Business of Information Technology  >   Business Management  >   Financial Management  >   Financial Transaction Processing  >   Equity Processing  >  

Flow-Through Processing

RSS Feed    Add to Google    Add to My Yahoo!
Flow-Through ProcessingReports
 
IDC MarketScape: Worldwide Business Process Platforms 2011 Vendor Analysis
sponsored by Oracle Corporation
WHITE PAPER: This IDC study assesses the capabilities of business process platform vendors to support midrange to complex process improvement scenarios.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

Oracle Corporation

Article: Design Patterns for Case Management
sponsored by EMC Corporation
WHITE PAPER: This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes.
Posted: 22 Sep 2011 | Published: 01 Aug 2011

EMC Corporation

Monitoring Trading Partner Agreements - Using Business Intelligence to Enhance BAM Activities
sponsored by Information Builders
WHITE PAPER: This white paper will explain what to look for in a complete integration platform and how to use BI technology in conjunction with BAM tools to achieve zero information latency and self-correcting processes.
Posted: 22 Jun 2009 | Published: 01 Jun 2008

Information Builders

The Great Excel Escape
sponsored by SearchFinancialApplications
EBOOK: With finance professionals holding fast to their Excel spreadsheets, it's been a struggle to prove that companies need more modern, collaborative tools.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

SearchFinancialApplications

Managing Complex Decision-Making Processes in the Financial Services Industry
sponsored by IBM
WHITE PAPER: In this whitepaper, you'll learn what strategies and technologies financial institutions can adopt in order to attain new levels of efficiency and competitive differentiation.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

IBM

Security Testing For Financial Institutions
sponsored by Ixia
WHITE PAPER: Security breaches can result in loss of data, services and brand damage. Discover the benefits of engaging in early and frequent security analysis.
Posted: 05 May 2014 | Published: 31 Jan 2014

Ixia

Build for Change – the Risk of Customerpocalypse
sponsored by ComputerWeekly.com
BOOK: The enterprise must focus on how it engages customers and responds to their expectations, or face Customerpocalypse, writes Alan Trefler, in this extract from his book Build for Change.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

How to Leverage Desktop Virtualization in the Financial Industry
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper details a few scenarios in which VDI is best suited to meet the special requirements and budgetary constraints of datacenters that support financial service companies.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

Dell, Inc.

Transforming Into Senior Digital Business Executives
sponsored by Gartner
WEBCAST: Tune in to this informative webcast to learn how you can make the most out of your role as CIO or IT manager and refocus your efforts on adding real business value to you enterprise. Click on the link and stream this informative webcast from the experts at Gartner to find out more.
Posted: 03 Jul 2014 | Premiered: Jul 3, 2014

Gartner

Warning Signs That Your Budget Process has Outgrown the Spreadsheet
sponsored by Prophix Software
WHITE PAPER: Read this whitepaper to learn how to break the spreadsheet habit and make the migration to a purpose-built budgeting solution.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

Prophix Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement