Software  >   Applications Software  >   Enterprise Applications Software  >   Financial Applications Software  >   Banking Software  >  

Image Technology (Banking)

RSS Feed    Add to Google    Add to My Yahoo!
Image Technology (Banking) Reports
 
HP FlexBranch Office Solution Transforming Branch Experience
sponsored by HP & Intel®
WHITE PAPER: Branch office solutions based upon converged infrastructure can deliver higher levels of security to ensure data protection and prevent costly, damaging breaches. Read this set of documents to learn more about servers, storage and network resources can be safely shared without inhibiting system response and availability.
Posted: 26 May 2011 | Published: 26 May 2011

HP & Intel®

Digging Into Quality: API Best Practices, Problems, and Advice
sponsored by Axway
EGUIDE: Considering the heavy burdens carried by many APIs, it's surprising how many are rushed through development without adequate testing. In this e-guide, you'll discover valuable planning and testing approaches to help you to easily avoid inefficient development cycles and high defect rates.
Posted: 03 Aug 2015 | Published: 31 Jul 2015

Axway

Study: How to make mobile successful within the organisation – what every CEO needs to know
sponsored by Matrix42
WHITE PAPER: This white paper explores how the growing use of web and SaaS applications is affecting German companies, and how German IT specialists ensure access to these key business applications, and how they plan to for years to come. Read about the results of a questionnaire based study to learn how CEOs can make their mobile work environment successful.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Matrix42

Red Hat ROI Analysis: Red Hat JBoss Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: Only a subscription to JBoss Enterprise Application Platform (EAP) meets the demanding requirements for mission-critical applications and includes the assurance of service-level agreement (SLA)-based support, patches, updates, and multi-year maintenance policies. Access this white paper for an ROI analysis of JBoss EAP.
Posted: 28 Jul 2015 | Published: 31 Aug 2014

Red Hat

Financial Institution Builds App to Enable Secure Account Access on Any Device
sponsored by Carrington Associates
CASE STUDY: This case study describes Raymond James Financial's journey to build an app that would enable investors to gain secure access to their accounts and contact financial advisors at any time and on any device.
Posted: 02 Jul 2015 | Published: 31 Dec 2014

Carrington Associates

The Benefits of Mobile Apps for the Healthcare Industry
sponsored by Carrington Associates
WHITE PAPER: This white paper details how one healthcare information company made the transition to using mobile apps and increased their ROI by 50%. Read on to learn the benefits experienced by doctors using the mobile apps, and how to get started on your healthcare organization's mobile strategy.
Posted: 01 Jul 2015 | Published: 31 Dec 2014

Carrington Associates

Take Control of Your Mobile App Quality and User Experience
sponsored by Hewlett-Packard Company
BROCHURE: In this white paper, you'll learn how to address the challenge of optimizing mobile application quality and the user experience throughout the application lifecycle.
Posted: 16 Jul 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

The Top 10 TLS/SSL Client, Server, and Application Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This whitepaper provides an in-depth breakdown of the top 10 TLS/SSL client, server and application best practices.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

Symantec Corporation

11 Questions to Ask Before Embarking on Your Next Business Application Project
sponsored by Mendix
WHITE PAPER: In this guide, you'll learn 11 critical questions to ask before starting your next app delivery project, from "Build or buy?" to "How do I ensure a great user experience?".
Posted: 24 Jul 2015 | Published: 31 Dec 2014

Mendix

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement