Transaction Processing (Finance) Reports

Virtual currencies and their potential role in cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

Where next for Blockchain?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about how the technology's inherent security makes it tamper-proof, and perfect for keeping and sharing records for transactions in many scenarios. Also, discover why think-tank 'Reform' believes that the government should use blockchain technology for identity assurance services across the public sector.
Posted: 08 Feb 2021 | Published: 12 Dec 2017

TechTarget ComputerWeekly.com

Transforming payments from a transaction business to an information Business
sponsored by Microsoft India
WHITE PAPER: Access the following white paper to uncover an unprecedented opportunity for the payments industry. Discover what you need to do to get ready for this new wave of technology and gain insight on how to capitalize on it.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

Microsoft India

Presentation Transcript: Optimizing Business Performance with Automated Accounts Payable Processing for your SAP System
sponsored by ReadSoft
PRESENTATION TRANSCRIPT: In this transcript food pioneer Rich Products shares the strategies that streamlined their payable processes, consolidated AP processing from 19 locations to one and saved them six figures in discounts.
Posted: 05 Nov 2009 | Published: 05 Nov 2009

ReadSoft

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by TechTarget Security
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

Real-Time Risk Monitoring
sponsored by Sybase, an SAP company
WHITE PAPER: Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Sybase, an SAP company

Counterparty Risk: Are We Leveraging Our Tools?
sponsored by Sybase, an SAP company
WHITE PAPER: While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

Sybase, an SAP company

Industry Intelligence: International Financial Reporting Standards for Hedge Funds
sponsored by Advent Software, Inc
WHITE PAPER: This paper introduces hedge funds and hedge fund service providers to IFRS.
Posted: 04 Jan 2010 | Published: 04 Jan 2010

Advent Software, Inc

Computer Weekly – 26 June 2018: Visa reveals causes of payment chaos
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a major outage that affected millions of customers, payment provider Visa reveals what caused its network to crash. We look at the innovations coming from startups in software-defined storage. And we assess the prospects for Canada's push to target European IT buyers. Read the issue now.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

TechTarget ComputerWeekly.com

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security