Cloud: A melting pot for Innovations

With its promise of lower capex spending and a lower IT footprint to manage, cloud computing is increasingly becoming a go-to option for enterprises when evaluating their IT and apps spending during refresh cycles. Virtualization and automation of service provisioning is enabling IT to be leveraged more efficiently. Adoption of private cloud based solutions is 

Continue Reading…

Digital Disruption in Retail Banking

The retail banking industry today is undergoing change at levels not seen heretofore. There are two primary drivers of this change: demographics and technology. There are 83 million millennials, people born after 1980, who came of age around the millennium. This makes millennials the largest demographic today at about 5 million more than the baby 

Continue Reading…

Banking operations: Planning for Liquidity Risk

The 2007/08 global financial crisis has reaffirmed the importance of liquidity risk. In the world of efficient financial markets with perfect information, banks could only fail if their underlying fundamentals are not good. In such markets, banks can always finance their liquidity demands by borrowing from wholesale markets. But, in the real world financial markets 

Continue Reading…

Bring Your Own Wallet

Today, the ‘mobile wallet’ is an overused buzzword discussed and debated by a variety of industries. Payment companies, financial institutions and merchants of all sizes are all vying for consumer attention. Technology companies, mobile network operators (MNOs), start-ups and even marketing companies are joining forces to innovate in this space. Though many are talking about 

Continue Reading…

3 ways credit card providers can use BPM to enrich their service offerings and achieve business transformation

Business process management (BPM) in credit card services has covered credit card issuance, card servicing and bills management, but in 2014-2015 the focus is going to be more on better customer service, best in class case management systems and dispute management. With increasing security breaches and data thefts taking place in 2013, there are three 

Continue Reading…