IT Services  >   Internet Services  >   Internet Recreational Services  >  

Electronic Gaming

RSS Feed   
Electronic Gaming Reports
 
Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

A Buyer’s Guide to Log Analysis
sponsored by LogicMonitor
WHITE PAPER: Download this in-depth guide to uncover the top three considerations when evaluating a log analysis platform. Plus, the road to log intelligence and how to put it to work.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

LogicMonitor

JSM Getting Started with OpsGenie Video
sponsored by Atlassian
VIDEO: Integrating existing monitoring tools, having proper notifications, and guaranteeing the right escalation protocols are in place, are all huge components of a quality ITSM solution. Watch this video to learn how Jira Service Management allow you to build a team, create an on-call schedule, escalate incidents and more.
Posted: 24 Nov 2020 | Premiered: 09 Nov 2020

Atlassian

Gartner 3 Steps Agile IT Service Management
sponsored by Atlassian
WHITE PAPER: IT services can be bureaucratic, risk-averse units. Unfortunately, this reality means that they might be ill-equipped to handle the rapid pace of change impacting businesses right now. Read this IDC white paper to learn how IT service management can adopt to changes in business alignment, emerging technologies, and other new issues.
Posted: 18 Aug 2020 | Published: 27 May 2020

Atlassian

Webinar: Best practices for effective IT alerting
sponsored by LogicMonitor
WEBCAST: Incorrectly tuned alerts can result in an alert system failure. Additionally, managing alerts can be time consuming and can take attention away from what’s important. Tune into this webinar to learn best practices for improving an alerting strategy, such as setting alert routing, avoiding alert email overload and more.
Posted: 14 Jan 2021 | Premiered: Jan 14, 2021

LogicMonitor

CW Benelux: Dutch banks fight money laundering
sponsored by ComputerWeekly.com
EGUIDE: Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

Why Your Chatbot Or Virtual Agent Is Your Trusted IT-Security Partner
sponsored by Serviceaide
WHITE PAPER: Explore how a virtual agent can be an effective part of your IT team and security strategy in this white paper.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Serviceaide

How to deliver a Service Catalog that your customers will “actually” use
sponsored by Freshworks
WHITE PAPER: Jump inside this white paper to uncover best practices on how to design, develop, implement, and drive adoption of a service catalog that your internal customers and employees will actually use.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

Freshworks

Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
Posted: 19 Oct 2020 | Published: 20 Oct 2020

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences