High-Performance Payment Processing and In-Memory Computing
By: Hazelcast View more from Hazelcast >>
Download this next:
Architect tech talk: Fraud detection in financial services
By: Hazelcast
Type: Webcast
In a world teeming with financial transactions, fraud is not just a possibility but a looming threat, demanding razor-sharp vigilance and sophisticated tools to counter its every move.
Welcome to Hazelcast’s first installment in their Architect Tech Talk series where they peel back the layers of sophisticated tech solutions and spotlight the visionary architects shaping the digital landscapes of different sectors.
Today, Hazelcast spotlights fraud detection in financial services, a topic that marries cutting-edge technology with the crucial need for security and precision.
These are also closely related to: "High-Performance Payment Processing and In-Memory Computing"
-
Streaming data platforms: Harnessing real-time data for instant action
By: Hazelcast
Type: Webcast
Streaming data platforms and stream processors are becoming increasingly important as companies strive to extract value from newly created data and to process data-in-motion.
In this webcast, Hazelcast will review GigaOM’s findings about streaming data platforms with Andrew Brust, Principal Analyst at GigaOM and Blue Badge Insights, and then explore practical use cases and applications in financial services and other industries for architects and developers who are looking at how they can take full advantage of the benefits of streaming data platforms.
Tune in to explore how streaming data platforms like Hazelcast can be used for application modernization, as well.
-
Accelerating microservices maturity: Unleashing the power of Hazelcast
By: Hazelcast
Type: Webcast
Join this webinar to explore how Hazelcast, a leading unified real-time data platform, addresses the key challenges encountered in the microservices maturity journey.
In this session, speakers from Hazelcast will delve into the intricacies of building and scaling microservices architectures and discuss how Hazelcast provides robust solutions to enhance performance, scalability, and resilience.
They will cover practical examples of how you can:
- Enable seamless state storage
- Facilitate microservices integration
- Leverage the powerful Hazelcast computation engine
Don’t miss this opportunity to gain insights into optimizing your microservices ecosystem with Hazelcast’s solutions and practical use cases.
Find more content like what you just read:
-
Modernizing payment processing architectures
By: Hazelcast
Type: Webcast
Many businesses still rely on outdated platforms, risking market share to more agile alternatives. The good news is that there are modern architectures that are much easier to integrate with legacy systems than businesses might be aware of. Tune into this webinar now to learn more.
-
Event-driven microservices with Hazelcast: A look at the code
By: Hazelcast
Type: Webcast
In this session, dive deeper into event-driven microservices with an example from the IoT space. Along the way, you’ll learn, in concrete, hands-on terms, how to implement high-performance, context-aware, stateful event-processing microservices with Hazelcast. Tune in now to learn how you can unlock the potential of microservices.
-
Building and managing a high-performance microservices architecture
By: Hazelcast
Type: Webcast
To fully realize the benefits of microservices, new data management approaches that are equally fast and flexible are essential. Tune into this webinar now to gain an understanding of the challenges and solutions in adopting microservices architectures while simultaneously incorporating real-time data practices.
-
Digital secure remote payment: How Apple Pay can change the future of remote payments
By: TechTarget ComputerWeekly.com
Type: Research Content
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
-
Mobile Payments Using Host Card Emulation with NFC
By: TechTarget ComputerWeekly.com
Type: Research Content
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
-
Your complete checklist for cross-border commerce
By: Digital River
Type: White Paper
Studies show that 57% of worldwide online shoppers make purchases from overseas retailers. Cross-border commerce is on the rise, with digital technologies allowing for an international scope of business beyond anything that has come before. Download this checklist to learn how you can expand your commerce operations into new markets.
-
A guide to where mainframes fit in the cloud
By: TechTarget ComputerWeekly.com
Type: eBook
Far from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.
-
The future of enterprise IT: Social, mobile, analytics and cloud
By: TechTarget ComputerWeekly.com
Type: eGuide
Mobile and data technologies are allowing organisations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organisations in Australia.
-
The future of enterprise IT: Social, mobile, analytics and cloud
By: TechTarget ComputerWeekly.com
Type: eGuide
Mobile and data technologies are allowing organisations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organisations in Australia.
-
Computer Weekly – 1 August 2017: The fields of Athenry – how Apple's datacentre plans are causing turmoil in a small Irish town
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.
-
MYHSM by UTIMACO Fully Managed Payment HSM Service
By: Utimaco
Type: White Paper
With financial data flowing from business to business, each organization is responsible for securing that data or risk losing both revenue and customers. However, rather than setting up and managing HSMs in your own data center and taking that responsibility on yourself, there is partner who is changing the landscape. Read on to learn more.
-
-
Launching a cloud-based analytics campaign: The peaks and pitfalls
By: NEC Corporation of America
Type: eGuide
In this expert e-guide, learn about some of the major issues facing modern analytics. Read about the initial struggle of launching an operational analytics program, and how integration with cloud solutions can help alleviate these pains. In addition, read about a travel-booking company's success story of BI cloud integration.
-
Risk management is the beating heart of your cyber strategy
By: TechTarget ComputerWeekly.com
Type: eBook
In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
-
Fraud management: A perennial business issue
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
-
8 fraud fighting benefits of BankIDs
By: Ping Identity Corporation
Type: White Paper
With the help of an effective BankID, some even reducing online payment fraud for their users and business partners to levels as low as 0.00042%. This white paper explores how organizations can use BankIDs to fight fraud, including 8 key benefits. Read on to learn more.
-
-
-
Avoiding the Oracle traps and risks with AWS solutions
By: OpsCompass
Type: eBook
Download this e-book to learn how you can identify all the cost traps and risks around Oracle licensing and technologies, and implement best-practices, solutions, and strategies to minimize them in AWS.
-
How Sestra Systems achieves consistent cloud connectivity
By: Cradlepoint
Type: Case Study
As a provider of IOT-based smart beverage dispensers, Sestra Systems needs consistent connectivity to operate—even during network outages. So, how does the business ensure such connectivity? By partnering with Cradlepoint. Dig into this case study to learn how Cradlepoint’s cellular broadband enables connectivity success for Sestra Systems.
-
CW Europe – December 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
-
Clients tell-all in Linux simplification and innovation for enterprises
By: TechTarget ComputerWeekly.com
Type: eBook
In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.
-
-
Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.
-
CW Europe - June-August 2020: 5G rush in Russia
By: TechTarget ComputerWeekly.com
Type: eGuide
Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
-
CW Europe - June-August 2020: 5G rush in Russia
By: TechTarget ComputerWeekly.com
Type: Ezine
Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
-
Getting expense management right
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Analysts Clive Longbottom and Rob Bamforth look at the benefits that every organisation should be looking to gain from a travel and expenses management system.
-
10 common NoSQL use cases for modern applications
By: Couchbase
Type: White Paper
With businesses racing to build hyper-personalized customer experiences powered by generative AI, Couchbase announces vector search at the edge, enabling AI-powered mobile applications. Read on to learn about the 10 most common NoSQL use cases from customers using the Couchbase high performing database platform.
-
Private cloud management: What enterprises need to know in 2021
By: TechTarget ComputerWeekly.com
Type: eGuide
As an authority cited in the lead article in this e-guide explains, for many businesses "real time" means more frequent business intelligence reporting or data model updating. And yet, as another article in this e-guide explains, many organisations lack the infrastructure and culture necessary to deliver the required data.
-
CW Nordics February 2019
By: TechTarget ComputerWeekly.com
Type: Ezine
In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.
-
6 retail transformations that wireless makes possible
By: Cradlepoint
Type: Product Overview
How can wireless networking transform retail? In 6 key ways. This overview outlines the retail transformations that LTE and 5G make possible – and how they can improve operations and customer experiences. Read on to access the insights.
-
Right-sizing your retail self-service approach
By: Diebold Nixdorf
Type: Product Overview
As retail continues to rapidly evolve, many organizations are looking for ways that they can keep up with customer expectations for self-service. However, many systems can have challenges regarding modularity, struggle with downtime, and tend to be unreliable. So, how can this be fixed? Browse this guide to learn more.
-
New tech on the block: Planning for blockchain in the retail and consumer packaged goods industries
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This research from Deloitte identifies the areas with the biggest immediate opportunity for retail and consumer packaged goods (CPG) businesses looking to invest in blockchain technology.
-
IT Basics: Real-time Analytics
By: TechTarget ComputerWeekly.com
Type: eGuide
In this new Computer Weekly series of e-guides, learn more about essential IT concepts, their definitions, applications and benefits. To start, we get together everything you need to know about real-time analytics, its uses and its benefits.
-
A Computer Weekly buyer's guide to big data
By: TechTarget ComputerWeekly.com
Type: eBook
Companies are switching on to the advantages of big data. In this 13-pagebuyer's guide, Computer Weekly looks at data analytics, how to get value out it and the benefits of process mining.
-
Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws
By: TechTarget ComputerWeekly.com
Type: eBook
In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.
-
CIO Trends #10: Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.
-
CW Buyer's Guide to Emerging technology
By: TechTarget ComputerWeekly.com
Type: eBook
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
-
CW Middle East ezine January 2019
By: TechTarget ComputerWeekly.com
Type: Ezine
Oil may be the main fuel to the economies of the Middle East, but the region is trying to break from its reliance on the black stuff. This ezine has already featured articles about the UAE and Saudi Arabia diversifying their economies, with particular interest in fintech.
-
A Computer Weekly buyer's guide to expense management
By: TechTarget ComputerWeekly.com
Type: eBook
Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings
-
Nordic banking in the digital age
By: TechTarget ComputerWeekly.com
Type: eGuide
Read in this e-guide how Nordic banks are working together to make cross border payments in the region seamless. Also find out how Nordic banks are offering customers the opportunity to make payments via wearable devices and how the region's successful mobile payments platform, MobilePay, is futureproofing its business.
-
How Financial Services Leaders are Ramping Up Innovation While Staying Secure
By: Slack
Type: White Paper
See how Asia-Pacific financial services leaders are combining operational agility with AI-powered productivity while bolstering security and compliance.
-
How Financial Services Leaders are Ramping Up Innovation While Staying Secure
By: Slack
Type: White Paper
See how Asia-Pacific financial services leaders are combining operational agility with AI-powered productivity while bolstering security and compliance.
-
A Computer Weekly buyer's guide to blockchain technology
By: TechTarget ComputerWeekly.com
Type: eGuide
Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
-
Southampton Solent University Invoice Processing Case Study
By: Documation Software Ltd
Type: Case Study
Many organizations are still using manual invoice systems like spreadsheets which require manual input. This way of doing business is slow and inefficient and can create more costs than intended. For one University, they suffered under this exact scenario, but found that automation was the key. Read on to see who they partnered with to do it.
-
The myth of email as proof of communication
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
-
Automated Invoice Matching
By: Documation Software Ltd
Type: Product Overview
Invoice matching is a vital control for avoiding unauthorized payments and fighting fraud but is time consuming and costly. Documation’s invoice matching solution automatically performs invoice verification, posting successful invoices straight to your finance system. Download this overview to learn more.