Vertical Industries  >   Leisure Industry  >  

Gaming Activities

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Activities White Papers (View All Report Types)
Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Case Study: Travel Agency Builds Business and Cuts Costs with the Right VDI
sponsored by VMware
WHITE PAPER: In this white paper, discover how a travel agency found an easily-deployable VDI solution that enabled them simplify IT management while streamlining business.
Posted: 27 May 2015 | Published: 31 Dec 2010


UK Tour Operator Leverages the Cloud for Peak Booking Periods
sponsored by IBM
WHITE PAPER: In this case study, explore how the United Kingdom's largest tour operator mapped out a new IT system strategy using cloud resources for improved performance during its twice-annual business peaks.
Posted: 31 Jul 2015 | Published: 31 Jul 2015


Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007


Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

The Digital Enterprise
sponsored by
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

CW+: Online in the afterlife
sponsored by
WHITE PAPER: There is no escaping technology – even in death. Technology is woven into now almost every part of ourlives and as a consequence is something we need to consider when preparing a will in the event of death.
Posted: 21 Oct 2011 | Published: 06 Aug 2010

Storage Through the Looking Glass
sponsored by
ANALYST REPORT: This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.
Posted: 17 Sep 2015 | Published: 20 Jan 2015

Blue Coat Systems

IT Case Study: Overtake Medical Center Enhances Healthcare Applications
sponsored by F5 Networks
WHITE PAPER: This white paper serves as a case study of Overlake Medical Center, and outlines how to provide secure remote access to all enterprise applications and network resources for healthcare facilities, as well as how to manage these apps with a small IT team.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

F5 Networks

Creating a Successful Road Map for Cloud Deployment
sponsored by IBM
EBOOK: View this informative resource to access critical steps needed on the journey to meet your business needs and long-term career goals.
Posted: 08 Jul 2015 | Published: 01 Nov 2014


Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats
sponsored by
IT BRIEFING: The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues.
Posted: 05 Jan 2012 | Published: 05 Sep 2011

How Cloud-Based Mobile Device Security Streamlines Data Protection
sponsored by
WHITE PAPER: Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

Critical Security Controls for SSL/TLS Management
sponsored by Venafi
WHITE PAPER: In this SANS report, you'll find specific recommendations for managing SSL/TLS security and protecting your keys and certificates.
Posted: 18 Sep 2015 | Published: 30 Jun 2015


Application data security risks on Android devices
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

BYOD Policy Creation Tips from Gartner
sponsored by
EGUIDE: This expert e-guide offers key tips for creating a comprehensive Bring Your Own Device (BYOD) policy for compliance, consistency, security, and availability. Learn how you can get started by clicking through now.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Big Data and Content Analytics: measuring the ROI
sponsored by
ESSENTIAL GUIDE: Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

Cyber Security Intelligence for 2015
sponsored by IBM
WHITE PAPER: This resource breaks down the cyber-attacks of 2014, presenting an overview of cybercrime that can help you stay safe in 2015.
Posted: 04 Sep 2015 | Published: 31 Aug 2015


Game of Phones: Which Device Will Rule EMM for All?
sponsored by IBM
WEBCAST: This webcast shows how the top EMM operating system contenders stack up: iOS, Android, and Windows. Click here to see which OS overcomes its competitors in the battle for EMM supremacy.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015


Endpoint Management - IT handbook
sponsored by
EBOOK: Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider.
Posted: 13 Sep 2012 | Published: 13 Sep 2012

Restore Balance with Next Generation Authentication Technical Guide
sponsored by
EGUIDE: Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

Delivering Cloud-Based Mobile Apps to the Enterprise
sponsored by Dimension Data
EGUIDE: In this exclusive e-guide, learn expert tips for delivering cloud-based mobile apps to the enterprise. Read on to discover the two basic models for application delivery clouds and how the hybrid cloud is becoming an increasingly popular choice for enterprise mobile cloud delivery.
Posted: 25 Sep 2015 | Published: 25 Sep 2015

Dimension Data

The Future of Threat Intelligence for the Service Provider
sponsored by Webroot
WHITE PAPER: This white paper examines the unique opportunities today's threat landscape to service providers and discusses how you can best provide threat intelligence to your clients.
Posted: 31 Aug 2015 | Published: 31 Aug 2015


Computer Weekly – 7 July 2015: The IT behind Angry Birds
sponsored by
EZINE: In this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

Drive business growth with mobile workspaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how mobile workspaces give employees the flexibility to work from anywhere, on any device, at any time while maintaining full security and compliance and discover a mobile workspace strategy that provides the tools to get started implementing an enterprise mobility strategy today.
Posted: 18 Sep 2015 | Published: 29 Aug 2014

Dell, Inc. and Intel®

Lifecycle of the Advanced Persistent Threat
sponsored by Dell SecureWorks
WHITE PAPER: Advanced persistent threats (APT) are a concern for businesses across all industries, as they can pose a threat to an organisation's data, systems, financial assets, and reputation. This analysis explains how to develop an effective and efficient defence strategy that will help you prevent, identify and resolve APTs.
Posted: 18 Jul 2012 | Published: 16 Jul 2012

Dell SecureWorks

Rethinking MDM in a BYOD World
sponsored by
WHITE PAPER: Discover the ins and outs of the Bring Your Own Device (BYOD) trend and why traditional mobile device management solutions are no longer sufficient. Also inside, learn a security strategy that will keep your enterprise protected.
Posted: 01 Nov 2012 | Published: 01 Nov 2012
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement