

Access For items that can’t be automatically processed, Brand Secure provides the ability to access the content. This content can be opened, manipulated, and saved back to its original repository without the user having to log in to the source content repository. In many organizations, there are multiple content repositories, using many different user interfaces, requiring the user to have to learn how to use each one, and in some cases supply different credentials for each repository. Brand Secure consolidates this into one simple common user interface for any repository. An admin maps credentials to the various repositories that need to be accessed.

Interface for Manual Intervention to Replace Branding Conflicts

This UI functionality creates a process flow for further training in the system. The images follow a process (see figure below) to allow the pipeline modules to continue learning and providing better results over time.

Page 18: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Brand Secure - Snapshot Summary

Security Brand Secure offers multiple levels of security. Users are required to have an account which may be setup manually or integrated with existing authentication solutions within the organization such as OAuth 2, SAML, or LDAP. Accessing content repositories require native credentials to access, which are encrypted. Brand Secure provides role based security to allow

Page 19: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

certain roles to read, write, or delete content. Finally, Brand Secure offers end to end encryption to protect confidential content.

Technical Summary Brand Secure provides key features that simplify and significantly reduce cost and time when managing branding content. These features include branding content discovery data sources, extraction of text and imaging from content, machine learning analysis to identify branding discrepancies, search to quickly find content with certain branding characteristics, processing for automatic synchronization of branding content, a simple common user interface for accessing and manipulating content, and analytics to visualize questions around branding. Implementation

Page 20: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Brand Secure will be available to customers on two platform versions: On-Premise and Cloud. Furthermore, each of these platforms can support either Windows or Linux. INSTALLATION Brand Secure can be installed on either Windows or Linux (RHEL, Ubuntu and Amazon Linux) operating systems. Native installers will be provided for each of the operating systems, and will be customized based on the platform which it will be deployed on. On-Premise Installation The on-premise solution will be available in the following configurations depending on the number of documents that are expected to be processed by the system:

Size NumberofDocuments

Numberofservers

CPU Memory Disk

Small <100,000 1 2-core,2.4GHz

16GB 5TB

Medium 100,000–1,000,000

1 4-core,3.6GHz

32GB 50TB

Large 1,000,000–50,000,000

1 6-core3.6GHz

64GB 500TB

Note: If document processing needs exceed 50 million documents, the server will be custom-built to meet the processing requirement. On-Cloud Installation The on-cloud solution will support the following configurations depending on the number of documents that are expected to be processed, as shown in the table below. All major cloud platforms will be supported (Amazon AWS, Google, Microsoft Azure, IBM, Oracle).

Size NumberofDocuments

InstancesType

CPU Memory Disk

Small <100,000 1 2-core,2.4GHz

16GB 5TB

Medium 100,000–1,000,000

1 4-core,3.6GHz

32GB 50TB

Large 1,000,000–50,000,000

1 6-core3.6GHz

64GB 500TB

Page 21: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Note: If processing needs exceed 50 million documents, the server will be customized to meet the processing requirement. Additional Cloud Considerations Brand Secure, as part of its installation packaging, will offer customers pre-loaded cloud images on all major cloud platforms. For example, on Amazon AWS infrastructure, AMI images will be provided for each of the configurations shown in the table above, which can be used to create the corresponding instance quickly and easily. In future versions of the product, Brand Secure will include distributed fog implementations where agents can be installed on the edge nodes near the data source to allow more efficient extraction and better performance. POST INSTALLATION Accounts Once installed, accounts must be configured. Brand Secure can be configured to integrate with existing authentication tools within the organization, such as OAUTH2, SAML and LDAP. For organizations not using a single signon tool, accounts can be set up and managed within Brand Secure. Roles After accounts are set up, users will need to be assigned to roles for permission-based access. Primary roles are: administrator, editor, and reader.

● Reader - can query, read content, and view charts ● Editor - control reader permissions, update content, and execute processing tasks ● Administrator - adds/removes repositories, adds users, sets user roles, manages

machine learning models, and has all permissions of both the reader and editor Machine Learning Training Models Since most organizations have proprietary branding content, training will be needed to accurately identify branding images and text within the enterprise. Training content, such as images and text, will be provided by the organization. Brand Secure will ingest this material and perform training prior to starting extraction. Training can be performed periodically if new brands are introduced or if accuracy needs improvement. SUPPORT

Page 22: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

The product installation and customization are designed to be intuitive and simple, but Data Force will have two support options for its customers in two levels:

� Gold

All Brand Secure customers will be offered a one year subscription to the Gold level of support which includes live telephone, email, and chat support and includes licensing for all products. Customers will have the option to renew annually.

� Platinum

Customers will have the option to purchase this premium support which includes live debugging and consultancy. Data Force Specialists will remotely access the customers’ systems and help them set up and customize the product and any debugging issues. Platinum customers can also be eligible for on-site support which will be priced on a case-by-case basis. This feature provides door-to-door service where Data Force specialists travel to customers to provide on-site installation, customization, and debugging. END USER TRAINING Most customers will need initial training to understand Brand Secure’s capabilities and use the product optimally. We will provide the following resources for customers:

� Comprehensive help documentation � Webinars/videos that provide demos of installation and customization � Training in machine learning with the customer's text/images � Online customer support community to address needs remotely � Custom professional help available to assist in training (*)

(*) This is included as part of the premium package at an additional cost. ROADMAP After developing the minimum viable product (MVP), and prior to the larger, full-scale release into the market, Data Force will identify two early adoption customers – one on-premise and one on-cloud customer - and run the early adoption phase for six months during which the development team will work in quick update cycles (4 weeks each) to update the MVP product with any bug fixes or needed critical feature. After that phase, the product will be rolled out into the larger customer base. An agile implementation plan will be followed, with a new release published every three months and includes new features and bug fixes. The first version of the product (MVP) will extract and process data from a smaller core set of the most popular document repositories (eg. SharePoint) and will provide a fully featured end-to-end implementation for that source system. Each new release will add one or more additional

Page 23: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

document repositories, fix bugs and add new features and enhancements, including custom pipelines and processing tasks

VersionNumber Rolloutdates Featuresincluded

(MVP) June1–December12019

End-to-endfunctionalityavailablewithacore/limitedsetofsource:

� Discovery - connect to a core/minimal set of source content repositories

� Extraction - read text/images/metadata from source content

� Analysis and Identification - identify branding from extracted content and tagging

� Search - locate by identified tags� Processing - update branding content� Access to source data - open/update

source content� Analytics – basic report branding

status/issues

Hardeningphase(versions1.0–1.X)

January12020–July12020

BugfixestomaketheMVPversionsolid.

Version2–N Workin3monthincrements(July1–Oct12020,Oct–Dec2020,etc.)

Eachreleasewilladdanewtypeofdocumentsourceandimplementfeaturesandenhancementsbasedoncustomerfeedback.

Validation During the validation process, the following key metrics will be measured to gauge the efficacy of the product and identify issues proactively: Success rate in finding branding errors Brand Secure has established a target 90% success rate for finding branding issues. A percentage of the documents will be randomly sampled and validated through alternate mechanisms (including manual review) to evaluate whether branding issues have been correctly identified. If a higher error rate is found, this will provide valuable feedback to the development team to identify and remediate bugs.

Page 24: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

Reduction in time admins will spend on identifying and updating documents Brand Secure has set a target of 55% for reduction in time for admins to identify and update documents. During the implementation, with a control team and a test team of admins – a control team using the older (manual) process and the test team using Brand Secure, will compare the productivity to confirm that the latter team is at least 20% more productive. Reduction in duplication of efforts and locating brand specific files Brand Secure has set a target of 65% for reduction in duplication of efforts and locating brand specific files. Again, during the implementation, we will identify a control team and a test team of admins – a control team using the older (manual) process and the test team using Brand Secure and compare their performance to confirm that the latter team is at least 10% faster in identifying brand specific files. Risks The following risks and remediations have been identified during initial stages of the project:

Risk Description/PossibleRemediation

Falsepositives/Falsenegatives Duringtheinitialstages,itislikelythatwewillencounterfalsepositivesandfalsenegatives.Thesewillbeidentifiedduringthevalidationsteps

Page 25: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent

outlinedaboveandserveasinputtothedevelopmentteamforremediation.Itisexpectedthatovertime,thenumberofsuchfalseidentificationswillsignificantlydecrease

SystemPerformance During the initial stages of the project, we may encounter system performance issues especially while processing massive document volumes. The system configuration will be adjusted as needed. Both the on-site and on-cloud offerings are based on a linearly scalable architecture and should be able to scale up easily to address performance issues

Sprint schedule The schedule proposed in the roadmap with 3-month sprints is somewhat aggressive. We will monitor the initial progress and make adjustments as needed (for example changing the sprint duration).

Budge At the end of each sprint we will assess the viability of the budget and make adjustments accordingly.

Communication Communication with all stakeholders is essential. We plan to minimize the risk of any miscommunication by providing complete end-to-end transparency through summary snapshots and an open door policy to view the project at any time

Acceptance The idea of doing sprints is that if we are off base in any way we can quickly get back on track towards our appropriate target. All stakeholders will give the approval at each stage to ensure we are all the right path. We will take immediate steps to remediate any mishap or feature that does not correctly align with stakeholders

Summary The Brand Secure solution allows for continual, near real-time brand updating through automation, thereby reducing resource expenses and allowing clients more time to focus on other facets of their business. Brand secure dramatically improves time-to-market with new branding materials and improves sales cycles. After an initial purchase, Brand Secure’s proposal of automation replaces the current manual process, yielding a long-term savings of nearly $2,000,000 and months of labor time for every 100,000 documents. Organizations no longer have to be burdened with a process that is labor-intensive, costly, and error-prone. Brand Secure provides the solution to any company’s brand updating terms.

Page 26: Data Force Team - Harvard University · Case 1: Branding Modification Related to Acquisition During an acquisition, the purchasing company inherits and must overwrite the subsequent