Loan Agencies Reports

Intelligent, Integrated Enterprise: The Mortgage Business
sponsored by Red Hat
VIDEO: This video provides a brief overview of how service-oriented architectures (SOAs) can help the mortgage industry stay on track and provide good service to its customers.
Posted: 08 Nov 2011 | Premiered: 08 Nov 2011

Red Hat

Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Financial markets regulatory outlook 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 08 Feb 2021 | Published: 20 Jan 2017

TechTarget ComputerWeekly.com

Computer Weekly – 30 July 2019: Digital takes the racing line in Formula One
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CIO of Formula One racing team Haas F1 to find out how technology is helping to compete with better-funded rivals. We examine the latest best practice advice on disaster planning. And we look at what the troubles at Deutsche Bank tell us about the rise of fintech startups. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Focus: Financial services in the cloud
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we'll take a look at how some of the world's biggest financial brands are moving to the cloud, and share a cautionary tale or two about the mistakes some have made while trying to get there.
Posted: 08 Feb 2021 | Published: 31 Jul 2017

TechTarget ComputerWeekly.com

The Digital Transformation Agenda
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This survey of business leaders by the Economist Intelligence Unit for Pegasystems finds that businesses are mostly confident they will reach their digital transformation agendas, but senior business leaders need to be more closely involved.
Posted: 08 Feb 2021 | Published: 09 Jan 2017

TechTarget ComputerWeekly.com

Fintech: Meet ten financial services disruptors - Part One
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we meet ten up-and-coming financial services disruptors. This series of interviews were originally published on the Computer Weekly blog: Fintech Makes the World go Around.
Posted: 08 Feb 2021 | Published: 07 May 2019

TechTarget ComputerWeekly.com

Paving the Way for Business Innovation with Integrated Business Communications
sponsored by IBM Software Group
WHITE PAPER: This paper provides an overview of opportunities and benefits and includes two "before and after" scenarios -- one in financial services and one in healthcare -- that demonstrate how IBM clients have benefited from integrated business communications.
Posted: 20 Jun 2007 | Published: 01 Jan 2007

IBM Software Group

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.