IT Services  >   Internet Services  >   Internet Recreational Services  >  

Electronic Gaming

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Gaming Reports
 
Social Gaming in the Cloud: A Business White Paper
sponsored by RightScale
WHITE PAPER: Major gaming publishers such as Zynga, Crowdstar and Playfish use RightScale to scale to tens of millions of players per day. RightScale has the experience and tailored solution for launching and managing social games on the cloud.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

RightScale

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Akamai Insight: Time to Market Matters for Online Video Media
sponsored by Akamai Technologies
WHITE PAPER: Akamai, with Stream OS, provides a streamlined video distribution workflow and a scalable, global distribution platform to get more media to market, faster than ever.
Posted: 20 May 2008 | Published: 01 May 2008

Akamai Technologies

The 15 MDM Providers That Matter Most, and How They Stack Up
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, Forrester identifies, evaluates, and compares the 15 foremost MDM providers, detailing how well each vendor fulfills key requirements and where each provider stands in relation to the others.
Posted: 08 Jan 2015 | Published: 30 Sep 2014

Symantec Corporation

Cloud Readiness: Securing Access to Your Private Cloud
sponsored by Ping Identity Corporation
EBOOK: This eBook explains the benefits of moving enterprise applications to the cloud and describes how to keep your applications and data secure during this process.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Ping Identity Corporation

How Can You Meet Business Demands Quickly, with Agility and Flexibility?
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Enterprise Linux can help you leverage the same advanced environment and open source solutions applied by today's most innovative IT organizations, such as Amazon and Facebook, and transition to an infrastructure that is open and flexible.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Red Hat

Understanding NIST's Cloud Computing Reference Architecture: Part I
sponsored by Global Knowledge
WHITE PAPER: This second white paper in a series on Cloud Computing Reference Architecture focuses on the activities, processes, and requirements that cloud players need to follow in order to ensure a successful delivery of cloud services. It addresses the three active cloud players that may be involved in delivering cloud services to cloud consumers.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Global Knowledge

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Chasing and Attaining the Goal of Zero Downtime
sponsored by SUSE
RESEARCH CONTENT: In this expert resource, explore the findings of a recent research report on how successful organizations areĀ  identifying causes of downtime and attempting to achieve "zero downtime."
Posted: 31 Aug 2014 | Published: 30 Aug 2014

SUSE
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement