Vertical Industries  >   Leisure Industry  >  

Gaming Activities

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Activities Reports
 
Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Infor CRM Epiphany for Hospitality
sponsored by Infor CRM
BROCHURE: Infor CRM Epiphany for Hospitality provides the integrated marketing, customer service, and analytics capabilities hotels, casinos, and other hospitality companies need to deliver exceptional service at every touch point.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Infor CRM

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Case Study: Travel Agency Builds Business and Cuts Costs with the Right VDI
sponsored by VMware
WHITE PAPER: In this white paper, discover how a travel agency found an easily-deployable VDI solution that enabled them simplify IT management while streamlining business.
Posted: 27 May 2015 | Published: 31 Dec 2010

VMware

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Globalization in the Gaming Industry
sponsored by Limelight Networks, Inc.
WHITE PAPER: Access this white paper to learn how to keep up with the rapidly growing gaming industry.
Posted: 14 May 2015 | Published: 14 May 2015

Limelight Networks, Inc.

The Digital Enterprise
sponsored by ComputerWeekly.com
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

How Cloud-Based Mobile Device Security Streamlines Data Protection
sponsored by SearchSecurity.com
WHITE PAPER: Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

SearchSecurity.com

Dell Data Protection: Protected Workspace, Preventing Malware Attacks
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Access this white paper to learn how application virtualization can be used to create a protective barrier around applications that employees use that run untrusted content. Find out the steps involved in this process and how this can prevent attackers from ultimately gaining access to endpoints.
Posted: 28 Apr 2015 | Published: 28 Jun 2013

Dell, Inc. & Intel®

A New Set of Network Security Challenges
sponsored by Dell, Inc.
WHITE PAPER: Discover how next-generation firewalls help IT address the security and networking challenges of maintaining devices beyond the firewall without sacrificing employee productivity. Read the report and learn how these issues encompass network bandwidth, and learn how next generation firewalls promise IT a new way to solve this multisided puzzle.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Dell, Inc.

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER: In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014

FireEye

Endpoint Management - IT handbook
sponsored by SearchDataCenter.com
EBOOK: Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider.
Posted: 13 Sep 2012 | Published: 13 Sep 2012

SearchDataCenter.com

What Android for Work Means for the Enterprise
sponsored by MobileIron
WHITE PAPER: Access this white paper now to learn why the latest version of Android and the new Android for Work program can simplify your mobile management efforts.
Posted: 13 May 2015 | Published: 13 May 2015

MobileIron

The New Reality of Mobile Solutions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper helps you choose more secure mobility management by debunking four mobility misconceptions that often hold organizations back.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Dell, Inc. and Intel®

Symantec 2014 Internet Threat Report
sponsored by Symantec Corporation
WHITE PAPER: In this in-depth analysis, discover the biggest security trends and developments that organizations need to be aware of to stay protected.
Posted: 25 Aug 2014 | Published: 30 Apr 2014

Symantec Corporation

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats
sponsored by ComputerWeekly.com
IT BRIEFING: The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues.
Posted: 05 Jan 2012 | Published: 05 Sep 2011

ComputerWeekly.com

Simplifying Protection of Critical Assets
sponsored by AVG Technologies
EGUIDE: This expert e-guide lays out a simple strategy you can use to make sure you're optimizing your security resources.
Posted: 20 May 2015 | Published: 20 May 2015

AVG Technologies

Six Ways You May Be Losing Mobile Data and Don't Even Know It
sponsored by Symantec Corporation
WHITE PAPER: Discover the top six threats to your mobile workforce in this brief report, which matches real-world hazards with tips to help you take action and achieve the security that your organization requires.
Posted: 25 Aug 2014 | Published: 31 Jan 2013

Symantec Corporation

What to look for when evaluating NGFW
sponsored by Dell, Inc.
WHITE PAPER: Learn what criteria you should be considering when evaluating a next-generation firewall solution. Read this paper and determine for yourself why Dell solutions are the clear choice in terms of performance, cost and functionality.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell, Inc.

Big Data and Content Analytics: measuring the ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Special Report: Cyber Security in 2015
sponsored by IBM
WHITE PAPER: This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.
Posted: 22 May 2015 | Published: 31 Mar 2015

IBM

Business leaders agenda 2012
sponsored by ComputerWeekly.com
RESOURCE: This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

ComputerWeekly.com

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

The Essential Guide to Privileged Activity Monitoring
sponsored by BalaBit
WHITE PAPER: In it, learn how privileged activity monitoring can help you control your IT environment without compromising user productivity.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

BalaBit

The New Era of Big Data Security Analytics
sponsored by SearchSecurity.com
EGUIDE: This expert guide examines the reasons why Big Data security is so important, providing helpful tips for adapting and utilizing it to your business' advantage.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

SearchSecurity.com

Build Security Awareness with Incident Response Plans, Endpoint Management and Compliance
sponsored by Great Bay
EGUIDE: In this eGuide, security experts Paul Kirvan, Kevin Beaver and Mike Chapple explain everything you need to know about building an incident response plan.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Great Bay
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement