IT Services  >   Internet Services  >   Internet Recreational Services  >  

Electronic Gaming

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Gaming White Papers (View All Report Types)
 
Social Gaming in the Cloud: A Business White Paper
sponsored by RightScale
WHITE PAPER: Major gaming publishers such as Zynga, Crowdstar and Playfish use RightScale to scale to tens of millions of players per day. RightScale has the experience and tailored solution for launching and managing social games on the cloud.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

RightScale

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Akamai Insight: Time to Market Matters for Online Video Media
sponsored by Akamai Technologies
WHITE PAPER: Akamai, with Stream OS, provides a streamlined video distribution workflow and a scalable, global distribution platform to get more media to market, faster than ever.
Posted: 20 May 2008 | Published: 01 May 2008

Akamai Technologies

Ansible In Depth: A Playbook for Complex IT Orchestration
sponsored by Red Hat
WHITE PAPER: Discover in this white paper an in-depth overview of IT configuration management, deployment, and orchestration tool Ansible, accessible for all skill levels and purpose-built for easily deploying workloads to public and on premise clouds.
Posted: 08 Jul 2016 | Published: 08 Jul 2016

Red Hat

A CIO's Guide to Rethinking IT Service Management
sponsored by Cherwell
WHITE PAPER: CIOs and senior IT executives need to adapt the way they approach IT service management in response to their new roles as business strategists. Access this white paper to learn how CIOs are restructuring their ITSM strategies to assist in their new roles as business value drivers, as well as what to look for in a modern ITSM platform.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cherwell

Failing to Plan is Planning to (IT) Sprawl
sponsored by OnBase by Hyland
WHITE PAPER: If left unchecked, IT sprawl can get the best of your organization. Redundant applications and disconnected information silos cause inefficiency to rise and customer satisfaction to fall. In this white paper, see how the right information platform can help you architect an environment that puts the brakes on IT sprawl.
Posted: 15 May 2017 | Published: 15 May 2017

OnBase by Hyland

8 KPI's every MSP Should Consider
sponsored by Nerdio
WHITE PAPER: Download this white paper to uncover the eight KPIs specifically helpful to MSPs looking to grow their business, as well as specific advice on how to improve these figures in your workflow.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Nerdio

Why Choose IBM as your technical support service provider
sponsored by IBM
WHITE PAPER: This white paper discusses the important qualities a technical support provider should have, including flexibility, responsiveness, consistency, and more. Read on to see how choosing a technical support provider that focuses on quality and adding value to your organization will enhance your IT infrastructure and help you mitigate business risks.
Posted: 10 Nov 2015 | Published: 31 Jul 2012

IBM

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Website Security Solutions
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Website Security Solutions

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement