Vertical Industries  >   Leisure Industry  >  

Gaming Activities

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Activities Reports
Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Infor CRM Epiphany for Hospitality
sponsored by Infor CRM
BROCHURE: Infor CRM Epiphany for Hospitality provides the integrated marketing, customer service, and analytics capabilities hotels, casinos, and other hospitality companies need to deliver exceptional service at every touch point.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Infor CRM

Information Security Breaches Survey 2013
sponsored by
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Case Study: Travel Agency Builds Business and Cuts Costs with the Right VDI
sponsored by VMware
WHITE PAPER: In this white paper, discover how a travel agency found an easily-deployable VDI solution that enabled them simplify IT management while streamlining business.
Posted: 27 May 2015 | Published: 31 Dec 2010


Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007


Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010


Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

The Digital Enterprise
sponsored by
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

How Cryptographic Keys Enabled Hackers to Undermine Security
sponsored by Venafi
WHITE PAPER: This infographic breaks down a trust-based attack, showing how hackers compromised vulnerable encryption keys and why security controls didn't stop them.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Business leaders agenda 2012
sponsored by
RESOURCE: This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

Restore Balance with Next Generation Authentication Technical Guide
sponsored by
EGUIDE: Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

Capturing Opportunity in a World of Dynamic Security Threats
sponsored by Webroot
WHITE PAPER: This white paper discusses the opportunity that today's cybersecurity challenges present to solution providers and explains why finding the right security partner is essential for capitalizing on it.
Posted: 28 Aug 2015 | Published: 28 Aug 2015


Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Rethinking MDM in a BYOD World
sponsored by
WHITE PAPER: Discover the ins and outs of the Bring Your Own Device (BYOD) trend and why traditional mobile device management solutions are no longer sufficient. Also inside, learn a security strategy that will keep your enterprise protected.
Posted: 01 Nov 2012 | Published: 01 Nov 2012

Six Areas Where Citrix XenApp Outperforms VMware Horizon Apps
sponsored by Citrix
WHITE PAPER: In this white paper, explore an application virtualization strategy that includes the capabilities organizations need for full mobile productivity and how any strategy you choose should take into consideration the end-user and IT.
Posted: 02 Jan 2015 | Published: 28 Nov 2014


Lifecycle of the Advanced Persistent Threat
sponsored by Dell SecureWorks
WHITE PAPER: Advanced persistent threats (APT) are a concern for businesses across all industries, as they can pose a threat to an organisation's data, systems, financial assets, and reputation. This analysis explains how to develop an effective and efficient defence strategy that will help you prevent, identify and resolve APTs.
Posted: 18 Jul 2012 | Published: 16 Jul 2012

Dell SecureWorks

Computer Weekly – 7 July 2015: The IT behind Angry Birds
sponsored by
EZINE: In this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

Cyber-Threats in 2015
sponsored by Webroot
WHITE PAPER: This white paper arms you with the most up-to-date web security knowledge that you need to keep your clients safe.
Posted: 02 Sep 2015 | Published: 02 Sep 2015


The Future of Threat Intelligence for the Service Provider
sponsored by Webroot
WHITE PAPER: This white paper examines the unique opportunities today's threat landscape to service providers and discusses how you can best provide threat intelligence to your clients.
Posted: 31 Aug 2015 | Published: 31 Aug 2015


User Environment Management (UEM): Past, Present, and Future
sponsored by AppSense
EGUIDE: Access this exclusive e-guide to read as independent virtualization expert Brian Madden discusses the evolution of user environment management – from profile management to today's user environment management. Find out what the future looks like for UEM tools, including enhancements in Windows 10, security, application delivery, and more.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Delivering Cloud-Based Mobile Apps to the Enterprise
sponsored by Dimension Data
EGUIDE: In this exclusive e-guide, learn expert tips for delivering cloud-based mobile apps to the enterprise. Read on to discover the two basic models for application delivery clouds and how the hybrid cloud is becoming an increasingly popular choice for enterprise mobile cloud delivery.
Posted: 25 Sep 2015 | Published: 25 Sep 2015

Dimension Data

Network security is being redefined to better block data raiders
sponsored by
WHITE PAPER: This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.
Posted: 21 Oct 2011 | Published: 26 Jan 2011

CW+: Online in the afterlife
sponsored by
WHITE PAPER: There is no escaping technology – even in death. Technology is woven into now almost every part of ourlives and as a consequence is something we need to consider when preparing a will in the event of death.
Posted: 21 Oct 2011 | Published: 06 Aug 2010

Game of Phones: Which Device Will Rule EMM for All?
sponsored by IBM
WEBCAST: This webcast shows how the top EMM operating system contenders stack up: iOS, Android, and Windows. Click here to see which OS overcomes its competitors in the battle for EMM supremacy.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015


How Cloud-Based Mobile Device Security Streamlines Data Protection
sponsored by
WHITE PAPER: Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats
sponsored by
IT BRIEFING: The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues.
Posted: 05 Jan 2012 | Published: 05 Sep 2011

Creating a Successful Road Map for Cloud Deployment
sponsored by IBM
EBOOK: View this informative resource to access critical steps needed on the journey to meet your business needs and long-term career goals.
Posted: 08 Jul 2015 | Published: 01 Nov 2014


The New Era of Big Data Security Analytics
sponsored by
EGUIDE: This expert guide examines the reasons why Big Data security is so important, providing helpful tips for adapting and utilizing it to your business' advantage.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Critical Security Controls for SSL/TLS Management
sponsored by Venafi
WHITE PAPER: In this SANS report, you'll find specific recommendations for managing SSL/TLS security and protecting your keys and certificates.
Posted: 18 Sep 2015 | Published: 30 Jun 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement