Vertical Industries  >   Leisure Industry  >  

Gaming Activities

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Activities White Papers (View All Report Types)
Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Take a Behavioral Bite Out of Crime
sponsored by Infor
WHITE PAPER: 44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.
Posted: 21 Jul 2016 | Published: 21 Jul 2016


Security Health Check Report: Data & Breaches
sponsored by Trustwave
WHITE PAPER: This report gives you perspectives from both technical and non-technical professionals in the healthcare industry to help you better understand the current state of healthcare security. Learn how to prioritize your most pressing data security issues and take action to prevent future breaches.
Posted: 03 Oct 2016 | Published: 30 Sep 2016


Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007


How Finance Teams Can Help Their Organizations Get Future-Ready
sponsored by IBM
WHITE PAPER: This white paper explores how finance teams can improve performance management, embrace lean practices, implement a scrum methodology, and more. Access now to find out what the best practices are for making your business future-ready.
Posted: 16 Jun 2016 | Published: 30 Jan 2015


Anticipate and Predict Customer Needs with Cloud-Based Analytics
sponsored by zendesk (bime by)
CASE STUDY: This case study explores how Miniclip, a London-based gaming company, leveraged cloud-based, self-service analytics to empower both technical and non-technical users. Find out how they created a centralized view of customer data with company-wide access to core business metrics.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

zendesk (bime by)

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

The Digital Enterprise
sponsored by
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

DigiWorld Yearbook
sponsored by
RESEARCH CONTENT: IDATE's DigiWorld Yearbook provides an annual analysis of the recent developments shaping the telecoms, internet and media markets, identifying major global trends and scenarios.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

The Technology Industry 2016
sponsored by
ESSENTIAL GUIDE: Most permanent IT professionals have seen their salaries rise over the past four years, and 15% are reporting pay rises of more than 10%, the Computer Weekly/Mortimer Spinks 2016 survey reveals.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Enterprise Mobility: A Framework for Success
sponsored by Dimension Data
BOOK: Get further insight into the most recent developments in enterprise mobility, so you can prepare for your own deployment.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Dimension Data

Cloud Security as a Service For Secure Cloud-Based Server Hosting
sponsored by
EGUIDE: Access this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks.
Posted: 27 Nov 2013 | Published: 20 Apr 2011

Application data security risks on Android devices
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

Discover the Risks and Rewards Behind a Mobile Workforce
sponsored by
EGUIDE: Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

How Cloud-Based Mobile Device Security Streamlines Data Protection
sponsored by
WHITE PAPER: Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

Information Security Asean July 2016
sponsored by
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

The Global State of Enterprise Mobility 2014/15
sponsored by
RESEARCH CONTENT: An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

Tackling Mobile Security and BYOD Risks
sponsored by
EGUIDE: This expert guide from examines the top risks of mobile security and what BYOD risks your enterprise could encounter, along with how you can rethink network security and take the steps needed to ensure a successful BYOD experience.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

Guide to Flexible Working
sponsored by
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

The Value of Threat Modelling
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway information security thesis series gives an overview of the value of threat modelling and describes some common modelling techniques.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats
sponsored by
IT BRIEFING: The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues.
Posted: 05 Jan 2012 | Published: 05 Sep 2011

ISM Essentials Guide – Threat Management
sponsored by
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

Malware Attacks Demand a New Malware Defense Approach
sponsored by
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
sponsored by Webroot
EGUIDE: This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
Posted: 17 Sep 2013 | Published: 17 Sep 2013


Storage Through the Looking Glass
sponsored by
ANALYST REPORT: This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Network security is being redefined to better block data raiders
sponsored by
WHITE PAPER: This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.
Posted: 21 Oct 2011 | Published: 26 Jan 2011

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by
EGUIDE: In this expert E-Guide from, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

The Global Risks Report 2016
sponsored by
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Next Generation Datacentres: The Cloud
sponsored by
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey reveal the latest research on the deployment of cloud in the datacentre.
Posted: 14 Sep 2012 | Published: 05 Apr 2012
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement