Software  >   Applications Software  >   Consumer Applications Software  >   Games and Entertainment Software  >   Electronic Games  >  

Console Games

RSS Feed    Add to Google    Add to My Yahoo!
Console GamesWhite Papers (View All Report Types)
 
Securing your company's digital assets so they don't fall into the wrong hands
sponsored by K2
WHITE PAPER: Access this brief paper to learn how Square Enix Europe, a video game creator, improved the security of its mastering request process, which ultimately helped the company ensure top quality of its products.
Posted: 25 Nov 2014 | Published: 31 Dec 2013

K2

Best Practices to Accelerate IPv6 Migration Testing
sponsored by Mu Dynamics
WHITE PAPER: Avoid IPv6 migration nightmares and integration challenges and gain control of skyrocketing costs by following best practices for IPv6 migration testing and taking a unified approach to testing with Mu Dynamics’ IPv6 testing solution. Read this paper to find out so much more.
Posted: 30 Sep 2010 | Published: 30 Sep 2010

Mu Dynamics

Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Accellion, Inc.

From Audit Compliance to App Stores, Accelerate your Move to Software Asset Management
sponsored by IBM
WHITE PAPER: This exclusive whitepaper will help you prepare for a software audit now and in the future.
Posted: 25 Jul 2014 | Published: 09 May 2013

IBM

HR in the Cloud
sponsored by Workday
WHITE PAPER: This whitepaper examines the five big trends that are pushing adoption, examining each trend in-depth and explaining exactly why it is driving a need for SaaS.
Posted: 07 Oct 2014 | Published: 25 Feb 2013

Workday

Enabling a Pragmatic Journey to the Cloud
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper highlights a provider that offers cloud solutions that are simple, highly adaptable, and are seamlessly scalable.
Posted: 23 Oct 2014 | Published: 01 Jul 2014

Juniper Networks, Inc.

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Big Data at Work: Dispelling the Myths, Uncovering the Opportunities
sponsored by SAS
WHITE PAPER: In this white paper, Thomas Davenport separates fact from fiction when it comes to big data.
Posted: 10 Jul 2014 | Published: 03 Mar 2014

SAS

The Development of the Internet of Everything
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you an exclusive insight into the IoE world we're rapidly moving towards. Download it now for access to information to help you develop business strategies for an interconnected world, command mobile environments to deliver data faster, and more.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

Reddo Mobility: The Fast Path to Mobilizing Desktop Applications
sponsored by Reddo Mobility
WHITE PAPER: Read this white paper to learn about a new way to deliver your business critical apps to mobile interfaces without the need for coding. Your users will experience the apps as they look and feel on the desktop, but in the comfort of their hands on their smartphone or tablet.
Posted: 17 Nov 2014 | Published: 03 Nov 2014

Reddo Mobility
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement