Monday, May 30, 2011

Verafin uses fuzzy logic and AI to fight bank fraud and money laundering

How to Turn a Great IT Idea Into a Commercial Success | From the CEO: The Next Big Land Grab Is Business Process

Network World IT Best Practices

Forward this to a Friend >>>


Verafin uses fuzzy logic and AI to fight bank fraud and money laundering
Bank fraud and money laundering are big business for criminals and big headaches for financial institutions. Fraud losses run into billions of dollars every year. Verafin is putting a dent in those loss figures with its consolidated anti-fraud and anti-money laundering solution. Fuzzy logic, artificial intelligence and broad databases are the keys to detecting and often preventing malfeasance. Read More


WHITE PAPER: F5 Networks

Providing Security and Acceleration for Remote Users
Delivering applications to remote users is a significant undertaking. Applications need to be available, and they must be delivered securely and quickly. Through a range of products, F5 has solved the security plus acceleration challenge for remote users with BIG-IP Edge Gateway and BIG-IP APM. Read More!

WHITE PAPER: F5 Networks

Hardware Load Balancing
A comprehensive F5 solution readies application infrastructure for a successful implementation of the re-engineered Microsoft Exchange Server 2010. Learn More!

How to Turn a Great IT Idea Into a Commercial Success
Entrepreneurial CIOs at Union Pacific, FedEx and other companies tell how they're transforming internal IT into revenue-generating products Read More


WHITE PAPER: Diskeeper Corporation

NEW Diskeeper 2011 Pro Premier Edition
Diskeeper 2011 Pro Premier edition provides essential performance and efficiency increases for power workstation users as well as all the features of the Professional edition. Learn more!

From the CEO: The Next Big Land Grab Is Business Process
CIOs can raise their business-value quotient by taking ownership Read More


WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

Moving Past Old Technology to New Value
How CIOs are managing being tethered by their IT infrastructure Read More

Cloud CIO: How IT Can Become a Cloud Service Provider
One of the aspects of cloud computing I find most fascinating is the fact that much, if not most, of the discussion about it focuses on how it affects infrastructure. Boiled down, most people spend their time thinking about what hypervisor should underpin their cloud, what server form factor should host their cloud, what storage device should persist their virtual machines, and so on. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. Windows 1.0: Still playing Reversi after all these years
  2. IE flaw could allow hackers access to accounts
  3. Apple sues teenager who sold white iPhone 4 conversion kits
  4. RSA tokens may be behind network security problems at Lockheed Martin
  5. Skype voice service crashes; users offered fix instructions
  6. Google Wallet: Five things you need to know
  7. Cisco is a top 3 server vendor
  8. Microsoft not to blame for Skype rejecting open source company
  9. Two convicted in U.S. over counterfeit Cisco gear
  10. Insider data theft costs Bank of America $10 million

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment