IT Services  >   Internet Services  >   Internet Recreational Services  >  

Internet Gambling

RSS Feed   
Internet Gambling Reports
 
Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Top 10 Nordic IT stories for 2018
sponsored by ComputerWeekly.com
EGUIDE: The Nordic region is pioneering when it comes to the use of IT in society and business. In many ways, the region is a test bed for the most advanced implementations of technology, such as artificial intelligence (AI). Here are Computer Weekly's top 10 Nordic articles for 2018, with a look back at CIO interviews and the effect of AI on the region.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
Posted: 27 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

Real Use Cases for IT Service Management Virtual Agents
sponsored by Serviceaide
CASE STUDY: While a sales-oriented chatbot has obvious use cases as a customer-facing tool, how does a virtual support agent align with IT service workflows? And perhaps more importantly, how does it alleviate ITSM congestion? Explore a collection of real-world use cases for ITSM virtual support agents to find out.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Serviceaide

How Leading Organizations Use AI to Deliver Exceptional Customer Experiences
sponsored by Splunk
WHITE PAPER: Click to access a collection of case studies that highlight the impact of machine learning in predicting, preventing, and troubleshooting IT events before they have a chance to leave a mark on business continuity – and before they impact customers.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

Splunk

Infographic: 2019 Europe IT Priorities - General Trends
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we take a look at what IT departments are investing in, how IT departments will evolve over the next 12 months and which sectors will see the biggest budget increases. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

MicroScope – June 2019: Sourcing IT among the clouds
sponsored by MicroScope
EZINE: Outsourcing is changing as the anything-as-a-service model takes off.
Posted: 24 May 2019 | Published: 24 May 2019

MicroScope

CW Benelux November 2019-January 2020: Dutch banks fight money laundering
sponsored by ComputerWeekly.com
EZINE: Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
Posted: 24 Oct 2019 | Published: 31 Oct 2019

ComputerWeekly.com

5 Ways to Level Your Service Desk Using IT Process Automation
sponsored by Ayehu
WHITE PAPER: Discover what automation looks like when integrated into these five frequent-flyer IT service requests – and how to configure process automation of your own to take these highly-manual tasks off your plate.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Ayehu

CW Benelux February 2018
sponsored by ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info