TITLE

A CORE UPGRADE FOR A CORE COMPETENCY

AUTHOR(S)
Adams, John
PUB. DATE
September 2010
SOURCE
Bank Technology News;Sep2010, Vol. 23 Issue 9, p18
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the outsourcing of Texas-based United Central Bank (UCB) on its Small Business Administration (SBA) core processing to Fiserv to manage the technology infrastructure and its 2.6 billion dollars institution. Luke Lively, the chief executive officer (CEO) of UCB, states that they had to manage the company's account standards for a very broad customer due to client diversity. The new system of UCB includes account processing, Internet banking and cash management.
ACCESSION #
54479473

 

Related Articles

  • Fiserv readies option in cash management for midrange system. Hellauer, Brian // American Banker;11/3/1993, Vol. 158 Issue 211, p19 

    Reports on Fiserv Inc.'s development of a cash management option for its Comprehensive Banking System (CBS) division. CBS as integrated banking software package designed for AS/400 line of midrange computers from International Business Machines (IBM); Software's functions; Components.

  • Fiserv Finds a Low-Tech Edge in Handling Currency . Roth, Andrew // American Banker;6/4/2001, Vol. 166 Issue 106, p23 

    Reports that Fiserv Inc. is seeking bank partners in the United States to form a company that would manage large-scale cash handling operations. Significance of the paper processing capabilities of the company; Reasons why the company is veering away from electronic cash management platforms.

  • Can PKI Live Up to Its Promise of Meeting HIPAA Requirements? Palmer, Pete // Health Management Technology;Apr2003, Vol. 24 Issue 4, p60 

    Focuses on the use of public key infrastructure (PKI) technology. Requirements for the security of patient-identifiable information for PKI; Approaches in doing cross-certification; Efficiency of the certificate authority model.

  • Fed plan exposes 'Net's' weak links. Marsan, Carolyn Duffy // Network World;10/7/2002, Vol. 19 Issue 40, p1 

    Enumerates the weak links of the Internet infrastructure. Components of the Internet that are most vulnerable to computer security violations; Problems encountered by the Internet engineering community in devising ways of strengthening the components.

  • PKI Guidelines.  // Software World;Jul2003, Vol. 34 Issue 4, p23 

    Reports on the release of three public key infrastructure (PKI) interoperability papers by the non-profit European E-Business Association. Technical guidance for organizations wishing to benefit from the services delivered by PKI; Implications of PKI for the vendor community; Challenges for the...

  • IMS PLATFORM JUSTIFICATION IN COMPETITIVE TELECOMMUNICATION ENVIRONMENT. Osmanli, Aleksandar; Iliev, Alanas // International Journal on Information Technologies & Security;2015, Vol. 7 Issue 3, p3 

    The IP Multimedia Subsystem (IMS) platform allows service interoperability across network operators, open interfaces between network elements, and equipment interoperability between infrastructure vendors and applications [1], [2], Without going deeply in technical, but rather business and...

  • In-house or out: how to start building a PKI.  // Computer Weekly;7/29/2003, p26 

    When it comes to implementing a public key infrastructure (PKI), companies can choose between using a public certification authority (CA), operating a private CA or using a public CA organization to operate an outsourced private CA on their behalf. The in-house approach provides the maximum...

  • Whats Up Gold Gets Virtual. Sturdevant, Cameron // eWeek;7/18/2011, Vol. 28 Issue 12, p8 

    The article offers brief information on WhatsUp Gold version 15, the network management software that integrates physical and virtual infrastructure performance.

  • Gaining Trust for Digital Signatures. Minihan, Jim // AIIM E-DOC;Jul/Aug2003, Vol. 17 Issue 4, p12 

    Explains how public key infrastructure (PKI) can create an environment of trust that can promote the use of digital signatures on electronic documents. Trust-related issues associated with the use and acceptance of digital signatures; Overview of PKI; Advantages offered by PKI.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics