MORS Software Wins the Risk Technology Awards 2018

MORS has been awarded as “Bank ALM System of the year 2018” in the risk technology award. This software is a highly scalable solution that encounters a very large portion of ALM requirements in the banking sector. MORS is intentional for ease of use and cost efficiency along with a high level of computerization with low upkeep says, Roger Samara.

Moreover, the system offers suppleness of configuration and reporting. In fact, a single core system supports a set of operational modules, like balance-sheet administration, liquidity risk management, funds transfer pricing and counterparty credit risk etc. Actually, data management and appeasement are generally automated.

MORS imports data changes as they befall rather than importing the whole balance sheet at once. For wholesale banking dealings, like wholesale funding transactions, balance-sheet items are introducible in real time to have a substantial effect on the calculation results of key performance indicators, such as net interest income. Banking book dealings are usually introducible once or twice per day. Splitting the import as well as the frequency of data in this way evades load bottlenecks emphasis, Roger Samara.

Features of MORS software

MORS’ real-time competences empower users to encounter internal and regulatory requirements for ad hoc and immediate what-if calculations. It also means the system can offer real-time monitoring and supervision of limit and early-warning levels, usually for interest rate risk and liquidness risk management ratios.

In order to meet growing demand for interior and external controlling reporting, MORS’ offer rule engines. Using these engines the banks can define norms for new regulatory necessities and then run reports on their basis without upgrading the MORS software. The same rule engines are used for defining interior reporting needs and configuring calculations.

MORS presently added its Interest Rate Risk Scenario Engine. This makes it easy and fast for banks to complete sophisticated and challenging ALM calculations. The calculations include income-based calculations like earnings-at-risk and value-based calculations like economic value of equity. Along with this, the engine allows banks to do dynamic balance-sheet projections, including dynamic balance-sheet evolution settings. Plus, MORS recently introduces progressive parallel processing competencies and the choice to deploy on Microsoft’s Azure cloud said, Roger Samara.

Let’s find out what Mika Mustakallio — chief executive of MORS Software says

According to him, MORS Software is the best Nordic solution provider for capital management, liquidity risk supervision and ALM in banks. It is based on intellectual and influential in-memory analytics. And offer real-time scrutiny and reporting throughout the entire bank, assimilating both capital and banking book sides of the bank.

Financial institutions use MORS in order to monitor, manage and optimize their performance and risk levels within exterior and interior constraints. The supple configurability of MORS software facilitates the informal alteration to any controlling necessities and other metrics. This software meets patrons’ ALM requirements by providing a modern and user-friendly solution. MORS scales from fulfilling particular ALM requirements of Tier 1 banks to the joint treasury and ALM requirements of smaller banks.

Banks emphasis on the overall cost of ownership means they are progressively looking to maximize the profit from any system. This is when the value of MORS is completely understandable, with its cohesive treasury and ALM system able to shelter numerous risks.

Bottom Lines

The factor that presently driving alteration is the emphasis on user-friendly and flexible systems. Customers do not have time to regularly make software upgrades and improvements. And they need the aptitude to make variations to an ALM system. A lack of litheness in a system can delay firms’ replies to ad-hoc queries and capabilities to meet changing necessities. It is progressively comprehensible that ALM experts will need the aptitude to calculate five diverse rules rather than four.

The ability to monitor everything in real time makes businesses agile. And from a risk administration perspective, it is essential considering the loss of revenue-producing breaks akin with holding needlessly high buffers. By vigorously handling risk in real time, companies can make better-informed choices.

MORS Software offers a complete asset-liability management (ALM) system that is scalable, as well as user-friendly, says, Roger Samara. The software has won the reward for ALM system of the year following a current move to the cloud and preserving focus on providing clients capabilities for real-time monitoring. Chief executive Mika Mustakallio elucidates the essential trends and technological offerings above that the vendor sees as driving change.

Originally Posted:


Why it is Unproductive to Request Unhackable Technology

We have seen ample of technologies in past few years and even many more are coming on the way. These mouthwatering technologies have changed the way we live or work says Roger Samara.

