Conversion Programs Reports

Check Amount Recognition Based on the Cross Validation of Courtesy and Legal Amount Fields
sponsored by Parascript LLC
WHITE PAPER: This paper is devoted to the description of the check reading system developed to recognize amounts on American personal checks.
Posted: 25 Aug 2002 | Published: 01 Jan 1999

Parascript LLC

Computer Weekly - 24 January 2023: BBC under scrutiny over its digital strategy
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the BBC faces in-depth scrutiny over its digital plans – we take a look at progress. Do you need to keep data forever? We examine the technologies behind infinite storage. And we find out about the digital transformation challenges in vehicle dealerships. Read the issue now.
Posted: 23 Jan 2023 | Published: 24 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Apr 2020

TechTarget ComputerWeekly.com

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jun 2019

TechTarget ComputerWeekly.com

Enterprise cloud applications – can we trust them?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016

TechTarget ComputerWeekly.com

A guide to continuous software delivery
sponsored by TechTarget ComputerWeekly.com
EBOOK: Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
Posted: 30 Aug 2022 | Published: 30 Aug 2022

TechTarget ComputerWeekly.com

Marketing software moves closer to centre of the CIO's vision
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Software for marketing, from content marketing through customer experience management to marketing automation, and the rest, has not been as central to the vision of CIOs as ERP and the full panoply of IT infrastructure: storage, security, networking, data centres, and all of the above delivered by way of the cloud.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Computer Weekly – 30 May 2023: Can the UK cash in on chips?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
Posted: 26 May 2023 | Published: 30 May 2023

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to SaaS integration
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Software as a service has seen a rapid increase in deployment since the pandemic. In this 15-page buyer's guide, Computer Weekly looks at the implications of its vast market, the issues it can cause through IT complexity and how to deal with SaaS governance.
Posted: 11 Oct 2023 | Published: 11 Oct 2023

TechTarget ComputerWeekly.com

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.