Transaction Processing (Finance) Reports

Where next for Blockchain?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about how the technology's inherent security makes it tamper-proof, and perfect for keeping and sharing records for transactions in many scenarios. Also, discover why think-tank 'Reform' believes that the government should use blockchain technology for identity assurance services across the public sector.
Posted: 08 Feb 2021 | Published: 12 Dec 2017

TechTarget ComputerWeekly.com

CW Benelux November 2019-January 2020: Dutch banks fight money laundering
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
Posted: 08 Feb 2021 | Published: 31 Oct 2019

TechTarget ComputerWeekly.com

Case Study: Mid-Carolina Electric Cooperative, Inc.
sponsored by Perceptive Software
CASE STUDY: Read this case study of Mid-Carolina Electric Cooperative, Inc. to learn how replacing its old document imaging system with a new low-maintenance full-featured document management, imaging and workflow suite improved allowed for better information sharing and document availability, faster customer service and increased productivity.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

Perceptive Software

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by TechTarget Security
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

Presentation Transcript: Optimizing Business Performance with Automated Accounts Payable Processing for your SAP System
sponsored by ReadSoft
PRESENTATION TRANSCRIPT: In this transcript food pioneer Rich Products shares the strategies that streamlined their payable processes, consolidated AP processing from 19 locations to one and saved them six figures in discounts.
Posted: 05 Nov 2009 | Published: 05 Nov 2009

ReadSoft

Strengthening Governance, Risk, and Compliance in the Banking Industry
sponsored by SAP America, Inc.
ANALYST REPORT: Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. Read this report to learn more. (Economist Intelligence Unit, 2009)
Posted: 05 Jan 2011 | Published: 05 Jan 2011

SAP America, Inc.

Building a Best-Run Finance Organization
sponsored by SAP America, Inc.
WHITE PAPER: This SAP Executive Insight examines the changing role of the finance organization in today's business environment. Further, it describes how companies can develop best-run finance organizations.
Posted: 08 Jun 2009 | Published: 01 Jun 2008

SAP America, Inc.

Case Study: Ocean County Utilities Authority
sponsored by Perceptive Software
CASE STUDY: Read this case study of a New Jersey utility company to learn how replacing their former document imaging system with the ImageNow enterprise content management allowed them to save time, accelerate AP approval processes, streamline cumbersome processes and curb frustration for employees.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

Perceptive Software

Real-Time Risk Monitoring
sponsored by Sybase, an SAP company
WHITE PAPER: Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Sybase, an SAP company

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security