Vertical Industries  >   Leisure Industry  >  

Gambling Casinos

RSS Feed    Add to Google    Add to My Yahoo!
Gambling CasinosReports
 
Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Infor CRM Epiphany for Hospitality
sponsored by Infor CRM
BROCHURE: Infor CRM Epiphany for Hospitality provides the integrated marketing, customer service, and analytics capabilities hotels, casinos, and other hospitality companies need to deliver exceptional service at every touch point.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Infor CRM

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Is the mobile gambling market still a safe bet for business?
sponsored by ComputerWeekly.com
WHITE PAPER: This whitepaper is based on Juniper Research’s August 2010 report entitled “Mobile Gambling Markets: Casinos, Lotteries and Betting 2010-2015.”
Posted: 24 Oct 2011 | Published: 30 Nov 2010

ComputerWeekly.com

PCI DSS Tokenization Buyer’s Guide
sponsored by Intel® Services
WHITE PAPER: The guide describes how tokenization works, and how retailers and other businesses can deploy it to reduce risks of data compromise and the cost of PCI compliance.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

Big data: Lessons from the leaders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from the Economist Intelligence Unit assess how far companies have progressed in their use of big data and examines how they can turn it to business advantage.
Posted: 14 Sep 2012 | Published: 14 Sep 2012

ComputerWeekly.com

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Vestcom International: Personalization Drives Repeat Business
sponsored by Exstream Software
CASE STUDY: Vestcom International is a New Jersey-based firm that offers end-to-end personalized communication solutions. Vestcom used Exstream Software's Dialogue solution to design a sophisticated relationship management program that is fostering...
Posted: 24 Apr 2008 | Published: 01 Jan 2004

Exstream Software

Computer Weekly – 5 February 2013: The third dimension – the innovation opportunity from 3D printing
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the cost of 3D printing technology falls, the opportunity for innovation for IT leaders is growing. The rise of big data has created a new role – data scientist; we find out what they do. And government COO Stephen Kelly talks about the reform of Whitehall IT. Read the issue now.
Posted: 04 Feb 2013 | Published: 05 Feb 2013

ComputerWeekly.com

Backup Apps: State of the Art
sponsored by SearchStorage.com
EDITORIAL RESOURCE GUIDE: Check out this expert January 2013 Storage Handbook to explore backup apps going into the new year, and get the scoop on cloud backup and DR, snapshots, VM backups and big data protection.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

SearchStorage.com

Tokenization Buyer's Guide
sponsored by Intel
WHITE PAPER: PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
Posted: 12 Sep 2011 | Published: 08 Sep 2011

Intel

February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment”
sponsored by Information Security Magazine
EGUIDE: This month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation.
Posted: 02 Feb 2011 | Published: 31 Jan 2011

Information Security Magazine

Expert Guide To Cloud Backup Providers and Storing Data in The Cloud
sponsored by Carbonite
EGUIDE: This expert e-guide shines light on the top 10 questions that must be asked when storing data in the cloud, and a practical guide to cloud backup providers that now offer services that can meet the needs of enterprises.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

Carbonite

E-Book: Taking Action on Analytics - Using Data for Customer Loyalty and Retention
sponsored by Infor CRM
EBOOK: In this E-Book, hear from analysts and experts about recent trends in customer data and learn how winning organizations are truly taking action on analytics. Learn about the challenges that many organizations face when establishing and maintaining customer data management and retention programs and how to meet those challenges head on.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

Infor CRM

Taking action on analytics: Using data for customer loyalty and retention
sponsored by SAP America, Inc.
EBOOK: During the recession, organizations have been forced to revisit customer retention tactics and define a clear strategy for customer loyalty. Yet many organizations lack the strong understanding of customer data that is the foundation of a successful customer loyalty program.  In this e-book, learn about trends in customer relationship management.
Posted: 05 Jul 2011 | Published: 05 Jul 2011

SAP America, Inc.

Taking Action on Analytics: Using data for customer loyalty and retention
sponsored by Infor
EBOOK: In this E-Book, hear from analysts and experts about recent trends in customer data and learn how winning organizations are truly taking action on analytics. Find out about the challenges that many organizations face when establishing and maintaining customer data management and retention programs and how to meet those challenges head on.
Posted: 20 Dec 2010 | Published: 20 Dec 2010

Infor

Targeted Cyber Attacks
sponsored by GFI Software
PRODUCT LITERATURE: Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007

GFI Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement