article thumbnail

The Global Tax Agreement – A Friend or Foe for the Big 4?

Tom Spencer

The first one seeks to implement a principle for taxation of corporate revenues based on location of sale rather than place of manufacturing. For example, when a shell company located in a low tax jurisdiction has no business operations other than being the formal owner of valuable intellectual property, and collecting royalty fees for it.

article thumbnail

Cornerstone Research Interviews and Culture

Management Consulted

Founded in 1989 by three former consultants of the MAC Group (a boutique sales and distribution consulting firm), Cornerstone Research was established to be very different than the general management consulting firm it was birthed from; focused on unique clients, managing delicate client relationships, and offering specialized work.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTI Consulting Interviews and Culture

Management Consulted

Intellectual property. Dispute, litigation and investigations services for construction industry. Intellectual Property. Intellectual Property. Construction. However, US-based clients still account for the vast majority (around 75%) of sales. These include: Disputes Advisory Services.

article thumbnail

Why African Entrepreneurship Is Booming

Harvard Business

Today, we are seeing companies with core intellectual properties (IPs) emerging out of Africa. The old construct of acceleration of consumerism where foreign brands merely open sales offices in Africa without design or research centers will be challenged by African entrepreneurs.

article thumbnail

Data Breaches Aren’t Just an IT Issue - SPONSOR CONTENT FROM VERIZON

Harvard Business

Point-of-sale (POS) intrusions : Attacks that capture payment data from POS systems. Cyber-espionage : Attacks carried out by state-affiliated actors, often targeting intellectual property. Web application attacks : Attacks that exploit a vulnerability in an application running on a web server as a means of entry.

Data 28
article thumbnail

64 Proven Ways Consultants Can Generate Leads Online (Consulting Lead Generation)

Tsavo Neal

As a consultant, there is no better position to be in for sales conversations than that of the trusted advisor — a position that publishing your white paper helps you take. Knowing that your lead is interested in the topic of the white paper is critical information when coming up with your inbound sales outreach strategy.