IT Services  >   Internet Services  >   Internet Recreational Services  >  

Gambling Services

RSS Feed   
Gambling Services Reports
 
Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

How Leading Organizations Use AI to Deliver Exceptional Customer Experiences
sponsored by Splunk
WHITE PAPER: Click to access a collection of case studies that highlight the impact of machine learning in predicting, preventing, and troubleshooting IT events before they have a chance to leave a mark on business continuity – and before they impact customers.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

Modernizing Legacy Applications Saves Bottom Lines
sponsored by ServiceNow
VIDEO: Since their legacy Lotus Notes environment was going to shutdown, which included over 200 custom apps, one company took a group of workers that had been developing ITIL and service management modules for years and transitioned them into a team that builds custom apps. Find out the benefits they realized from this process.
Posted: 26 Jan 2018 | Premiered: 19 Jan 2018

ServiceNow

The Top 9 ITSM Offerings Stacked Up: Who's Leading the Pack?
sponsored by ServiceNow
RESOURCE: In this analyst report, find out how the top nine ITSM tools on today's market stack up against one another. Explore the strengths, cautions, and adoption trends around each offering to get a better idea which one matches the needs of your I&O team – and which ones to avoid.
Posted: 25 Nov 2019 | Published: 16 Aug 2018

ServiceNow

CW Europe – December 2018
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 13 Dec 2018

ComputerWeekly.com

Think Beyond File Storage to Accelerate Business Efficiency
sponsored by Citrix
EBOOK: Providing a file-sharing tool that combines the security your business needs with the convenience that users demand deters employees from using unsecure personal storage for company data. Access this white paper to learn 3 keys to boosting business efficiency and to discover how to keep your employees satisfied while ensuring your data is secure.
Posted: 27 Jan 2020 | Published: 27 Jan 2020

Citrix

Alleviate Technical Debt : A Practical Path to IT Modernization
sponsored by Red Hat
WHITE PAPER: There are several core approaches you can take to advance your IT modernization efforts, which this white paper closely examines. Read on to view these four pragmatic methods for structuring your initiatives, as well as discover a viable first step for your modernization path: UNIX-to-Linux migration.
Posted: 02 Mar 2018 | Published: 31 Dec 2016

Red Hat

Computer Weekly – 18 December 2018: The 50 most influential people in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our annual UKtech50 list of the most influential people in UK IT. We talk to this year's winner, HM Revenue & Customs CIO Jacky Wright about the challenges of government IT during Brexit. And we also examine the issues around upgrading SAP's ERP system to S/4 Hana. Read the issue now.
Posted: 14 Dec 2018 | Published: 14 Dec 2018

ComputerWeekly.com

Infographic: 2019 IT Priorities - APAC
sponsored by ComputerWeekly.com
EGUIDE: This infographic provides a snapshot of our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 968 respondents from across APAC.
Posted: 07 Aug 2019 | Published: 08 Aug 2019

ComputerWeekly.com

Working with the Kubernetes Configuration to Deploy Containers
sponsored by Diamanti
EGUIDE: In this expert guide, Alan Earls, contributor to SearchITOperations.com, walks you through using the Kubernetes configuration for container deployment. Inside, you'll find expert instruction on properly applying Kubernetes' nodes, pods, schedulers, and volumes to bypass orchestration challenges, and more.
Posted: 27 Feb 2018 | Published: 19 Feb 2018

Diamanti
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info