File Conversion Software Reports

Check Amount Recognition Based on the Cross Validation of Courtesy and Legal Amount Fields
sponsored by Parascript LLC
WHITE PAPER: This paper is devoted to the description of the check reading system developed to recognize amounts on American personal checks.
Posted: 25 Aug 2002 | Published: 01 Jan 1999

Parascript LLC

Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Nov 2016

TechTarget ComputerWeekly.com

CW ANZ – Jan 2019: Keeping pace with microservices
sponsored by TechTarget ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

A guide to continuous software delivery
sponsored by TechTarget ComputerWeekly.com
EBOOK: Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
Posted: 30 Aug 2022 | Published: 30 Aug 2022

TechTarget ComputerWeekly.com

Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Using IT initiatives to save money and reinforce green credentials
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.
Posted: 08 Feb 2021 | Published: 05 Jan 2017

TechTarget ComputerWeekly.com

CW@50: March editions of Computer Weekly
sponsored by TechTarget ComputerWeekly.com
EZINE: We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 08 Feb 2021 | Published: 15 Mar 2016

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to intelligent workload management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: One huge advantage digital transformation brings with it is the phenomenon of intelligent workload management. In this 17-page buyer's guide, Computer Weekly looks at the various tools available, asset management best practices and the complications to look out for with hybrid and multicloud deployments.
Posted: 08 Feb 2021 | Published: 13 Nov 2020

TechTarget ComputerWeekly.com

Creating your own future proof Private Cloud with a Software-Defined Datacentre solution
sponsored by OVH
WHITE PAPER: One of the most promising paths to virtualization continues to be a software-defined data center (SDDC). A SDDC gives your organization access to the benefits of the private cloud while also delivering a unified configuration of applications, resources, and infrastructure. Read OVHcloud’s white paper to better understand the basics of the SDDC now.
Posted: 18 Dec 2019 | Published: 18 Dec 2019

OVH

Secure DevOps Brings Better, Faster, Safer Software
sponsored by TechTarget Security
EBOOK: In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
Posted: 03 May 2019 | Published: 03 May 2019

TechTarget Security