EGUIDE:
The Nordic region is a place where people aren't afraid to try out the latest digital technologies. In banking for example, the region is leading the way in the age of open banking. Read here why this might be the case. But it goes way beyond the technology itself and has a lot to do with the attitude to change in the region.
EGUIDE:
In this e-guide we meet ten up-and-coming financial services disruptors. This series of interviews were originally published on the Computer Weekly blog: Fintech Makes the World go Around.
EGUIDE:
In this e-guide, we'll take a look at how some of the world's biggest financial brands are moving to the cloud, and share a cautionary tale or two about the mistakes some have made while trying to get there.
EGUIDE:
In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.
BOOK:
This IBM Redbook discusses how to install and configure the components of the Systems Solution for Branch Banking, a hardware and software solution that enables banks to provide a common, easy-to-support IT infrastructure in their branc...
EGUIDE:
The combination of poor reference data management and the Dodd-Frank Wall Street Reform and Consumer Protection Act is creating a data management mess for many in the financial sector. Access this expert resource to explore how organizations can start preparing to meet new compliance regulations and increase data transparency.
WHITE PAPER:
This white paper explores how business process management (BPM) can be used to streamline corporate payment operations for increased customer satisfaction and significantly reduced operational costs.
WHITE PAPER:
In this survey you will learn how asset management has changed over the years and the different challenges asset management professionals have been facing.
EGUIDE:
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.