Vertical Industries  >   Leisure Industry  >  

Gaming Activities

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Activities White Papers (View All Report Types)
 
Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

UK Tour Operator Leverages the Cloud for Peak Booking Periods
sponsored by IBM
WHITE PAPER: In this case study, explore how the United Kingdom's largest tour operator mapped out a new IT system strategy using cloud resources for improved performance during its twice-annual business peaks.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

IBM

Case Study: Travel Agency Builds Business and Cuts Costs with the Right VDI
sponsored by VMware
WHITE PAPER: In this white paper, discover how a travel agency found an easily-deployable VDI solution that enabled them simplify IT management while streamlining business.
Posted: 27 May 2015 | Published: 31 Dec 2010

VMware

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Playtech case study: Predictive monitoring tools deliver game-changing uptime
sponsored by Hewlett-Packard Limited
WHITE PAPER: Read this white paper to see how automated, integrated monitoring tools helped Playtech monitor web applications predictively to further protect uptime, user experience, and revenue.
Posted: 02 Jun 2015 | Published: 31 Aug 2013

Hewlett-Packard Limited

Are You Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.
Posted: 21 Aug 2014 | Published: 14 Mar 2014

Cisco Systems, Inc.

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

The Digital Enterprise
sponsored by ComputerWeekly.com
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

Business leaders agenda 2012
sponsored by ComputerWeekly.com
RESOURCE: This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

ComputerWeekly.com

The Evolution of Ransomware
sponsored by Symantec Corporation
WHITE PAPER: The white paper gives you an extensive look at the origins, development, and functioning of ransomware.
Posted: 14 Aug 2015 | Published: 06 Aug 2015

Symantec Corporation

Information Security ANZ July 2015
sponsored by TechTarget ANZ
EZINE: Analysts and security experts discuss the current risk factors in the ANZ region.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
sponsored by Webroot
EGUIDE: This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
Posted: 17 Sep 2013 | Published: 17 Sep 2013

Webroot

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

How to Handle Mobile Devices' Impact on the Network
sponsored by SearchNetworking.com
EBOOK: The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

SearchNetworking.com

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Discover the Risks and Rewards Behind a Mobile Workforce
sponsored by SearchSecurity.com
EGUIDE: Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Cloud Security as a Service For Secure Cloud-Based Server Hosting
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks.
Posted: 27 Nov 2013 | Published: 20 Apr 2011

SearchSecurity.com

Threat Intelligence Report: What 2014's Hacks Mean for Today
sponsored by CrowdStrike
WHITE PAPER: This threat intelligence report analyzes some of the biggest hacks of 2014, form Target to the Ukrainian elections, and draws conclusions about what to look for in 2015 and beyond.
Posted: 04 Aug 2015 | Published: 01 Jan 2015

CrowdStrike

Restore Balance with Next Generation Authentication Technical Guide
sponsored by SearchSecurity.com
EGUIDE: Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

SearchSecurity.com

Lifecycle of the Advanced Persistent Threat
sponsored by Dell SecureWorks
WHITE PAPER: Advanced persistent threats (APT) are a concern for businesses across all industries, as they can pose a threat to an organisation's data, systems, financial assets, and reputation. This analysis explains how to develop an effective and efficient defence strategy that will help you prevent, identify and resolve APTs.
Posted: 18 Jul 2012 | Published: 16 Jul 2012

Dell SecureWorks

Big Data and Content Analytics: measuring the ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Website Security Threat Report Part 3
sponsored by Symantec Corporation
WHITE PAPER: Download part 3 of this Website Security Threat Report to discover how the public made criminal's lives easier in falling for the latest social media attacks and online scams. Plus, take an invaluable look ahead and benefit from our security recommendations and best practices.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper reveals the results of a study on why senior executives must get involved in breach management.
Posted: 06 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Storage Through the Looking Glass
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Computer Weekly – 9 June 2015: The file-sharing face-off: Box or Dropbox
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the two most popular tools for cloud-based enterprise file sharing and assess the relative merits of Box and Dropbox. We talk to some of the early pioneers in developing smartwatch apps. And we find out why IT security spending is shifting from prevention to detection and response. Read the issue now.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement