transact

Results 126 - 150 of 655Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Feb 08, 2018
CNP fraud is showing no signs of deceleration and is, in fact, expanding rapidly. New trends and new threats call for a revolutionary approach to effectively stop fraud. Learn how to deploy solutions that can quickly distinguish between genuine and fraudulent transactions and take appropriate action instantly. Explore the CA Risk Analytics Network.
Tags : 
     CA Technologies
By: Rackspace     Published Date: Apr 02, 2019
Traditional retailers seeking to digitalize their brand connections to customers, do so with Eagle Eye AIR, a SaaS platform for creating intelligent, real-time digital and mobile solutions for promotions, loyalty programs, rewards and more. With rapid business growth, the volumes of transactions processed per second are constantly being rewritten – yet, its customers’ transactional throughput keeps running smoothly – which is all thanks to the successful migration of its dedicated infrastructure to Google Cloud Platform (GCP). Being a longstanding customer of Rackspace, Eagle Eye trusted the Rackspace Managed Services team in providing expert guidance for every stage of its migration project – which is part of a bigger exercise to transform its technical capabilities.
Tags : 
     Rackspace
By: HERE Technologies     Published Date: Sep 26, 2018
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. U.S. marketers are poised to double their spend on location-targeted mobile ads between 2017 and 2021 to $32 billion, according to research firm BIA/Kelsey. Understanding location is key to gaining insights and making change. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them. This gives them well-timed and relevant advertising.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: HERE Technologies     Published Date: Sep 26, 2018
Adsquare offers brands insights into customer behaviours and footfall to underpin digital marketing campaigns. Using a detailed brief of the audience the brand wishes to reach, Adsquare gathers data from a range of mobile, online and offline sources. This rich data gives a brand a stronger opportunity to create relevant campaigns for their audiences. It is critical to adsquare’s success that its data sources are reliable. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is building and sharing real-time location intelligence with adsquare which reveals patterns to show how and why customers make transactions in specific places. and why customers make transactions in specific places.
Tags : 
     HERE Technologies
By: HERE Technologies     Published Date: Sep 26, 2018
How can brands make the most of the growing opportunities offered by location data? Understanding location and its connection to customer behaviour is key to gaining full and reliable insights and making efficient change. HERE is building and sharing real-time location intelligence which reveals why customers make transactions in specific places. HERE’s Open Location Platform contextualises consumer motivations in the world around them. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE also shares its own insights into the future of reaching customers on their mobile devices as they travel, including in-car advertising.
Tags : 
     HERE Technologies
By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI built a transaction monitoring cognitive data lake to facilitate AML transaction monitoring across post trade transactions for a leading global bank, which resulted in reduction of human errors by 30% and TAT improvement by 50%. Download Complete Case Study.
Tags : 
     Larsen & Toubro Infotech(LTI)
By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI helped a leading global bank digitize its traditional product ecosystem for AML transaction monitoring. With the creation of a data lake and efficient learning models, the bank successfully reduced false positives and improved customer risk assessment. Download Complete Case Study.
Tags : 
     Larsen & Toubro Infotech(LTI)
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
     Cisco Umbrella EMEA
By: IBM     Published Date: May 17, 2016
Analyst Mike Ferguson of Intelligent Business Strategies writes about the enhanced role of transactional DBMS systems in today's world of Big Data. Learn more about how Big Data provides richer transactional data and how that data is captured and analyzed to meet tomorrow’s business needs. Access the report now.
Tags : ibm, intelligent business solutions, big data, transaction data, business analytics
     IBM
By: IBM     Published Date: Jul 05, 2016
This white paper discusses the concept of shared data scale-out clusters, as well as how they deliver continuous availability and why they are important for delivering scalable transaction processing support.
Tags : ibm, always on business, cloud, big data, oltp, ibm db2 purescale, networking, enterprise applications, data management, data center
     IBM
By: IBM     Published Date: Jul 05, 2016
This white paper is written for SAP customers evaluating their infrastructure choices, discussing database technology evolution and options available.
Tags : ibm, always on business, analytics, database, database platform, sap, blu, db2, networking, enterprise applications, storage, data management
     IBM
By: IBM     Published Date: Jul 19, 2016
This video demonstrates how IBM’s Behavior Based Customer Insight for Banking leverages predictive analytics to help you personalize customer engagement and deliver customized actions. The solution leverages advanced predictive models to analyze customer transactions and spending behavior to more deeply understand customer needs and propensities, anticipate life events, and help provide a unique customer experience.
Tags : ibm, banking, finance, consumer insights, business intelligence, business anlytics, enterprise applications
     IBM
By: IBM     Published Date: Jul 19, 2016
Learn new ways of analyzing digitally connected customers-from dynamic segmentation to the use of advanced analytics. With predictive tools, banks can analyze transactions and spending behavior to better understand customer needs, anticipate life events, and provide a unique experience.
Tags : ibm, banking, finance, consumer insights, business intelligence, business anlytics, enterprise applications
     IBM
By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : security. ibm, ibm i2, cyber-intelligence, fraud, malware
     IBM
By: Workday     Published Date: Mar 01, 2018
A cloud-based system for finance frees your finance team to do more than manage controls and transactions. But choosing one that supports your goals today and into the future, while helping your finance team act strategically, can be difficult. Read this whitepaper for guidance in selecting a system.
Tags : cloud-based system, strategically, finance
     Workday
By: Workday     Published Date: Jan 17, 2019
At Workday, we take a unique approach to development. We build one technology platform, on a single codeline, giving you a single security model and one source of truth. See how our singular methodology delivers real-time transactional data everyone can trust.
Tags : methodology, security model, technology
     Workday
By: Workday     Published Date: May 09, 2018
A cloud-based system for finance frees your finance team to do more than manage controls and transactions. But choosing one that supports your goals today and into the future, while helping your finance team act strategically, can be difficult. Read this whitepaper for guidance in selecting a system.
Tags : 
     Workday
By: Dell Software     Published Date: Oct 03, 2013
Download Transaction-Centric vs. Infrastructure Centric Application Performance Management from TRAC Research to examine the major differences between the two approaches, the pros and cons of both in difference use cases, and finally which technology better fits your organization.
Tags : transaction, dell foglight, apm, infrastructure, technology, application performance management, best practices, enterprise applications, data management
     Dell Software
By: Oracle     Published Date: Mar 09, 2017
In this white paper, IDC discusses the inherent difficulties associated with traditional backup schemes and the changing dynamics of data protection strategies. We examine Oracle's Zero Data Loss Recovery Appliance (ZDLRA) and the role it can play in providing significantly improved service levels for all types of Oracle databases.
Tags : 
     Oracle
By: Mitel     Published Date: Mar 30, 2017
You know the way we communicate with each other has evolved, but what about the way your business communicates with your customers? A third of the US population is made up of millennials that use multiple channels when reaching out or making a purchase, so how does this shift affect your bottom line? More importantly, how closely aligned is your customer experience strategy with how customers are buying? Looking for some clarity? Check out this infographic for a clear understanding of how customers are shopping, why they abandon your transactions, and what steps you can take to keep them happy.
Tags : customer experience, sms, email, web chat, social media, mobile, networking
     Mitel
By: Rackspace     Published Date: Apr 15, 2019
Scale events — like online sales and digital product launches — present great revenue opportunities, but they also present large risks to your business. Whether you are a retailer preparing for Black Friday and Cyber Monday, or a digital vendor launching a new service, your brand is both at its most visible and its most vulnerable during these scale events. Many more customers visit your site over a short period of time, raising the potential for resource constraints and discovery of software bugs. Information about issues spreads quickly via social media and news outlets. And, your customers typically spend more per transaction, so every lost order has a greater negative impact on your bottom line. Site reliability engineering (SRE) can help you better prepare for scale events through an iterative cycle of data-driven improvement.
Tags : 
     Rackspace
By: LifeLock     Published Date: Aug 23, 2016
In an always-on, ever connected world, the risk of identity theft is real. There is a new identity fraud victim every two seconds. LifeLock identity theft protection helps safeguard against identity fraud by monitoring millions of transactions per second provide services that remediation-only or credit monitoring-only services don’t offer – with no benefit deductible or service co-pay.
Tags : best practices, identity theft, security, protection
     LifeLock
By: Fiserv     Published Date: Sep 14, 2017
Sanctions screening and fraud prevention solutions use real-time detection to prevent terrorist financing and financial crime; whereas anti-money laundering (AML) primarily follows an “observe and report” process. Such a process is all that is currently required by many regulators. Increasingly though, international compliance teams are choosing to stop transactions before they are executed – based on suspicions of money laundering activity. More and more, the industry has been asking itself if this approach of rejecting suspicious activity is a more effective strategy to prevent money laundering. This paper explores where and why AML real-time detection might make sense as a new paradigm for global financial institutions.
Tags : aml, anti-money laundering, compliance, regulatory compliance, financial crime, financial crimes, financial action task force, fatf, customer due diligence, cdd, aml monitoring solutions, currency transaction reporting
     Fiserv
By: Fiserv     Published Date: Sep 14, 2017
Global anti-money laundering (AML) standards have long required that understanding beneficial ownership be a part of a financial institution’s AML program. Beneficial ownership outlines the identity of individuals with a controlling interest in a privately held company, enabling a financial institution to understand the ultimate beneficiary of a financial transaction. Identifying beneficial ownership can be a complex process, but it’s one that institutions must conquer if they are to remain in compliance with industry rules and legislation.
Tags : anti-money laundering, aml, aml software, anti-money laundering software, beneficial ownership, risk management, aml requirements, complex ownership structures, financial action task force, fincen, financial crimes enforcement network, eu aml directive
     Fiserv
By: Fiserv     Published Date: Nov 08, 2017
Featuring Andy Schmidt, Principal Executive Advisor Knowing your customer is key to driving a successful strategy for client security and retention. Watch this video to get a picture of how KYC can be deployed for risk minimization, work with compliance, and make security measures more frictionless using cutting edge technology.
Tags : kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
     Fiserv
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com