For instance, drone introduction is looking to disturb local distributions. Biometric technology could make identity verification and individual security far more progressive and reliable. Furthermore, self-driving cars could alter the way people commute. Of course, in a few years, our homes might be jam-packed with smart devices meant to automate as well as simplify the lives.

But along the way, customers and even business persons are obstructing the path toward development by highlighting the dreads they have of these technologies intrinsic vulnerabilities. However, it’s counterproductive to use these vulnerabilities as points of dispute against the validity of the technology or as hindrances to stop these technologies from becoming more accessible to patrons.

Unhackable Technology

Why it’s unproductive to demand perfection

In reality, it’s bad to request hack-proof technology? After all, voicing a concern shouldn’t be low if it means producing a better technology highlights Roger Samara – a computer savvy. In fact, there are some issues with making these demands including:

•    Limiting Interest in Innovation

Pushing for innovative standards makes it less tempting to invest in the latest technology. Actually, it will take more time and money to invest in a product before you can start selling it. Also, there is no assurance you will get to a point that will content customers as well as policymakers. Fact is, some companies like Amazon will likely continue to follow novel technology no matter what kind of opposition they face.

•    Putting the Burden of Safety on Others

This mindset puts the burden of safety on other objects. If you are reluctant to faith biometrics until the system is unforgeable, you are overlooking your own accountability for security. For instance, it is not the company’s liability to make sure every employee select a strong password and modify it frequently emphasis Roger Samara. It’s not their responsibility to ensure you are defending your own personal information.

•    Stirring the Goalposts

It is an informal misconception in which an increasingly more intense series of evidence is demanded earlier a claim is putative. Demanding progressively high standards of safety is an illustration of this. Every time a novel technology attains some milestone for customer defense or confidentiality, it’s not going to be good enough for a proportion of the populace. This creates a boundless cycle that can never be destroyed since even meeting impossibly high standards would outcome in even higher standards being set.

What we all should do

What does this mean? Should we stop inquiries about new technologies, just to drive further invention? Of course not! It is crucial that everyone including specialists and non-experts be shrewd when assessing new technologies.

But there is a need to comprehend that all technologies are integrally inadequate and inherently susceptible. And that every step forward is going to unlock new opportunities, both good and bad. Hence, Roger Samara suggest it’s good to hold top engineers and businesspersons to high standards, but not quixotically so.

Top 4 Emerging Technology Trends for 2018

Emerging Technology

Welcome to the world of technology! Where everything is getting advanced and easier especially for the corporate world. Everyone knows that last year was a revolutionary year in terms of technology. According to Roger Samarathis revolution is not going to end here. It is going to evolve in the year 2018 or beyond. At present, various industries are doing strategic planning to adapt these technologies with the motive to lead in the industry. However, what is more, important is to understand the new technology trends and how it can bring changes in the upcoming years. So, let’s check out few emerging technology trends.


These trends become the stepping stones for 2018, the technological evolution has led to 5 major trends for 2018,

Intelligent Apps and Analytics

A growing trend of AI in applications and services has become inevitable since 2017. AI has been involved in creating intelligent apps to provide human a better lifestyle. Whether it is virtual assistants or task performers, smart apps have the potential to transform the consumption of services. These intelligent apps use Natural Language Processing (NLP) to develop a contextual understanding of user interactions to have smart, human-like conversations.

Artificial intelligence

A.I. will undoubtedly impact the world that we live in. And we can see the growing interest of businesses in artificial intelligence. Most organizations nowadays are continuously gathering information to build AI strategies to lead in the industry. Further, the usage AI strategies are rapidly moving from understanding user voice to performing human tasks that will soon increase machine-human interaction.

Digital Twins

In the digital world, digital twins refer to the replica of physical assets. Constantly updated from multiple sources, it uses sensor data to update. With the rise of Internet usage, today digital twins have evolved from being a concept into reality. According to the prediction of experts like Roger Samara, most of the industries will use digital twins by 2021 which ultimately improve the effectiveness of the organization. In the era of internet, technology has evolved in different ways that help different industries including Healthcare, Automotive, Telecommunication, etc.


