IT Services  >   Internet Services  >  

Online Recreational Services

RSS Feed    Add to Google    Add to My Yahoo!
Online Recreational ServicesReports
 
The Human Face of Big Data: Data Driven
sponsored by ComputerWeekly.com
BOOK: Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Akamai Insight: Time to Market Matters for Online Video Media
sponsored by Akamai Technologies
WHITE PAPER: Akamai, with Stream OS, provides a streamlined video distribution workflow and a scalable, global distribution platform to get more media to market, faster than ever.
Posted: 20 May 2008 | Published: 01 May 2008

Akamai Technologies

Social Gaming in the Cloud: A Business White Paper
sponsored by RightScale
WHITE PAPER: Major gaming publishers such as Zynga, Crowdstar and Playfish use RightScale to scale to tens of millions of players per day. RightScale has the experience and tailored solution for launching and managing social games on the cloud.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

RightScale

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Unified IT Monitoring: A Necessity in the Era of the Customer
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper details how unified IT monitoring can be used to deliver the customer experience your users demand.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

CA Technologies.

Asset and Service Management for Smarter Transportation
sponsored by IBM
WHITE PAPER: This exclusive whitepaper details the current trend and business drivers pushing the transportation industry towards more effective asset and service management.
Posted: 24 Jul 2014 | Published: 08 Jul 2010

IBM

The Power and Payback of Unified IT Monitoring
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper examines the role of unified IT monitoring in simplifying modern IT challenges by bringing infrastructure, application and service level visibility together.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

CA Technologies.

How EDM Group Solves Automation Challenges of the Digital Mailroom
sponsored by Perceptive Software
VIDEO: Find out which industry-leading product helped an information management services provider gain a competitive edge over their peers, and solve the unique automation challenges of the digital mailroom.
Posted: 08 Jul 2014 | Premiered: 08 Jul 2014

Perceptive Software

Forging an ITSM Strategy That's About Business Impact, Not IT Metrics
sponsored by Pangea Systems
EGUIDE: This expert e-guide explores the story of one CIO who was able to deploy an ITSM strategy that went beyond IT metrics.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Pangea Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement