Infrastructure

08:00 AM
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

Pressures on Bank IT in the Age of Cloud

IT operations face pressures from both business and development teams to provide new and innovative services. Focus is now on keeping ahead of the wave of startups that harness the cloud's rapid business capabilities.
2 of 3

Figure 2
IT operations face pressures from both business and line-of-business development teams.
IT operations face pressures from both business and line-of-business development teams.

2 of 3
Comment  | 
Print  | 
More Commentary
Survey Shows an Urgency to Automate the Back Office
Confluence reports numbers are trending up across the board when discussing the need to automate back-office processes.
7 Pillars of Market Surveillance 2.0
Compliance officers are facing flash crashes, insider trading, market manipulation, and more. Here are seven market surveillance and risk management steps that will help compliance officers sleep better at night.
Stop, Rethink & Recalibrate: A View From Asia Pacific
Technology has made the human element of high- and low-touch trading almost indistinguishable. Brokers can no longer compete on price. Instead, they should build toward user experience and value of outcome.
The Sentient Enterprise: Data Driven as a Strategy, Not a Tactic
Can capital markets take a tip from front-to-back-office customer execution efficiencies and apply it to the investment process?
Dig Deeper for Data: Enriching Wealth Management With New Market Insight
To compete, wealth firms are providing direct electronic access to the content. Exposing the information to their clients is driving an evolution of the traditional advisor value proposition.
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8, October 2014
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.
Video
7 Unusual Behaviors That Indicate Security Breaches
7 Unusual Behaviors That Indicate Security Breaches
Breaches create outliers. Identifying anomalous activity can help keep firms in compliance and out of the headlines.