Software  >   Applications Software  >   Consumer Applications Software  >   Games and Entertainment Software  >   Electronic Games  >  

Video Arcade Games

RSS Feed    Add to Google    Add to My Yahoo!
Video Arcade Games Reports
 
Anticipate and Predict Customer Needs with Cloud-Based Analytics
sponsored by zendesk (bime by)
CASE STUDY: This case study explores how Miniclip, a London-based gaming company, leveraged cloud-based, self-service analytics to empower both technical and non-technical users. Find out how they created a centralized view of customer data with company-wide access to core business metrics.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

zendesk (bime by)

Best Practices to Accelerate IPv6 Migration Testing
sponsored by Mu Dynamics
WHITE PAPER: Avoid IPv6 migration nightmares and integration challenges and gain control of skyrocketing costs by following best practices for IPv6 migration testing and taking a unified approach to testing with Mu Dynamics’ IPv6 testing solution. Read this paper to find out so much more.
Posted: 30 Sep 2010 | Published: 30 Sep 2010

Mu Dynamics

Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Accellion, Inc.

Beyond the Scrum Team: Delivering "Done" at Scale
sponsored by Tasktop
WEBCAST: Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.
Posted: 27 Jul 2016 | Premiered: Jul 26, 2016

Tasktop

Continuous Testing for Agile and DevOps: A Real World Approach
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast provides an overview of continuous testing and examines some of the challenges that can impede DevOps. Access helpful tips for finding the right balance between manual and automated testing so that you can optimize your ability to reduce the risks associated with each software release.
Posted: 14 Sep 2016 | Premiered: Sep 7, 2016

Hewlett Packard Enterprise

How to Evaluate SD-WAN, Hybrid WAN Products
sponsored by SearchNetworking.com
EBOOK: This guide helps IT professionals learn about software-defined wide area network options in order to select the best product for their enterprise.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

SearchNetworking.com

Computer Weekly 50th anniversary special
sponsored by ComputerWeekly.com
EZINE: It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Posted: 21 Sep 2016 | Published: 22 Sep 2016

ComputerWeekly.com

Cutting-Edge IT: Moving from Nodes to Applications at Wells Fargo
sponsored by Puppet
WHITE PAPER: To create complete and shared visibility into change for their global infrastructure, the IT team at Wells Fargo embarked on a DevOps journey. Find out how they created a strategy to manage change for all the bank's apps, transition from a node to an app-centric view, and take an API-first approach.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

Puppet

Mobile App Building 101: The Node.js Cloud App
sponsored by Red Hat
VIDEO: This video examines a platform that supports an Agile approach to developing, integrating, and deploying enterprise mobile apps – whether native, hybrid, or on the web. Discover how to integrate Mobile Backend-as-a-Service (MBaaS) with enterprise systems easily and uncover a choice of cloud deployment options for your apps.
Posted: 19 Sep 2016 | Premiered: 17 Feb 2016

Red Hat

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement