Software  >   Applications Software  >   Consumer Applications Software  >   Games and Entertainment Software  >   Electronic Games  >  

Web Browser-based Games

RSS Feed   
Web Browser-based Games Reports
 
Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Zynga Grows to #1 Social Gaming Site with RightScale
sponsored by RightScale
CASE STUDY: With the skyrocketing popularity of Zynga games such as FarmVille – which is now the largest single application on Facebook – Zynga’s technology strategy has to be as savvy as its business model. Find out why Zynga now relies on cloud services to manage its precipitous growth, maintain high availability, and keep costs in check.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

RightScale

Rightsizing Your SaaS Spend
sponsored by ClearEdge
WHITE PAPER: Sizing your SaaS deal incorrectly can cost you in the long run. In this white paper, learn how to dodge potential traps that lead to over- and under-buying, and how to apply deal sizing best practices to optimize your IT spend.
Posted: 28 May 2020 | Published: 28 May 2020

ClearEdge

ULA Exit or Renewal: Myths, Mistakes & Making it Work
sponsored by Livingstone Tech
WEBCAST: Three of Livingstone’s Senior Oracle experts recently sat down to discuss ULA exits and renewals, including common challenges and mistakes they’ve seen organizations experience and how to avoid them. Download the webinar to hear what they had to say.
Posted: 30 Jun 2020 | Premiered: Jun 30, 2020

Livingstone Tech

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

DevTestOps Landscape Survey 2020
sponsored by mabl
WEBCAST: As the adoption of DevOps grows, enterprises are experiencing a major shift in culture and process. Watch this webcast containing a wealth of data to help you benchmark how your team compares to your peers when it comes to DevOps adoption and the importance of automation, especially automated testing, throughout the development pipeline.
Posted: 27 Aug 2020 | Premiered: Aug 27, 2020

mabl

Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

ComputerWeekly.com

The Cloud to Drive New-age Browser Games
sponsored by Alibaba Cloud
WHITE PAPER: The cloud is driving new-age browser games, whether those games are massively multiplayer online role-playing games (MMORPG) or casual browser games. Learn how the cloud is improving game security, scalability, and gaming data in this Alibaba Cloud guide.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

Alibaba Cloud

Secure DevOps Brings Better, Faster, Safer Software
sponsored by SearchSecurity.com
EBOOK: In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
Posted: 03 May 2019 | Published: 03 May 2019

SearchSecurity.com

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info