The growth of Blockchain is a new revolution in the industries. As it by enables smooth interactions among commercial parties outside the system. Regardless to say, blockchain is more than the virtual currencies. In simple terms, it is a new form of accounting: triple entry, in the comparison of basic or double entry. Double-entry accounting solved the problem of companies going under by forcing them to write down not only money going in and out but also what that money was used for. In a similar way. It tracks who buys assets from whom. For example, in the transaction log of Bitcoin, you can see that you bought or sold Bitcoin and who the other party was. Furthermore, it accomplishes this without the need of a central manager.

Technology – Sword and Shield for Domestic Violence Victims

With developing the recognition that domestic fierceness can be continued using technology, there has been an upsurge of news stories that emphasis on how criminals use it to compel and control victim’s, emphasis Roger Samara.

For example, when a boy stole his ex-girlfriend’s laptop to monitor her social media messages. Or if a husband installs GPS tracking system in daughter’s toy in order to know his wife’s whereabouts without her information. However, there is substantial potential for victims to use technology in order to hold abusers accountable.


Technology – A sword and shield for the victim?

Individuals facing domestic ferocity can make use of technology as a sword as well as the shield. Following are some ways technology can protect, empower and improve victim’s access to justice:

  • The technological advancement gives victims remote access to services.
  • Different available apps and online websites connect victims with service providers or support group.
  • CCTV cameras and GPS tracking devices can attentive victims and authorities if an abuser is approaching.
  • Through available applications, victims can stay in touch with family and friends.
  • Victims and police can now record the prevalence of domestic ferocity emphasis Roger Samara.

According to a recent study of 65 people, 18 victim says they have used technology to make recordings of their abuser’s behavior for numerous purposes. Causes comprise the gathering of proof to use in court, convincing themselves their ex-partner is, in fact, abusive and for the purpose of talking to the police and lawyers. Apps including iMatter, Smartsafe and Aurora are best applications for contact in an emergency situation.

Government support for tech solutions

The government seem like leading the way in the utilization of technology to tackle domestic fierceness. Moreover, it has enthusiastically comprised technology as part of its personal safety initiative. And this aims to protect children as well as women from family ferocity in their own residences.

Strategies used to help attain this goal include the installation of CCTV cameras in victim’s home to frighten abusers from breaking defence orders. In fact, Victoria forces will attire the camera while appearing in family violence incidents highlights Roger Samara.

Why is technology not cure?

It would be mistaken to trust technology will fix the problem of domestic fierceness. The axiom “prevention is better than cure” is correct. Fighting victim-blaming attitudes and teaching directed at the civic are important in averting domestic violence.

In fact, technology has its drawbacks. For instance, CCTV cameras and GPS tracking devices are prone to technical problems. Due to this reasons, these devices are not able to send timely alerts to authorities. Hence, these technological devices give the victim a wrong sense of security.

Another problem is that every individual cannot afford or access these safety devices without government funding. Therefore, whether these technological devices will help less prosperous victims is a question that requires enquiry.

Bottom Lines

There is a need to explore more inventive uses of technology in order to tackle the domestic fierceness. You should research more to scrutinize the efficiency of technology in averting domestic ferocity both in short term and long term.

Though, the indication to date demonstrates technology has much to offer fatalities of domestic violence says, Roger Samara. Hence, rather than stop using social media, the victims should use their smartphones or other devices to speak their story to people and get the help they deserve.



Whether personally or professionally, technological innovations have shaped our lives and work as well. Technologies in the recent years have profited people learning styles, techniques and the quality they put onward. In this article, Roger Samara – a computer technician emphasizes the fact.

These days, numerous technologies are available like cell phones, TABs, PDAs, iPADs and other gadgets along with the existence of the Internet and Wi-Fi signal. These innovations have made the life more effectual and easier. In fact, things can be done in less time. It saves energy and eventually saves cost as well.

What happens without technologies presence?

We would have remained in past worrying over our buddies and youngsters returning home. Maybe we have to wait for long hours for an appointment. Furthermore, we stay with the bulky desktop system in place of easy to bring digital toys. So, we cannot imagine life without technology. Does that sway you to love technological innovations? Why not? We all do love technologies and you should too.

Fuels and Energy branch enables future of flight
Fuels and Energy branch enables future of flight

Here are some other reasons you should love technological innovations

Do not you like to watch movies from the comfort of home? Who does not love to work from home as an extra income? We claim you do. Do not you like the warming and cooling frameworks of your home or other inside premises?

What about other amenities of contemporary homes, multiplexes and organizations. Have you ever tried for further education? You can learn a lot with modern equipment as well as methods. Looking for these, you definitely fall in love with the technological inventions.

However, technologies have some limits. It’s your reaction towards it. You should not stay glued down to flat or digital screens whole day. Otherwise, you will go slump and unhealthy says, Roger Samara. Hence, do exercise and enjoy life in the nature force.

Now again appreciate the benefits of present-day innovations. The technologies make the lifeless demanding as well as agreeable. For instance, Googling and searching on the web have made handling work extends so substantially more straightforward and flatter cruising. Along with this, another aspect Roger is in love with is the being able to pay all the bills anytime essentially anywhere.

Bottom Lines

Well every individual has been affected by technologies. Can you envision what it would be like to do everything by hands? I’m sure you can’t. There are ample reasons to love technologies. One of the reasons is that it does not distinguish. It considers everybody as equal. Its accessibility and benefits have no favors for gender, religion and creed.

Whether individually or professionally, our everyday life and work are formed by the way we interconnect with one another, to the way we travel from one location to another, to the way we attain and share information. Just imagine what it would be like if we were living in a time in which all the above things do not exist emphasis Roger Samara. Above are just a few reasons to love technologies, there are many more.

How Ransomware Attacks Wreck Computer Networks in Several Countries

Ransomware phenomenon continues to dominate the threat landscape. It is growing trend from past few years. This malicious software affects sectors including universities, hospitals, law firms, banks, Government, mobile users and various organizations equally worldwide emphasis, Roger Samara.

Quantum-computer-Roger Samara
Quantum-computer-Roger Samara

In fact, Ransomware attacks are happening on a daily basis and still have a high rate of success. Hence, cyber-security professionals are still scrambling to contain a universal Ransomware attack.

This malware has pretentious tens of thousands of computer networks in nearly 100 countries, including Russia, U.S., U.K., Ukraine, China, and India. Do you want to know in detail what Ransomware is and how it affects the cyber-security? Let’s have a look!

What is Ransomware?

Ransomware is a progressively popular and troublesome form of cybercrime. It is a piece of sophisticated malware, once take control over your system, threatens you with harm, generally by disagreeing you access to your files. This malicious software locks down all files on computer networks and asks the victim to pay a ransom in order to regain control over the files.

technology-servers-server-Roger Samara

A pop-up window show instructions to the victim on how to pay a charge to get the decryption key of their system. Attackers can ask for money ranging from a few hundred dollars to thousands. Furthermore, they ask ransom virtual currency such as bitcoin, so that the cybercriminal identity is not known.

How Ransomware Works

There are a number of ways ransomware can take access to the computers. One of the most common vectors is phishing spam means an attachment that comes to the victim in an email. This harmful virus spreads from computer to computer on a network via email attachments masquerading as a file people should trust.

As you download or open it, the virus can take over your machine says Roger Samara – the master of the computer world. Moreover, another type of ransomware i.e. NotPetya breaches security holes to affect machines without demanding to trick users.

How Ransomware Infection Spreads

Cyber-criminals always try to discover new methods to extract personal data and infect a person’s computer with malware. You are lucky if you are not the victim of a cyber-attack till now. It is necessary to be proactive and keep your machines up to date for maximum protection.

