trading

Results 51 - 75 of 82Sort Results By: Published Date | Title | Company Name
By: Qlik     Published Date: Feb 15, 2016
This research snapshot shows the five critical areas for improvement to unlock further value from analytics.
Tags : qlik, data analytics, business analytics, algorithmic trading
     Qlik
By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: Microsoft Corporation     Published Date: Nov 23, 2010
After evaluating Google Apps, SBFI found more value in Microsoft Exchange Online. Now, SBFI employees have the reliable, familiar messaging tools they need to maintain high levels of customer service.
Tags : microsoft exchange online, messaging tool, server e-mail messaging, collaboration software, google apps
     Microsoft Corporation
By: HP Enterprise Services     Published Date: Mar 25, 2014
Learn how HP Recovery Center played a vital role in the business continuity of this Irish finance house, providing the flexibility and expertise needed to transfer trading and business operations within four hours.
Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, enterprise applications
     HP Enterprise Services
By: IBM     Published Date: Apr 15, 2015
Optimize your business processes in the cloud with a next generation BPM strategy — an intelligent Business Platform (iBP) that implements an on demand, “service as you need it” model. Take advantage of Infrastructure as a Service (IaaS) for pure technology - processing, storage, networks with payment based on usage. Develop and manage business processes using the BPM Platform as a Service (BPMaaS), providing the BPMS tools supported by cloud services. Work with live business processes used by customers, suppliers, employees and trading partners, using Business Processes as a Service.
Tags : ibm, optimization, cloud computing, iaas, business platform, data storage, business intelligence
     IBM
By: VSS Monitoring     Published Date: Jul 09, 2014
Learn how to optimize network monitoring in high-frequency trading (HFT) When a millisecond can cost a $1 million-plus, there's no tolerance for packet loss or latency. Download this white paper to learn how: The bursty data traffic of HFT can overwhelm networks & their legacy monitoring systems.
Tags : vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, high frequency trading, it management
     VSS Monitoring
By: Iovation     Published Date: Sep 25, 2009
After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.
Tags : iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading
     Iovation
By: IBM     Published Date: Apr 22, 2014
According to the recent Gartner Magic Quadrant for ON-Premises Integration Suites, application integration patterns were originally applied for internal, application-to-application (A2A) integration and for integrating an organization's applications with that of its trading partners - known as B2B integration. Today, these patterns are applied to a broader array of application integration projects, such as creating new compositions using mobile apps and on-premises back-end services in support of bring-your-own-device initiatives.
Tags : ibm, integration, application integration, application integration suites, mobile apps, back-end services, byod, application integration projects, websphere, a2a, cloud based application integration
     IBM
By: IBM     Published Date: Jan 16, 2015
Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : ibm, b2b services reporting, b2b services analytics, trading partner relationships, business decision making, b2b transactions, transactional data
     IBM
By: IBM     Published Date: Apr 21, 2016
"Reshaping trading partner communities with growth, agility and scalability View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM B2B Cloud Services cite, including: - Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners"
Tags : ibm, b2b, cloud, b2b integration
     IBM
By: IBM     Published Date: Jul 22, 2016
View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations.
Tags : ibm, commerce, b2b, b2b integration, ibm cloud services, enterprise applications
     IBM
By: IBM     Published Date: Jul 22, 2016
IBM B2B Cloud Services comprise a comprehensive set of cloud-based B2B integration features and capabilities, which can be delivered on demand, as fully managed services, or under a hybrid management model. With IBM B2B Cloud Services, enterprises can meet a range of trading partner onboarding and management requirements, as well as improving reliability and performance of and control over multi-enterprise process automations.
Tags : ibm, commerce, swot assessment, ibm b2b cloud services, cloud, b2b, b2b integration, enterprise applications, data center
     IBM
By: IBM     Published Date: Oct 11, 2016
View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM Sterling B2B Cloud Services cite, including: -Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners
Tags : ibm, commerce, b2b, b2b integration, cloud, advantage cloud, networking, enterprise applications
     IBM
By: HP Enterprise Services     Published Date: Mar 24, 2014
Learn how HP Recovery Center played a vital role in the business continuity of this Irish finance house, providing the flexibility and expertise needed to transfer trading and business operations within four hours. The HP continuity solution protected Goodbody’s corporate reputation while meeting regulatory requirements, and more importantly, resulted in no disruption or loss of business for their external customers.
Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, data center
     HP Enterprise Services
By: IBM     Published Date: Mar 18, 2015
More and more companies are moving to the cloud for B2B services, and for good reason. There’s a huge potential for increased visibility and analytics-driven insights to be gained from B2B transactions that can give businesses unprecedented levels of information. But many organizations continue to struggle when it comes to going beyond basic transactional data and historical performance metrics. What does it take to not only report on past activity, but to get real-time alerts, predict future events, manage exceptions, and proactively leverage this wealth of data in order to put it to work? Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : b2b services, ibm, b2b analytics, b2b reporting, transactional data, trading partner relationships, it management, enterprise applications, data management
     IBM
By: HP     Published Date: Sep 04, 2014
National Stock Exchange decreases latency by 50% with the help of HP 3PAR StoreServ Storage and HP ProLiant servers after evaluating storage and server solutions from several vendors to determine which could offer the best performance and availability to support the proprietary, next-generation trading platform.
Tags : stock exchange, latency, storage, 3par, proliant, trading platform, data management
     HP
By: Quocirca     Published Date: Aug 05, 2008
As the EU continues to expand, European businesses must look to how they can trade across increasing numbers of regional boundaries, languages, cultures and laws, both within the EU and across the greater Europe. The opportunities are huge – but the problems will daunt many who wish to enter into a pan-European trading environment.
Tags : quocirca
     Quocirca
By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
     ProofSpace
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
     ProofSpace
By: Trading Concepts     Published Date: Feb 24, 2009
Virtualization is a revolutionary technology that has emerged as one of the hottest trends in the IT segment. If you are not already leveraging the server virtualization wave as a means to deploy cost effective Disaster Recovery, then use this paper as a catalyst to transform your business today: virtualization enables greater efficiencies, faster application and data recovery, and overall cost savings.
Tags : inmage, dr scout, server virtualization, disaster recovery, continuous data protection, cdp, recovery point objectives, rpo, recovery time objectives, rto, vm infrastructure, data management
     Trading Concepts
By: InvestBrite     Published Date: May 05, 2008
Learn how Trade Center needed to reach highly qualified individual investors while educating them on the benefits of their products and services. Read how InvestBrite can help your investment firm get qualified investing sales leads. Read this paper today.
Tags : investor, investing, investbrite, stocks, bonds, trading, trade, stock
     InvestBrite
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com