Vertical Industries  >   Information Industry  >  

Internet Game Sites

RSS Feed    Add to Google    Add to My Yahoo!
Internet Game Sites White Papers (View All Report Types)
 
Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Business Analytics: Helping You Put an Informed Foot Forward
sponsored by SAS
WHITE PAPER: What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

The Digital Enterprise
sponsored by ComputerWeekly.com
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

Globalization in the Gaming Industry
sponsored by Limelight Networks, Inc.
WHITE PAPER: Access this white paper to learn how to keep up with the rapidly growing gaming industry.
Posted: 14 May 2015 | Published: 14 May 2015

Limelight Networks, Inc.

IT education in Scandavia
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Learn how Scandanvian educators are capitalising on IT advances to help children learn in this Computer Weekly report.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams
sponsored by GeoTrust, Inc.
ESSENTIAL GUIDE: In this guide, you’ll learn more about phishing, why it has become such a widespread problem, and the negative impact that a phishing attack can have on your company and your customers. You’ll also learn how SSL and EV SSL technology can help protect your website, your business, and ultimately your bottom line.
Posted: 02 Feb 2011 | Published: 02 Feb 2011

GeoTrust, Inc.

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Hackers Open Malware Backdoor in Apache Webservers
sponsored by SearchSecurity.com
EGUIDE: A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

Rethinking Analytics for the Social Enterprise
sponsored by SAP
WHITE PAPER: The way businesses use analytics continues to evolve. Today, it is a broad system where all team members in a business contribute in collecting and acting on the data. View this white paper to learn more about how properly managing data can improve the success of your business.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

SAP

State of the Union, Spring 2015: Page Speed & Web Performance
sponsored by Radware
RESEARCH CONTENT: This comprehensive research report, which tested the load times of the top 100 leading retail web sites' home pages, offers insight into web performance best practices.
Posted: 29 Mar 2015 | Published: 29 Mar 2015

Radware

Web Browser Security Features Make Attacks Harder
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

Case Study: Non-Profit Brings Online Classes to Millions of Children
sponsored by New Relic
WHITE PAPER: Read this case study to discover how an educational non-profit easily scaled its site to provide access for millions of students.
Posted: 24 Apr 2015 | Published: 28 Feb 2015

New Relic

Examining the Current Cyber Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: With attacks no longer a question of "if" but "when," it's crucial to know what your enemies are up to. This white paper examines the prevalent vulnerabilities in organizations today, how hackers are exploiting them, and which tools they are using to get the job done.
Posted: 28 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

Your Quick Reference Guide to Always-On SSL
sponsored by Symantec
WHITE PAPER: This white paper explains the benefits of always-on SSL and how you can implement it on your sites.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Symantec

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

Technical Guide on Malware Trends
sponsored by SearchSecurity.com
EGUIDE: TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SearchSecurity.com

IPV6 Transition – Why the rush ?
sponsored by ComputerWeekly.com
ANALYST BRIEF: This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

ComputerWeekly.com

7 ways bots hurt your website
sponsored by Distil Networks
WHITE PAPER: This webcast examines the seven ways that bots can destroy your website and how you can defend yourself against ruin.
Posted: 10 Apr 2015 | Published: 21 Jan 2015

Distil Networks

Next-generation firewalls: critical to SMB network security
sponsored by Dell, Inc.
WHITE PAPER: Not all next-generation firewall solutions are created equal. Read this paper and discover how the right next-generation firewall technology dramatically improves network protection over traditional firewalls, while providing your business with solutions that won't have you sacrificing throughout and productivity over security.
Posted: 08 Jan 2013 | Published: 08 Jan 2013

Dell, Inc.

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

European IT Law Briefing:  Practical steps for companies using social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms offer practical advice for companies using social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

European IT Law Briefing: Monitoring employees' use of social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement