IT Services  >   Internet Services  >   Internet Recreational Services  >  

Internet Gaming

RSS Feed    Add to Google    Add to My Yahoo!
Internet GamingReports
 
Garena Success Story
sponsored by IBM
WHITE PAPER: In this white paper, discover how a software company was able to find the right infrastructure as a service (IaaS) provider to deliver on-demand, secure, and scalable services for the online gaming community.
Posted: 13 Oct 2014 | Published: 31 Dec 2011

IBM

SG North Tackles Chargebacks and Terms of Service Violations
sponsored by iovation, Inc.
CASE STUDY: An online game development and publishing company shares how it keeps its games safe for players, and keeps fraudsters away.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

iovation, Inc.

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Akamai Insight: Time to Market Matters for Online Video Media
sponsored by Akamai Technologies
WHITE PAPER: Akamai, with Stream OS, provides a streamlined video distribution workflow and a scalable, global distribution platform to get more media to market, faster than ever.
Posted: 20 May 2008 | Published: 01 May 2008

Akamai Technologies

Social Gaming in the Cloud: A Business White Paper
sponsored by RightScale
WHITE PAPER: Major gaming publishers such as Zynga, Crowdstar and Playfish use RightScale to scale to tens of millions of players per day. RightScale has the experience and tailored solution for launching and managing social games on the cloud.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

RightScale

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

The CFO Agenda 2020: Getting Ready for the Digital Age
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to view in-depth statistics of more than 301 CFOs in organizations worldwide to gain keen insights on their changing roles and fuctions.
Posted: 21 Nov 2014 | Published: 08 Oct 2014

Hewlett-Packard Company

It's Time to Mothball Traditional ITSM Approaches
sponsored by Pangea Systems
EGUIDE: In the following expert e-guide from SearchCIO.com, learn how ITSM needs to evolve in order to remain business-aligned, operationally controlled and cost-effective.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Pangea Systems

Understanding NIST's Cloud Computing Reference Architecture: Part I
sponsored by Global Knowledge
WHITE PAPER: This second white paper in a series on Cloud Computing Reference Architecture focuses on the activities, processes, and requirements that cloud players need to follow in order to ensure a successful delivery of cloud services. It addresses the three active cloud players that may be involved in delivering cloud services to cloud consumers.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Global Knowledge

Controlling Cloud Infrastructure Costs with Cost Analytics
sponsored by Scalr
WEBCAST: This webcast introduces Scalr's new Cost Analytics functionality, specifically designed for Finance and IT departments.
Posted: 13 Oct 2014 | Premiered: Oct 13, 2014

Scalr
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement