Casinos White Papers

(View All Report Types)
Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Case Study: Eldorado Hotel Casino & Silver Legacy Resort Casino
sponsored by NEC Corporation
CASE STUDY: Read this case study to learn how Eldorado Hotel Casino & Silver Legacy Resort Casino enhanced guest experience, discovered new revenue streams, streamlined employee workflow, and lowered total cost of ownership by implementing UNIVERGE communications framework and servers.
Posted: 24 Aug 2009 | Published: 05 Aug 2009

NEC Corporation

Case Study: How One Casino Boosted Backup
sponsored by Dell EMC
CASE STUDY: Tape-based backup wastes IT resources. Learn how a new product slashed both backup and recovery times for one business.
Posted: 12 May 2015 | Published: 12 May 2015

TOPICS:  IT Management
Dell EMC

Infor CRM Epiphany for Hospitality
sponsored by Infor CRM
BROCHURE: Infor CRM Epiphany for Hospitality provides the integrated marketing, customer service, and analytics capabilities hotels, casinos, and other hospitality companies need to deliver exceptional service at every touch point.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Infor CRM

WagerWorks Takes Fraudsters Out of the Game Using iovation Device Reputation
sponsored by iovation, Inc.
CASE STUDY: In this paper WagerWorks covers how to deal with fraud challenges and resolution requirements of the casino industry.
Posted: 14 Dec 2009 | Published: 11 Dec 2009

iovation, Inc.

EMC Backup and Recovery Solutions for VMware: Customer Success Profiles
sponsored by EMC Corporation
WHITE PAPER: The customers in this compilation all share one common story: They turned to EMC solutions to address the backup and recovery challenges they faced while implementing a virtualised server environment.
Posted: 22 Apr 2010 | Published: 22 Apr 2010

EMC Corporation

Genesis Wireless Brings Service to Resort, Builds Revenue
sponsored by Motorola Solutions
WHITE PAPER: Check out this brief case study to learn how Genesis Wireless implemented Motorola wireless broadband solutions to produce significant cost savings and provide enhanced reliability.
Posted: 29 May 2008 | Published: 01 May 2008

Motorola Solutions

Vestcom International: Personalization Drives Repeat Business
sponsored by Exstream Software
CASE STUDY: Vestcom International is a New Jersey-based firm that offers end-to-end personalized communication solutions. Vestcom used Exstream Software's Dialogue solution to design a sophisticated relationship management program that is fostering...
Posted: 24 Apr 2008 | Published: 01 Jan 2004

Exstream Software

Buffalo Studios Maximizes Data Value to Build Competitive Edge in Social Gaming
sponsored by Talend
CASE STUDY: Find out how one organization maximizes big data value to build a competitive advantage within their industry.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Talend

Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.
Posted: 15 Sep 2023 | Published: 19 Sep 2023

TechTarget ComputerWeekly.com

Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
Posted: 22 Sep 2023 | Published: 26 Sep 2023

TechTarget ComputerWeekly.com

Media Conversion in Video Security and Surveillance Systems
sponsored by Transition Networks, Inc.
WHITE PAPER: This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

Transition Networks, Inc.

Computer Weekly – 17 July 2018: How container technology is evolving
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as adoption of containers grows rapidly, we look at the choices and potential benefits of the technology, the efforts being made to secure internet of things devices and how the latest Brexit plans will affect the UK tech sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Jul 2018

TechTarget ComputerWeekly.com

MGM Breach Case Study
sponsored by Crytica Security, Inc.
CASE STUDY: Crytica’s specialization in monitoring and detection allows them to stop breaches before they happen. This case study takes an in-depth look at a security breach perpetrated by ALPHV (aka BlackCat) against MGM, which cost $110 million in damages. Read on to learn more.
Posted: 12 Dec 2023 | Published: 12 Dec 2023

TOPICS:  .NET
Crytica Security, Inc.

Spinning Context Into Web Design
sponsored by TechTarget Content Management
EBOOK: In this resource, experts determine the increasing relevancy of WCM from the perspective of the always-on customer. Access now to uncover methodologies for planning, customizing, and distributing content within the context of each user.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

TechTarget Content Management

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by TechTarget Security
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

TechTarget Security

Computer Weekly – 17 October 2023: The Most Influential Women in UK Technology 2023
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
Posted: 16 Oct 2023 | Published: 17 Oct 2023

TechTarget ComputerWeekly.com

Strengthen Health IT Security, Maintain HIPAA Compliance
sponsored by PatientKeeper
EGUIDE: Download this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

PatientKeeper

Backup Apps: State of the Art
sponsored by TechTarget Storage
EDITORIAL RESOURCE GUIDE: Check out this expert January 2013 Storage Handbook to explore backup apps going into the new year, and get the scoop on cloud backup and DR, snapshots, VM backups and big data protection.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

TechTarget Storage

Creating a Culture of Compliance for Company-Issued Card Usage and Travel Expenses
sponsored by Oversight Systems
WHITE PAPER: Despite the level of convenience that a company credit card can provide, many organizations find that it can increase the chances of non-compliant behavior, leading to a handful of challenges. So, how can your business best new policies? Access this white paper to learn more.
Posted: 10 Aug 2023 | Published: 10 Aug 2023

TOPICS:  .NET
Oversight Systems

Tools and Tech to Manage Wireless Network Connections
sponsored by TechTarget Networking
EBOOK: Managing wireless networks is complicated by the constant change in the tools and technology network pros need to do their job.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

TechTarget Networking

6 Lessons from SASE Innovators
sponsored by Palo Alto Networks
EBOOK: As much as remote work and increased cloud footprints have improved business agility, they have also posed network security issues for modern organizations. To remedy those issues, many businesses have adopted SASE. Check out this e-book to explore SASE success stories in six industries.
Posted: 21 Nov 2023 | Published: 21 Nov 2023

TOPICS:  .NET
Palo Alto Networks

How to Approach Storage Disaster Recovery
sponsored by Rubrik
EGUIDE: In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
Posted: 22 Aug 2016 | Published: 18 Aug 2016

Rubrik

How to Comply with the HPAA Security Rule
sponsored by Redspin, Inc.
EGUIDE: The HITECH Act has helped to not only increase productivity, but to streamline data exchange. While this increased efficiency, there are also many requirements that must be met in order ensure that these exchanges are HIPAA compliant. In this e-guide, learn how a well implemented security program can secure patient medical records.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Redspin, Inc.

ANZ--Storage Magazine October 2014
sponsored by TechTarget Storage
EZINE: This issue looks at the storage challenges facing the retail industry with more and more customer data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

TechTarget Storage