IT Services  >   Internet Services  >   Internet Recreational Services  >  

Internet Gaming

RSS Feed    Add to Google    Add to My Yahoo!
Internet Gaming Reports
 
Playtech case study: Predictive monitoring tools deliver game-changing uptime
sponsored by Hewlett-Packard Limited
WHITE PAPER: Read this white paper to see how automated, integrated monitoring tools helped Playtech monitor web applications predictively to further protect uptime, user experience, and revenue.
Posted: 02 Jun 2015 | Published: 31 Aug 2013

Hewlett-Packard Limited

Social Gaming in the Cloud: A Business White Paper
sponsored by RightScale
WHITE PAPER: Major gaming publishers such as Zynga, Crowdstar and Playfish use RightScale to scale to tens of millions of players per day. RightScale has the experience and tailored solution for launching and managing social games on the cloud.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

RightScale

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Akamai Insight: Time to Market Matters for Online Video Media
sponsored by Akamai Technologies
WHITE PAPER: Akamai, with Stream OS, provides a streamlined video distribution workflow and a scalable, global distribution platform to get more media to market, faster than ever.
Posted: 20 May 2008 | Published: 01 May 2008

Akamai Technologies

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

How MSPs Can Stay Relevant in the Era of Cloud Computing
sponsored by AVG Technologies
WHITE PAPER: Read this white paper to discover the five services an MSP can provide to keep itself relevant in the face of changing IT needs.
Posted: 13 May 2015 | Published: 13 May 2015

AVG Technologies

Identity as a Service (IDaaS) Promising New Opportunity for MSPs
sponsored by AVG Technologies
WHITE PAPER: This white paper explains exactly what Identity-as-a-Service is and how it can help you keep your MSP profitable in today's changing IT environment.
Posted: 13 May 2015 | Published: 13 May 2015

AVG Technologies

Evaluating RMM Solutions Three key criteria for growth-oriented MSPs
sponsored by Solarwinds N-able
WHITE PAPER: This guide gives you three criteria to consider when choosing the RMM solution that's best for your business.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Solarwinds N-able

Detect, Prevent, and Manage Cyber-Security Incidents
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper suggests how you can partner with security services for more advanced and effective threat detection and mitigation.
Posted: 26 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

The 5 Levels of IT Service Optimization Maturity
sponsored by TeamQuest Corporation
WEBCAST: This webcast explores the 5 levels of IT service optimization maturity and how that affects business outcomes.
Posted: 16 Jun 2015 | Premiered: Jun 16, 2015

TeamQuest Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement