Interactive Entertainment Games Reports

Reducing the Cost of Electronic Gaming Machine Support with Intel® vPro™ Technology
sponsored by Wipro
PRODUCT LITERATURE: This paper illustrates the expected cost savings of deploying this technology to support electronic gaming operations.
Posted: 06 Feb 2009 | Published: 06 Feb 2009

Wipro

CW Europe – December 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 08 Feb 2021 | Published: 14 Dec 2017

TechTarget ComputerWeekly.com

CW Nordics May 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.
Posted: 08 Feb 2021 | Published: 25 May 2017

TechTarget ComputerWeekly.com

Zynga Grows to #1 Social Gaming Site with RightScale
sponsored by RightScale
CASE STUDY: With the skyrocketing popularity of Zynga games such as FarmVille – which is now the largest single application on Facebook – Zynga’s technology strategy has to be as savvy as its business model. Find out why Zynga now relies on cloud services to manage its precipitous growth, maintain high availability, and keep costs in check.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

RightScale

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

5 steps for a smooth ECM implementation
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Before implementing Enterprise Content Management, it's important for organizations to develop an ECM roadmap or strategy to identify the top priorities and get clarity on the necessary procedures and technologies it entails. This infographic outlines the steps to successfully implement an ECM system.
Posted: 25 Oct 2022 | Published: 06 Oct 2022

TechTarget ComputerWeekly.com

Getting the best out of robotic process automation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.
Posted: 15 Mar 2021 | Published: 19 Feb 2021

TechTarget ComputerWeekly.com

CW Buyer's Guide to Emerging technology
sponsored by TechTarget ComputerWeekly.com
EBOOK: The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

TechTarget ComputerWeekly.com

Getting the best out of robotic process automation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Application Delivery Network Buyer's Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com