Attacks Computer Networks- Roger Samara

Actually, cybercriminals look for the easiest way to attacks computer networks and use the backdoor to distribute a malicious code. Hence, it is essential to check the ways of spreading ransomware infection that attackers use:

  • Spam emails that contain malicious links or attachments.
  • Internet traffic that redirects to malicious websites.
  • Self-propagation capabilities.
  • Taking advantage of security exploits in susceptible software.
  • Malvertising campaigns.

The security breaches take place because online criminals are improving their methods day by day by using technical knowledge along with psychological manipulation.

Who has it affected so far?

Spain reports the ransomware attack firstly. The largest telecom in Spain hit with a pop-up window asking a $300 ransom in order to get access to files again. And after this approximate 16 hospitals in England’s National Health Service were pretentious. This virus locks doctors and nurses out of patient’s information until they get a ransom.

The network cyber attacks are being blamed on a piece of malware called WCry, WannaCry or Wana Decryptor. According to a report, it was allegedly spread by the Shadow Brokers which claim to have hack NSA link tea of attackers. Actually, the Shadow Brokers group which is fictional of having ties to Russia, posts windows hacking tools.

Victims of the bout are reactive with a pop-up window that says them their files are now encoded. And they have to pay $300 in bitcoin in order to unlock files.  The message is in the different languages and says:

“You can unlock some files for free. If you want to regain the access to all the files, you have to pay. Also, you have only three days to submit payment. After that ransom will get double.”

Roger Samara also add that the pop-up window contains a countdown clock that intimidates that files will be lost forever in seven days.

Wana Decryptor abuses a Windows flaw that was a patch in Microsofts Security Bulletin MS17-010. But the computers that are not up to date, the malicious code encodes all the files and then spreads itself. The infection of a single machine ends up conceding the whole company network.

The malware is both influential as well as insidious. You just walk up to your system and it’s pretentious, even if you did not touch it. All that can happen if your machine is ON and on the network.

Worldwide reaction to Ransomware Attack

In the United State, the Computer Emergency Readiness Team (CERT) collect numerous reports of ransomware attacks computer networks in many countries around the world. However, the agency did not recognize those countries.

international cyber partners- Roger - Samara

Furthermore, the Department of Homeland Security tells that it’s synchronizing with international cyber partners in the wake of prevalent attacks. A member of Senate Armed Services Committee says that:

“Ransomware is really a big problem across the world, doctors and staffs are struggling to treat patients without having their digital records or dosages. Also, ambulances are being redirected, and millions of individual’s data are possibly exposed. We will likely look back at this as a crisis moment.”

England’s NHS says that ransomware hit at least 16 of its organizations. System’s digital office statement says that network cyber-attacks not particularly targets at the NHS. And is affecting organizations from across a range of sectors.

The ransomware attack also hit the amenities in Scotland. The Health Secretary Shona Robison says security experts are taking instant steps to decrease the influence of the ransomware across NHS Scotland.

IT workers at public health care system say that it is a major problem they have seen in their six years working. As of now, this malicious software has been localized says, Roger Samara Computer Technician. There has been no inside information leak from the Russian Interior Ministry’s information resources.

6 Tech Trends to Keep an Eye on in 2018

technology trends 2018

That time of year has arrived — both to look back at the developments that have come before and to look ahead to the advancements that will arrive as the calendar year passes.

Recently, Gartner released its predictions for tech trends in 2018 and several years beyond. From an increase in visual and voice search to a rise in bot development over mobile, it looks as though the tech darlings of 2017 will only grow in prominence and power.

But what other leaps forward might we expect in 2018? Let’s take a look at the top picks shared by expert Roger Samara:

1. Geo-targeting

Geo-targeting, or the process of delivering specific content to users based on their locations, may seem like a limiting concept. Why focus in on a single region when you can send a blanket message at lower cost? But drilling down into your customer segment in this way can add a sense of personalization that is more likely to bring in new business.

Roger Samara-Geo-Targeting
Roger Samara-Geo-Targeting

Imagine you’re a chiropractor looking to target people in a specific community who are interested in alternative medicine, meditation, and organic coffee,” says Lathan Fritz, founder of Amerisales and an expert in big data for small businesses. “Geotargeting allows you to focus on your ideal customer, getting to know them and knowing their interests, and then targeting those interests on their platforms of choice.”

The wealth of data on social media and mobile devices has given rise to this highly targeted approach.

Ads or other content delivered to your smartphone can change as you travel around an area or even the world. In today’s era of total customization, geotargeting is a natural fit, and advertisers and content providers will continue to leverage it in 2018 and beyond.

Also Read: The FCC Repealed Net Neutrality

2. Anomaly detection/prediction

In manufacturing, a single error in production could be negligible — or it could create massive problems, not just for the equipment and product, but for public relations as well. Quality control has always been with us, but advances in information technology are bringing a new level of sophistication to this critical area.

Companies such as DataRPM, a Progress Company, and Hortonworks, a big data software company, are collaborating on cognitive systems for detecting anomalies in manufacturing.

Michael Ger, general manager for automotive and manufacturing solutions at Hortonworks, described the benefits of this collaborative approach, saying, “DataRPM’s cognitive anomaly detection and prediction capabilities perfectly complement our offerings, as they help companies make sense of the multi-structured data they collect.”

3. Customer service automation

From big-box retailers to tech startups, virtually every company performs some sort of customer service. But thanks to the rise of artificial neural networks, companies are increasingly turning to AI technologies to answer customers’ most common questions.

By 2020, IBM predicts that 85% of all customer interactions will be conducted without a human agent.

Roger Samara_Customer service automation
Roger Samara_Customer  Automation

Leading the charge toward automated customer service is IV.AI, the world’s first artificial intelligence agency. Led by CEO Vince Lynch, IV.AI made waves at this year’s Facebook F8 Developer Conference by announcing that it had used machine learning to automate 96% of international airline Aeromexico’s customer service interactions.

4. Augmented reality

Expect more apps to take advantage of the iPhone’s latest operating system upgrade, which allows it to overlay additional information on whatever the camera is pointing at. This will be used for far more than the flash-in-the-pan craze of Pokémon GO.

The potential applications are really endless, but one possibility is a phone-based tour guide that provides facts and additional images relevant to nearby sites, stores, restaurants, and even the night sky as viewed through your screen.

5. Deep learning

After the upset win of Google DeepMind’s AlphaGo system, which used a deep learning approach against top-ranked Go master Lee Sedol in spring 2016, the tech community has become increasingly familiar with deep learning. This year, expect further popularization of the term due to successes in Google’s driver less car initiative and facial recognition.

Roger Samara Deep learning
Roger Samara_Deep learning

Deep learning succeeds in areas of computer analysis that were previously tough nuts to crack because it does not rely on a brittle set of pre programmed rules for attacking a problem domain. Instead, it uses an approach inspired by the brain’s neural networks to find new ways to solve the most difficult problems.

6. Conversational Platforms

According to Roger Samara, there was a time when any degree of voice recognition by a computer — even a single word — was a big victory. Now Alexa is recognizing songs and musical acts, and Siri is giving you the local weather. But will we see something more like actual conversation in 2018?

It’s possible, but that will require conversational platforms to couple word recognition with a robust, adaptive internal model of the conversation topic, as well as provide an application programming interface that allows third-party developers to utilize their methods and features.

Such platforms will be able to predict what the user is speaking about, what relevant questions to expect, and what answers to deliver.

Once they become viable, conversational platforms may be able to do much more than respond to simple requests; technologists envision potential applications in law enforcement, education, medicine, and other areas.

There’s no doubt 2018 is going to be an exciting year. While these predictions may not play out exactly as forecast, it’s just as likely that stunning, unexpected advances will arrive to take their place. However the year turns out, we look forward to using some of the new technologies that will be discussed in retrospect at the end of 2018.

Originally published at: