Software  >   Applications Software  >   Consumer Applications Software  >   Games and Entertainment Software  >   Electronic Games  >  

Video Arcade Games

RSS Feed    Add to Google    Add to My Yahoo!
Video Arcade GamesReports
 
K2 Helps a Top Game Developer Improve Efficiency
sponsored by K2
VIDEO: Access this video case study to learn how Square Enix, a top game developer, was able to leverage K2 software to save time and focus on solving new challenges.
Posted: 24 Nov 2014 | Premiered: 20 Jan 2013

K2

SG North Tackles Chargebacks and Terms of Service Violations
sponsored by iovation, Inc.
CASE STUDY: An online game development and publishing company shares how it keeps its games safe for players, and keeps fraudsters away.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

iovation, Inc.

Securing your company's digital assets so they don't fall into the wrong hands
sponsored by K2
WHITE PAPER: Access this brief paper to learn how Square Enix Europe, a video game creator, improved the security of its mastering request process, which ultimately helped the company ensure top quality of its products.
Posted: 25 Nov 2014 | Published: 31 Dec 2013

K2

Best Practices to Accelerate IPv6 Migration Testing
sponsored by Mu Dynamics
WHITE PAPER: Avoid IPv6 migration nightmares and integration challenges and gain control of skyrocketing costs by following best practices for IPv6 migration testing and taking a unified approach to testing with Mu Dynamics’ IPv6 testing solution. Read this paper to find out so much more.
Posted: 30 Sep 2010 | Published: 30 Sep 2010

Mu Dynamics

Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Accellion, Inc.

SDN 101: An Introduction to Software Defined Networking
sponsored by Citrix
WHITE PAPER: This white paper highlights the key opportunities that SDN can address for your business, as well as the relationship between SDN and NV.
Posted: 16 Dec 2014 | Published: 01 May 2014

Citrix

Enable software-defined security for software-defined infrastructure
sponsored by Intel Corporation
DATA SHEET: Check out this data sheet to explore a software-defined security solution that is designed to accompany a software-defined infrastructure.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Intel Corporation

Bio-Reference Discovered the Key to Solving Network and Application Performance Issues
sponsored by Fluke Networks
WHITE PAPER: This case study provides insight into a solution that Bio-Reference Laboratories deployed to address network and application performance problems.
Posted: 13 Nov 2014 | Published: 23 Sep 2014

Fluke Networks

Reddo Mobility: The Fast Path to Mobilizing Desktop Applications
sponsored by Reddo Mobility
WHITE PAPER: Read this white paper to learn about a new way to deliver your business critical apps to mobile interfaces without the need for coding. Your users will experience the apps as they look and feel on the desktop, but in the comfort of their hands on their smartphone or tablet.
Posted: 17 Nov 2014 | Published: 03 Nov 2014

Reddo Mobility

Develop, Deploy, Test, and Secure Your Mobile Apps
sponsored by IBM
VIRTUAL ENVIRONMENT: Explore this hybrid environment to view detailed demonstrations on not only how to develop and deploy mobile apps, but how to integrate, test, secure, and manage them. Visit now to go discover a platform that provides solutions for on-premise or cloud developed apps.
Posted: 11 Dec 2014 | Premiered: 01 Oct 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement