IT Services  >   Internet Services  >  

Recreational Services

RSS Feed    Add to Google    Add to My Yahoo!
Recreational Services Reports
 
The Human Face of Big Data: Data Driven
sponsored by ComputerWeekly.com
BOOK: Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Amaya Gaming Experiences Smarter Development and Reduces Compliance Headache
sponsored by Splunk
CASE STUDY: Discover how global gaming company Amaya was able to eliminate compliance challenges, gain critical insights in to development and performance, and improve DevOps collaboration with the help of one system.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Splunk

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Social Gaming in the Cloud: A Business White Paper
sponsored by RightScale
WHITE PAPER: Major gaming publishers such as Zynga, Crowdstar and Playfish use RightScale to scale to tens of millions of players per day. RightScale has the experience and tailored solution for launching and managing social games on the cloud.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

RightScale

Akamai Insight: Time to Market Matters for Online Video Media
sponsored by Akamai Technologies
WHITE PAPER: Akamai, with Stream OS, provides a streamlined video distribution workflow and a scalable, global distribution platform to get more media to market, faster than ever.
Posted: 20 May 2008 | Published: 01 May 2008

Akamai Technologies

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Small Businesses Must Heed Cloud, Security, Mobility and IT Services Trends in 2016
sponsored by CDW
RESOURCE: Four major digitally disruptive trends will reshape small businesses over the next few years: cloud computing, security, mobility, and managed IT services. Discover the biggest benefits and challenges posed by these technologies and learn how you can increase operational performance, decrease risk, cut costs, and adopt innovation faster.
Posted: 09 May 2016 | Published: 15 Feb 2016

CDW

IT4IT for Managing the Business of IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: IT4IT™ for Managing the Business of IT – A Management Guide, from The Open Group, provides best practice advice and focuses on the data and automated workflows needed to manage IT services in a lean, agile and business-focused way.
Posted: 26 May 2016 | Published: 26 May 2016

ComputerWeekly.com

How IT Service Providers can Turn Customers' Data into Gold with Elastic Cloud Storage
sponsored by EMC
JOURNAL ARTICLE: This brief article highlights EMC's elastic cloud storage, an object storage infrastructure that enables enterprises to provide specialized, innovated new services built around customer data. See how this solution can give your enterprise the potential to transform your everyday data into new insights and new opportunities for customers.
Posted: 18 Apr 2016 | Published: 26 Feb 2016

EMC

Address Challenges in Integrated, Complex IT Environments
sponsored by IBM
WHITE PAPER: This white paper unveils the opportunities and challenges in your complex, integrated IT environments. Read on to discover how you can leverage proactive and preventative support services to address your top IT challenges in mobile, cloud, social, and analytics environments.
Posted: 14 Mar 2016 | Published: 28 Feb 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement