Protected Media, a global provider of digital advertising solutions that increase media quality, announced today the availability of a multi-layered solution to effectively boost the value of mobile advertising. Protected Media is providing a multi-layered anti-fraud solution that detects a new strain of viruses that fake viewability, combined with a solution that verifies that ads are fully rendered and within viewing range on screens of mobile devices. Together, these two solutions provide double protection to protect advertising budgets and maximize the value of mobile advertising.

"Viewability is becoming a currency for online advertising, but at the same time bots are becoming more sophisticated and are undermining the validity of these measurements," said Asaf Greiner, CEO of Protected Media. "By detecting false viewability data that indicate that bots are at work, and then confirming that legitimate ads can be seen, we are providing a powerful combination that help bring back faith, trust and value to mobile advertising."

Inability to accurately verify the viewability of mobile ads is a growing concern for digital advertisers since mobile advertising is taking up larger portion of their budgets. According to eMarketer, mobile ad spending will grow 45% this year to reach $45.95 billion, and by 2019, mobile will represent more than a third of total media ad spending in the US. At the same time, mobile ads provide additional challenges due to the different types of mobile operating systems and devices and the fact that it can take longer to render ads based on connectivity.

Protected Media's anti-fraud solution utilizes technology and sophisticated methods from cybercrime investigations to uncover bots that fake viewability. Then, by providing information at the granular level about the exact position of mobile ads, Protected Media is able to confirm that legitimate ads are visible on mobile screens. In-depth reporting provides a detailed actionable data that can pinpoint exact sources of problematic traffic enabling agencies and publishers to identify all ads that aren’t visible, including those that are fraudulent and impersonate viewability to maximize mobile advertising effectiveness.

About Protected Media

Protected Media's solutions enable buyers and sellers of digital advertising to ensure that display mobile and video ads are properly located, visible, and seen by real people. Protected Media's technology provides in-depth information at the impression level to detect problematic traffic so agencies can work side by side with publishers to identify and eliminate suspicious activity to dramatically increase over-all ad quality. For more information, visit Protected Media online.



That’s themessage of crude TV programs

I’m no fan of Fox TV’s The Family Guy. To me, it’s crude,moronic and not very funny. But I recently found myself watching a rerun thatfeatured a plot involving insurancefraud. The three main characters got caught burning down their friend’sfinancially troubled pharmacy.

They pleaded with the arresting officer to let them go.“Insurance agencies are all scumbags. They deserve to get hurt,” one charactersays. After thinking about how his health insurer had screwed him, the copdestroys the evidence and lets the trio go on their merry way.

Cringe factor aside, I realize that this is only a cartoonand few people take the messages seriously. Yet, those messages do have animpact. They plant seeds. And over time, as other similar messages pile on,they reinforce the idea that committing insurance fraud is no big deal.

More than five million people watched this episode of TheFamily Guy when it first ran — the most popular program on TV that evening. Thefraud-fighting communitystruggles to reach five million people in a year with anti-fraud messages.

I was reminded of this episode today when I saw the tweetbelow from a young woman who wants to secretly push her car off a cliff. Howdid these ideas form in her head? How can we discourage such destructivethinking?

For one, public outreach needs to be beefed up bigtime. Andsecondly, let’s keep our young children from watching such crude and sociallyirresponsible TV programs like The Family Guy. What shows are your kids watching?



I have been in the recruiting industry in Tokyo since graduating business school at the end of the '80s.

The opportunity to help professional (people To Whom career is vitally important issue issue) find a path to a better life through proactive career building is, in my opinion, an honorable under taking.

KK Pacific Associates Limited

President, Paul A. Levine

President Bio & History

In 1998 I made the decision to move my own career forward from being a senior recruiter who happens to own a head-hunting company to being a full-time president who happens to be an expert in recruiting.

My goal then was to discover life beyond That of 12+ hours days and enjoy the life of the early-retired.

Like a pleasant afternoon nap That comes to a refreshing end, my time in retirement came to a happy finish with my establishment of Pacific Associates Limited in 2010. Pacific Associates Limited (PAL) is established as a partnership rather than sole-proprietorship.

Paul Levine's Profile

Paul Levine first visited Japan in 1985. He got an MBA at the University of San Diego and the California State University in 1989, and In the same year, came back to Japan to be a headhunter.

He has been married with two children.

His trademark white shirt, red tie and red suspenders havebeen prominent since 1995. "I meet different candidates in the Sami meeting room, dressed in the Sami clothes. Staying consistent Really Helps you to concentrate on the people you meet. As a professional in judging people, "I can understand an individual within about five minutes of speaking with them".



We use computers to pay bills, shop online, chat and evenkeep in touch with friends on social media platforms. You might not realize it,but this makes us vulnerable.

Because we willingly broadcast over the Internet valuabledetails, such as our credit card information or bank account credentials –information usually needed by cyber criminals – we can never be too carefulwhen securing our financial transactions or personal information.

A 2016 report from the PricewaterhouseCoopers indicates that cybercrimeis the “2nd most reported economic crime, affecting 32% of organizations.” Andthe same study reveals another cause for concern, apart from the economicimpact:

“The insidious nature of this threat is such that of the 56%who say they are not victims, many have likely been compromised without knowingit."

The data clearly shows that cybercrime affects individuals andglobal economic growth. Cyber-attacks on financial institutions or withfinancial consequences for users like you and me are putting financial assetsat risk. Consequently, financial data protection should be a strong concern foranyone.

So is there a way to for our online activities to remainprivate and safe from cybercriminals?

Definitely! Here are afew best practices that will keep your system protected:

1. Check the linkbefore you click it

Pay attention to the links you want to access. To make sureyou are not deceived; simply hover the mouse cursor over the link to see if youare directed to a legitimate location.

If you were supposed to reach your favorite news website,such as “”, but the link indicates ““, then you shouldresist the urge of clicking the link. Hyperlinking is a common practice inphishing attacks and it’s always best to double check embedded URLs.

Most of us use shortening services for their links, such or tinyurl. But in some cases an unknown link may send you to amalicious site that can install malware on the system. So, how can you knowwhere you’ll arrive if you click it?

To make sure you are about to access the right onlinedestination, use a free tool such as Redirect Detective. This tool will allowyou to see the complete path of a redirected link.

Alternatively, you can also check the suspicious links usinga reliable URL checker, such as VirusTotal.

2. Check the filebefore you click it

We all know malware is everywhere. But how can we make sure afile (or an executable file) we just downloaded is what it’s pretending to be?Can we tell the difference between a safe file and a malicious one?

An important step for everyone is to use a browser whichintegrates a reputation-based technology. This technology uses a cloud scoringsystem to analyze each application downloaded and where it comes from. As aresult of the analysis, websites that distribute malicious software – not yetdetected by existing defense mechanisms – are more easily blocked. For moredetails, you can access the following article.

To make sure you are not running a malicious executable file(which may download a Trojan virus on your system), use VirusTotal, whichanalyzes suspicious files on multiple antivirus solutions.

3. Use secure websitesto run financial transactions

Financial operations and transactions should be given highscrutiny, as they hold the key for cyber criminals to cashing out your life’ssavings.

Here’s how to make sureyou visit a secure website:

1.     Lookto the left of the web address and find the “Lock” icon. This indicates thatyou are visiting an encrypted and/or a verified website.

2.     Makesure the web address starts with “https://”. The “s” comes from “secure socketlayer” and it indicates you are connected to a website where data, which issent and received, is encrypted.

4. Set strong passwordsfor your accounts

Your passwords should contain around 20 characters. Don’tforget to combine upper and lowercase letters, numbers, and symbols. Don’t usethe same password for all your accounts. Make a habit of changing your mainpasswords every 30 days. Even if you are hacked, having different passwords foreach account will help you limit a potential loss.

For more information on how to set strong passwords andmanage them safely, see our step by step guide on password security. Thisincludes details on how to use a strong and secure password manager likeLastPass or Sticky Password.

5. Use two-factor authentication

This is one of the best ways to ensure your online accountsor your email inbox are not accessed by anyone else but you.

This option means that, besides entering your credentials,you will be required to enter a one-time code sent to your phone. Use thismethod to protect confidential information from social media accounts, such asFacebook, Twitter or valuable data from email accounts.

Read More About 15Steps to Maximize your Financial Data Protection



This year marks six decades of IFCwork in developing countries and emerging markets. A milestone made all thesweeter with six recently awarded projects in Asia Pacific.

The Asset, a regional publisher andmulti-media company, drew attention to IFC’s impactful contribution toinfrastructure in the region at its awards dinner on June 30. IFC receivedseven of the 50 accolades at The AssetTriple A Asia Infrastructure Awards 2016.

IFC Regional Director for East AsiaPacific, Vivek Pathak, joined the IFC teams on stage in Hong Kong. “Ourinfrastructure work, especially in this region, is pivotal to the developmentof emerging markets and connects people to essential resources such as waterand energy.”

Among the projects honored were tworenewable energy projects in Pakistan. Both Gulpur Hydropower Project andTenaga Generasi Wind Power Project won Best Energy/Renewable Energy Deal of theYear.

Gulpur Hydropower is one of threehydropower projects in the country addressing severe power shortages. Thejudging panel said: “[The project] could serve as a precedent for developingfuture Pakistani hydropower projects as the government makes a push intoadditional renewable technology.”

Tenaga Generasi Wind Power Projectis making important inroads with wind power generation as one of the first ofits kind in Pakistan to operate under the country’s Upfront Tariff regime,which transfers risk from the power purchaser to the power company.

The Asset also praised IFC for itsfive-year green Masala bonds which raised 3.15 billion rupees for privatesector investments that address climate change in India. IFC has invested theproceeds of the bond in a green bond issued by Yes Bank, one of India’s largestcommercial banks. Yes Bank has committed to investing the proceeds of its bondin renewable energy and energy efficiency projects, mainly in the solar andwind sectors.

The Best Power Deal in the HighlyCommended category went to the $525 million syndicated loan facility forMasinloc Power Partners Company in the Philippines. The loan allows for thecompany to supply power to seven electric cooperatives for 20 years, which willhelp drive down electricity prices for households.

A greenfield ammonia plant inIndonesia won favor as Best Industrial Project Deal. IFC’s $509 million loanfacility for PT Panca Amara Utama was applauded for supporting thelocally-sponsored plant. In addition to mobilizing long-term financing frominternational institutions, IFC also helped the company develop theirenvironmental and social standards, which will set a benchmark for otherprojects in the region.

“The project will create over twothousand jobs during the peak of construction in a frontier region ofIndonesia, and upgrade local infrastructure,” said IFC Investment Officer, SeanChanho Ahn. “By using locally produced natural gas and converting it intoammonia, the project will facilitate domestic value addition to Indonesia’snatural resources and generate revenues from domestic sales and export ofammonia.”

Mongolia’s Oyu Tolgoi, a copper andgold mine in the South Gobi desert, has generated thousands of jobs andbillions of dollars in government revenue. The mine received both Mining Dealof the Year and Project Finance Deal of the Year awards. “The project is thelargest single investment ever in Mongolia, which is a very significantstimulus to the economy,” said the judges.

At the heart of IFC’s work issustainable development – growth that benefits families, households andcommunities in productive and non-destructive ways. These projects help toelectrify neighborhoods, generate jobs and encourage investment in growingindustries.


Best Energy/Renewable Energy Dealof the Year

Gulpur Hydropower Project

Best Energy/Renewable Energy Dealof the Year

Tenaga Generasi Wind Power Project

Best Green Bond Facility – HighlyCommended, India

International Finance Corporation (IFC) 3.1 billion rupees GreenInfrastructure Bonds

Best Power Deal – Highly Commended,Philippines

Masinloc Power Partners Company US$525 million syndicated loan facility

Best Industrial Project Deal,Indonesia

Panca Amara Utama US$509 million IFC loan facility

Mining Deal of the Year and ProjectFinance Deal of the Year, Mongolia

Oyu Tolgoi US$4.4 billion facilities



The International Organization of Securities Commissions (IOSCO) hasfinalised its guidance setting out IOSCO's expectations for issuers withrespect to the presentation of financial measures other than those prescribedby Generally Accepted Accounting Principles (GAAP), so called 'non-GAAP financialmeasures'.

The IOSCOguidance is contained in the Statement on Non-GAAP Financial Measures, whichsets out IOSCO's expectations for the presentation of such measures by issuers,including that sufficient information should accompanying non-GAAP financialmeasures to aid in their understanding and that the measures should bepresented transparently and with disclosure of how they are calculated.

The statement provides specificexpectations in the following broad categories:

Defining the non-GAAP financial measure. This encompasses providinga clear explanation of the basis of calculation, clearly labelling measuressuch that they are distinguished from GAAP measures, explaining why themeasures are useful, and explicitly stating the non-GAAP measure does not havea standardised meaning and may not be comparable between entities.

Unbiased purpose. This requires that non-GAAP financial measuresshould not be used to avoid presenting adverse information to the market.

Prominence of GAAP measures versus non-GAAP financial measuress.Non-GAAP measures and their most directly comparable GAAP measures should bepresented with equal prominence, or the GAAP measure given greater prominence,and non-GAAP measures should not in any way confuse or obscure the presentationof GAAP measures.

Reconciliation to comparable GAAP measures. Reconciliations shouldbe provided between non-GAAP financial measures and their most directlycomparable GAAP measure presented in the financial statements, with adjustmentsexplained and reconcilable to the financial statements or information about howthey are calculated provided.

Presentation of non-GAAP financial measures consistently over time.Measures should generally remain consistent from period to period, includecomparative information, with any changes in composition explained and alsoreflected in comparative information and discontinued use of a non-GAAP measuresufficiently motivated.

Recurring items. Items that are reasonably likely to affect pastand future periods, such as restructuring costs and impairment losses, shouldnot be described as non-recurring, infrequent or unusual.

Access to associated information. The information that issuersprovide regarding non-GAAP financial measures should be readily and easilyaccessible to third parties.

The statement is intended to beused by entities applying International Financial Reporting Standards (IFRSs)and other accounting principles.



Tips for creating SLA metrics and measuring serviceperformance

Build performance measurementinto your SLA, when you set it up - consider the following points:

1. Identify the most importantSLA outcomes first - and then determine clear metrics to track those outcomes.

2. Create a range of (say 10)simple metrics, such as targets, kpi’s (key performance indicators), that areeasily understandable.

3. Ensure the metrics arerelevant and match the key business needs of your SLA.

4. Clearly, the metrics shouldalso be measurable/quantifiable and unambiguous.

5. Base your metrics on yourspecific SLA requirements and needs - rather than readily available data,existing reports, or generic SLA metrics applicable for such services.

6. Design the metrics tomeasure different performance problems that your SLA / service provider mayhave.

7. Metrics should be mutuallyexclusive and not duplicate each other. Each metric should focus on a differentpotential problem.

8. The metrics should becomprehensive enough, such that if your service provider fails to meet therequired performance, at least one of the metrics will be triggered.

9. Review and test themetrics, to confirm they will pick up the undesirable problems.

10. Agree the metrics betweenboth parties – service provider andcustomer

11. For each Service Levelmetric include:

·        a reference name

·        a description

·        measurement parameters eg data sources

·        calculation formula and frequency

·        a baseline performance

·        the required performance or target, from aservice provider

·        remedies and penalties for poor ornon-performance eg monetary credits

·        any specific exclusions/exceptions


12. Set up an automaticmonitoring of the metrics, wherever possible.

13. Set up alerts forexception reporting.

14. Monitor performance(metrics) on a regular basis. Make it one of your regular daily or weeklytasks.

15. Raise any performanceissues at your regular service review meetings.

16. Review metrics and whenrequired amend them, to ensure they continue to be relevant to your serviceneeds.



10 tips for writing better ServiceLevel Agreements

1. Ensure all key terms areclearly defined eg SLA scope, customer and provider responsibilities,reporting, service expectations, performance indicators, escalation, remediesand penalties. Make sure you understand them. If you do not, or have queries –ask!

2. Include the option tochange the SLA in the future. Businessesand technology change rapidly. So if the SLA is to remain relevant, it willneed to be updated as required.

3. Include the provision for regularSLA reviews. Six-monthly would be ideal, but failing that - annually, to managechanging circumstances.

4. Make sure you have a‘get-out’ clause. It is important to be able to terminate the SLA under certainconditions eg exceptionally poor performance, major problems, significantchanges to services.

5. Includeperformance-monitoring criteria within the SLA. Plus, include automatic penaltycredits for non-compliance of performance. Better to build this into the SLAfrom the start, than negotiate each time it occurs.

6. Writing the SLA should be ajoint effort between customer user and IT staff and the service provider. Inputand agreement from all is required. One party should not dictate or force SLAterms on the others!

7. Allow sufficient time toprepare, negotiate and agree, a comprehensive and relevant SLA. The quality ofthe SLA is improved by not rushing and taking more time, whatever the projecttime pressures.

8. Look out for exceptionswithin the SLA. Ensure you understand them and their potential impact on theoverall SLA.

9. Look out for third partycomponents within the SLA. Ideally, one service provider would provide theentire service. However, there may be input or reliance from other thirdparties. So check who is responsible for what, and whether it is included orexcluded from the SLA.

10. Carefully review your SLA.Make sure it is easy to understand by all – even non-technical users. Does itcover everything? See our SLA Checklist. Does it meet your business and servicerequirements? Are you satisfied with it?



Main purpose of this role is to establishand maintain frameworks to identify, assess, manage, monitor, mitigate andreport ABC risks and compliance.

Strategy and Leadership
• Asissts the Head of ABC, ASA, in maintaining the regional framework forABC through close liaison with the Group Head ABC, establishing an ABCprogramme comprising of
globalstandards, training, compliance monitoring andreporting.
• Leads on ABC-related external and internal risk identification andanticipation of future trends in the region. Works with the business to drive thedevelopment of appropriate mitigation strategies.
• Identifies and communicates, across the region, relevant ABC changes –ensures policies and procedures are amended as required.
• Evaluating and advising on reputational and regulatory risk arising fromcustomers and transactions within the region.

ABC Definition and Application
• Provides guidance on proper application and interpretation of ABCrelated laws, regulations and policies within the region.
• Works with Group Shared Investigations Services to supportinvestigations with bribery or corruption implications in the region.
• Proactively engages with regional stakeholders to steer businesspractices towards exemplary regulatory governance.

ABC Compliance Reporting
• Ensures key ABC risks and issues in the region are being analyzed,reported, escalated and tracked appropriately.
• Prepares regular and accurate ABC reports that are escalated to therelevant regional governance bodies.

ABC Training
• Assists Head of ABC, ASA, to define who requires training, and assistsin developing ABC training for the region.
• Assists in the development of an effective internal compliance cultureby promoting the benefits of ethical business conduct and the benefits ofcompliance.

Government and Regulatory Relationship Management
• Support the interface between the Bank and regulators, governmentagencies and law enforcement on ABC matters for the region.

• Responsibilities exclude prevention, detection or investigation offraud, investigations under the Group’s Investigation Policy, data security,whistleblowing arrangements, BCP/ Crisis Management, Operational Riskmanagement, first line assurance (except for processes owned by L&C) andsecond line rules based assurance activity of any process not directlyrelated to legal or regulatory risk.


• Substantial experience in the banking industry and/orlaw, including demonstrated success in a similar role.
• Sharp business acumen (including ability to assess risk and appropriatelevels of return), strong leadership qualities, excellent interpersonal skillsand multi-cultural awareness and sensitivity.
• Ability to manage geographically dispersed and varied customer andproduct base.
• Ability to collaborate and work dynamically across country, region,business and group stakeholders.
• Understanding of best practice risk management techniques and frameworksrelating to ABC.
• Knowledge of laws, regulations, regulatory expectations relevant tofinancial crime.
• Sound judgement on business practices, regulatory relationshipmanagement and reputational risk.
• Exemplary integrity, ethics, independence and resilience.
• Personal authority with proven ability to establish relationships andprovide strong direction at the most senior levels of the Group and withregulators and other external stakeholders



Meir Ezra - Roman General Julius Caesar liked to land his ships on Enemy Territory, unload his troops and then burn the ships.


He Eliminated all means of retreat. His army had no choice but to win, Which They did.


You Have the Power to Choose excuses or solutions. If you prefer excuses, you have low production and stress. If you persist Until You Achieve Your Goals, you win the supreme test.




"This, of course, is a rather savage and brutal date for it thrusts aside all justification, reasonableness, excuses and even does not take into account the size or Obstacles of the opposition."


"People who explain how wrong it is all going and who have Reasons Why and WHO ARE NOT Putting It Right are the real crazy people in the universe. The only ones crazier than They are, are the ones who are quite happy to have everything fail and go wrong with no protest from them. And the only ones even worse are Those Who work endlessly to make things go wrong and preventable anything from going right and oppose all Efforts instinctively.


"Fortunately, there are a few around who DO make things go right in spite of everything and anyone." - L. Ron Hubbard