Designing Artificial Intelligence for Games (Part 1)
By: Intel Software Network View more from Intel Software Network >>
Download this next:
Endpoint Management - IT handbook
By: TechTarget Data Center
Type: eBook
The evolving workplace, with smartphones, tablets and other mobile devices, creates complexity for IT and increase management and security challenges. The proper tools are essential for IT to gain the level of control that’s needed for a secure environment.
The expert IT handbook provides an in-depth look at endpoint management techniques and explores the technologies and management products available to promote better security. Read on to learn more about key subjects, including:
- Legacy applications and the move to Windows 7
- Charting consumerization best practices
- Security steps that minimize loss, theft and data leakage
- And more
These are also closely related to: "Designing Artificial Intelligence for Games (Part 1)"
-
Digital.ai App Security for Gaming
By: Digital.ai
Type: eBook
The impact of a successful attack can be financially catastrophic to game publishers. A compromised game reduces the chance of success and can even result in the cancellation of a game altogether.
Avoiding these scenarios by implementing mobile app security practices is paramount for the long-term success of all gaming apps and gaming studios. Read this e-book to learn more.
-
Ubisoft Leverages Zero Trust
By: HashiCorp
Type: Case Study
Read this case study to explore how Ubisoft, a pioneer in online gaming, uses HashiCorp Vault to enhance security, availability and performance across their global gaming platform. View brand-critical security outcomes enabled by Vault such as:
- Service level objectives pushed to 99.9% uptime, in excess of industry standards
- Automatic secrets rotation enabled across multiple cloud platforms
- Elimination of unplanned service interruptions caused by expired certificates or misconfigured secrets
- And more
Find more content like what you just read:
-
December ezine: Tech for good
By: MicroScope
Type: Ezine
Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same
-
4 lessons Fortnite and World of Warcraft can teach us about the metaverse
By: LiveSwitch
Type: Blog
Designing a digital culture from scratch is a daunting endeavor. Check out this blog post for the 4 lessons that the most popular video games can impart upon designers in the metaverse.
-
Flexible data center solution ensures uptime and security
By: Quality Technology Services
Type: Case Study
Have you ever been asked to provide real-time business updates and be able to filter through pedabytes of data in just minutes? Read and learn how the NFL is able to utilize the cloud, AI, and machine learning to take high-res gameday video and data and analyze it so quickly and efficiently that you can see the game odds change by the minute.
-
NFT Game WonderHero is Disabled After Hackers Stole $320K in Cryptocurrency
By: Eclypses
Type: Case Study
Read this case study to learn how an NFT game lost $320K in cryptocurrency and what you can do to defend your organization against similar cyberattacks.
-
Supply Chain Trends for 2021 and Beyond
By: GEP
Type: Research Content
In the second quarter of 2021, the Enterprise Strategy Group completed a research survey of 173 IT decision makers and line-of-business managers, asking about their organizations’ supply chain management (SCM) capabilities, priorities, and initiatives. Open the report to review their findings.
-
Building Intelligent, Resilient and Sustainable Supply Chains
By: IBM
Type: eBook
Read the latest paper from IBM Consulting to see the exponential performance that is unlocked when you connect the processes, applications and data that run the supply chain, and modernize with cloud, analytics and AI.
-
Online Gaming Platform Breaches
By: Eclypses
Type: Case Study
Recent online gaming platform breaches are exposing how hackers access private networks and information by getting around authentication processes. Learn how Eclypses MTE technology can prevent this with instantly obsolete transmissions in this case study.
-
Artificial intelligence in ITSM: Finding the right tools for you
By: TechTarget ComputerWeekly.com
Type: eGuide
AI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.
-
5G for vehicle fleets: Faster speeds & ultra-low latency
By: Cradlepoint
Type: Video
As part of the ever-growing reliance on mobile broadband connectivity for fleets, 5G for vehicles is here and is in a league of its own – bringing exponentially faster speeds, greater capacity and ultra-low latency. Watch this video to learn why 5G’s impact on vehicle fleets will be game changing.
-
Computer Weekly 6 August 2019: Using tech to boost staff morale
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
-
Don’t become the next victim of cryptocurrency theft
By: Eclypses
Type: Case Study
When $625 million worth of cryptocurrency was stolen from Ronin, the blockchain behind the popular crypto game Axie Infinity, the industry was shaken to its core. Eclypses MTE Technology could prevent future attacks by using unique endpoint pairings as verification, so that hackers can’t remotely access a user’s wallet. Read on to learn more.
-
Unlocking Opportunities with Data Transformation
By: Google
Type: Webcast
Tune into this webinar as Google discusses the power of multi-cloud computing and why data-sharing the old way won’t cut it anymore,
-
High Tech Manufacturing in the COVID-19 era
By: TIBCO
Type: Webcast
Watch this webinar to learn how TIBCO can help you simplify manufacturing digitization, and stand up to modern challenges.
-
Introduction to gamification in the hiring process
By: SHL US LLC
Type: Research Content
Innovations in technology-enabled job candidate assessment and the rise of the candidate-centric market have spurred organizations to rethink their talent assessment practices. Explore this white paper to learn about the potential benefits, risks, and limitations of leveraging serious games and gamified assessments in your hiring process.
-
September ezine: Thinking digital in the world of storage
By: MicroScope
Type: Ezine
The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry
-
June ezine: Focus on video marketing
By: MicroScope
Type: Ezine
The full report of the recent MicroScope storage roundtable discussing how cloud and GDPR has changed the industry
-
Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
-
Delivering Continuous Growth and Success
By: QA
Type: eBook
In this digital age, technology has become essential to not just the functionality of your organization, but how you stack up against your competition. In order to pursue the latest opportunities, you need people that have the right technical skills to help you reach your goals. Access this guide to learn more.
-
Five Steps to Effective Cloud Operations
By: AWS - Lemongrass
Type: eBook
Cloud migration is now ‘table-stakes’ as they say in Las Vegas - the term itself meaning that it’s the least you need to lay down to even enter the game. Download this e-book to learn how to hit the cloud operations jackpot in 5 steps.
-
Webinar: Market Opportunity for S3 Compatible Tape
By: Fujifilm Recording Media USA, Inc.
Type: Webcast
Explore in this webinar how the market opportunity for Object storage on tape is a potential game-changer, and how object tape can enhance the performance of cloud.
-
Going global: Multi-cloud, autonomous data management
By: Veritas
Type: Blog
Today, businesses are playing catch-up with the post-pandemic work practices to manage the increasing volumes of data created across different cloud storage locations. To optimize your cloud footprint and costs and keep your data safe, there is now global support with cloud specialists covering the globe. Read on to learn more about this.
-
A Computer Weekly Buyers Guide to IoT
By: TechTarget ComputerWeekly.com
Type: eGuide
In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
-
Recruitment Software Guide
By: TechTarget Business Analytics
Type: eGuide
Today's global, social world is changing the recruitment game, and HR teams must adapt their strategies and technologies to this reality if they hope to recruit the best candidates. In this expert e-guide, discover sourcing strategies to find high quality, "passive" candidates, how recruitment software is getting "socialized," and much more.
-
Open Banking Innovation and 5 Technologies for Creating a Competitive Advantage
By: TIBCO
Type: White Paper
Read this paper to discover five cost-effective open banking building blocks that can empower your business with agility and self-service data access.
-
Combat manufacturing marketing challenges and improve CX
By: Object Edge
Type: White Paper
B2B customer loyalty is fragile. So, as customers continue to choose partners than can offer them fast, easy, omnichannel buying and service experiences, it has become crucial for B2B to step up their game. Browse this white paper to learn more about how you can adequately meet customer expectations and combat certain challenges.
-
How manufacturers can boost smart factory efficiency
By: Federated Wireless & AWS
Type: Webcast
Today’s manufacturing leaders are in a race to bring game-changing applications and connected devices to the factory floor. But in many cases their existing wireless setup can't keep up with a growing list of mobile and data-intensive initiatives. Watch this webinar to learn what Private Wireless means for your Smart Factory’s efficiency.
-
The state of mobile application security
By: Eclypses
Type: Blog
According to a recent study, 77% of financial apps were found having at least one vulnerability that could lead to a data breach. As these applications are increasingly entrusted with personal information, it is critical that mobile security keeps pace. Read now to unlock 5 key trends currently shaping the mobile app security landscape.
-
10 classic games recreated in JavaScript
By: jscrambler
Type: Blog
While open-source development has allowed for the development of more interesting and innovative applications, it has also made it easier for hackers to steal. Check out this post to experience firsthand the importance of protecting your JavaScript code and have some fun while doing so by enjoying these open-source recreations of classic games.
-
Computer Weekly's Downtime Upload Christmas Special
By: TechTarget ComputerWeekly.com
Type: Podcast
In this week's episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly, Clare McDonald and Brian McKenna discuss their favourite moments of the last 10 episodes as part of their Christmas Special.
-
25 Years of Security: The Evolution of Cybersecurity Attacks
By: WatchGuard Technologies, Inc.
Type: eBook
Download this 37-page e-book to gain an in-depth understanding of how cyber threats have evolved over the last 25 years, with spotlights on Solar Sunrise, Big Game Ransomware, ProxyLogon, and many more.
-
Threat Intel Roundup: The current state of cybersecurity
By: Integrity360
Type: Analyst Report
The world of cybersecurity is a constant game of attack vs defense, where cybersecurity professionals are constantly tasked with staying up to date. In this February issue of Integrity360’s Threat Intel Roundup, the organization presents an overview of the month’s biggest cybersecurity news. Read the full report to learn more.
-
Why no-code test automation is the future
By: Panaya, Inc.
Type: White Paper
Low-code or No-code (LC/NC) is a game-changer for testing. Considering most test automation tools require code, which the majority of QA teams can’t write, LC/NC testing proves enormously useful in addressing this issue and filling this gap. Access this white paper to learn more about Low-code/No-code test automation.
-
SECURE TOKENS:PREVENTING TWO-FACTOR TOKEN AUTHENTICATION EXPLOITS
By: TechTarget Security
Type: eGuide
This expert guide examines on the common types of attacks used against two-factor authentication, and discusses what they can mean for future security threats and how you can protect against them.
-
Driving a Cultural Transformation Towards Service Ownership with PagerDuty
By: PagerDuty & AWS
Type: White Paper
Service ownership is an operating model where the people closest to the technology from a design and implementation perspective are responsible for the entire product development lifecycle. This white paper explores the nuances of shifting to a service ownership culture, including 7 best practices for navigating the shift. Read on to learn more.
-
CIO Trends in ASEAN 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, find out how some CIOs in Southeast Asia are responding to challenges around driving business growth, what are they doing to keep their teams on their toes and stay on top of their game.
-
eGuide Digital Marketing: Tips For Connecting With Your Customer
By: TechTarget Customer Experience
Type: eGuide
There are many new tools that claim to enhance customer experience management (CEM) strategies, including social and mobile channels. However, such initiatives can backfire if companies employ the wrong strategies. In this e-guide, learn how to best leverage digital marketing and CEM technologies to gain a deeper understanding of your customers.
-
Computer Weekly 17 July 2018: How container technology is evolving
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as adoption of containers grows rapidly, we look at the choices and potential benefits of the technology, the efforts being made to secure internet of things devices and how the latest Brexit plans will affect the UK tech sector. Read the issue now.
-
Computer Weekly – 20 September 2022: A gold medal performance for networking
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.
-
AI proves value in HR, but handle with care
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, discover how the allocation of work by algorithm might have advantages for workers as well as employers, how AI is proving its value for HR and how data analytics is being used to support expansion and development.
-
CW Buyer's Guide to Emerging technology
By: TechTarget ComputerWeekly.com
Type: eBook
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
-
Restore data fast from ransomware attacks & insider threats
By: CyberFortress
Type: White Paper
Consequences of ransomware attacks are crippling – damaging your reputation, operations, and bottom line. CyberFortress’ Ransomware and Insider Protection enables recovery from encrypted or deleted backups by providing an isolation layer. Browse this white paper to learn more about how the game-changing solution works.
-
Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?
By: TechTarget ComputerWeekly.com
Type: Ezine
The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.
-
Infographic: Mapping adoption of artificial intelligence in the enterprise
By: TechTarget ComputerWeekly.com
Type: eGuide
This infographic breaks down the complex data into noteworthy insights from enterprise leaders, including bottlenecks to AI development, budget allocation and what parts of their company see the most AI.
-
What the future holds for cloud management in APAC
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we dish out useful tips from APAC organisations that have successfully migrated to the cloud, the thinking behind their approaches to cloud migration and what they are doing to not only keep the lights on, but also raise their game in areas such as cloud data management and cloud security.
-
Top 10 Australia IT stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.
-
MOTOTRBO R7 radio communications: Break through the noise
By: Motorola, Inc.
Type: White Paper
According to the 2021 Motorola Solutions Commercial Markets Survey, audio quality ranks within the top three communication challenges for organizations across the commercial landscape. Access this white paper to learn how the MOTOTRBO R7 is designed to provide next-level noise cancellation, loudness and clarity, superior signal strength and more.
-
MicroScope – February 2020: The power to transform
By: MicroScope
Type: Ezine
In this issue, MicroScope asks experts what to expect in 2020, and the channel shares why change is necessary to thrive in different business environments
-
ESG weighs in: Azure Cloud Storage for SAP workloads
By: NetApp
Type: ESG
Access this ESG white paper to look at common storage service options typically available for running SAP on native public cloud services, IaaS and SDS, and how they present limitations for achieving the business agility, performance, and productivity managers expect when migrating SAP workloads to the cloud.