Internet Game Sites White Papers

(View All Report Types)
Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

IT Project: Internet of Things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.
Posted: 08 Feb 2021 | Published: 19 Aug 2016

TechTarget ComputerWeekly.com

A Computer Weekly Buyers Guide to IoT
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
Posted: 08 Feb 2021 | Published: 12 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021

TechTarget ComputerWeekly.com

Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?
sponsored by TechTarget ComputerWeekly.com
EZINE: The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.
Posted: 08 Feb 2021 | Published: 09 Aug 2016

TechTarget ComputerWeekly.com

Securing the Industrial Internet of Things
sponsored by PC Connection
INFOGRAPHIC: Securing the Industrial Internet of Things (IIoT) is critical as cybersecurity threats rise. Understand the IIoT threat landscape and learn how to assess OT and IIoT security with a 3-step approach. Download this infographic to discover best practices for minimizing risk and maximizing the returns of IIoT.
Posted: 19 Sep 2024 | Published: 20 Sep 2024

All resources sponsored by PC Connection

How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE: In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 08 Feb 2021 | Published: 21 Sep 2016

Dimension Data

Beginner's guide to Internet of Things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

Australia's cybersecurity game plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

TechTarget ComputerWeekly.com

Computer Weekly - 31 March 2020: Can the internet take the strain?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.
Posted: 08 Feb 2021 | Published: 31 Mar 2020

TechTarget ComputerWeekly.com

Computer Weekly – 20 September 2022: A gold medal performance for networking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.
Posted: 20 Sep 2022 | Published: 20 Sep 2022

TechTarget ComputerWeekly.com

Wireless Logic Signs Global Reseller Agreement with Starlink
sponsored by Blue Wireless
WHITE PAPER: Wireless Logic and Blue Wireless have signed a global reseller agreement with Starlink to deliver a managed service combining cellular and satellite connectivity for IoT and enterprises worldwide. Learn how this game-changing connectivity solution can benefit your business by reading the full white paper.
Posted: 22 Aug 2024 | Published: 22 Aug 2024

Blue Wireless

Calculating ROI of DCIM Monitoring for Distributed IT Sites
sponsored by Schneider Electric
WHITE PAPER: In this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.
Posted: 23 Mar 2024 | Published: 23 Mar 2024

TOPICS:  .NET
Schneider Electric

CW APAC: Trend Watch - Internet of Things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how APAC firms are putting the internet of things to good use in an increasingly connected world, yet technology integration and security concerns are holding back widespread adoption.
Posted: 08 Feb 2021 | Published: 15 Aug 2019

TechTarget ComputerWeekly.com

3 Real-world Scenarios That Could Unravel The Internet
sponsored by Cisco ThousandEyes
INFOGRAPHIC: With internet connectivity more important to businesses than ever before, preventing these outages and limiting their damage is vitally important. This infographic explores 3 critical case scenarios, each presenting a real-world situation that could lead to critical outages. Read on to learn more.
Posted: 15 Aug 2024 | Published: 15 Aug 2024

TOPICS:  .NET
Cisco ThousandEyes

Construction Company Needs LTE to Make On-Site Trailers Operational Immediately
sponsored by Cradlepoint
CASE STUDY: Connecting their on-site engineers and construction trailers is key to Bilfinger SE – an international industrial services provider – meeting their strict deadlines. So, how does Bilfinger facilitate reliable, secure connectivity? Explore this case study to find out.
Posted: 13 Feb 2024 | Published: 13 Feb 2024

TOPICS:  .NET
Cradlepoint

Harnessing AI: Transformative Impacts and Predictive Power in Healthcare
sponsored by XtelligentMedia Healthcare
EGUIDE: In the healthcare industry artificial intelligence is now a game-change supporting medical research, patient care and overall system operations. Predictive tools for spine surgery outcomes were surpassed by a machine learning approach that combined ecological momentary assessment data, wearable data and electronic health records.
Posted: 28 Jul 2024 | Published: 29 Jul 2024

XtelligentMedia Healthcare

Royal Holloway: Attack mapping for the internet of things
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
Posted: 13 May 2022 | Published: 13 May 2022

TechTarget ComputerWeekly.com

The Internet Outage Survival Guide: Unpacking common outages types and how they impact your business
sponsored by Cisco ThousandEyes
EBOOK: Today, business rely on the Internet more than ever. Yet, the Internet is as unpredictable as it is critical. It's a "best-effort" collection of networks connecting a myriad of providers, and at its very core, the Internet is vulnerable to outages. In this e-book, learn how you can mitigate the risk of an Internet outage.
Posted: 08 Feb 2021 | Published: 15 Jan 2021

Cisco ThousandEyes

CW Nordics May 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.
Posted: 08 Feb 2021 | Published: 25 May 2017

TechTarget ComputerWeekly.com

Computer Weekly – 17 July 2018: How container technology is evolving
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as adoption of containers grows rapidly, we look at the choices and potential benefits of the technology, the efforts being made to secure internet of things devices and how the latest Brexit plans will affect the UK tech sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Jul 2018

TechTarget ComputerWeekly.com

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Top 10 Australia IT stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.
Posted: 08 Feb 2021 | Published: 21 Dec 2018

TechTarget ComputerWeekly.com

Using Secure 5G and SD-WAN Through a Hybrid WAN Solution in Fixed Sites
sponsored by Cradlepoint
PRODUCT OVERVIEW: How can organizations meet the networking needs of their fixed sites without on-site IT professionals? Tap into this overview to learn how hybrid WAN can help.
Posted: 13 Feb 2024 | Published: 13 Feb 2024

TOPICS:  .NET
Cradlepoint

Endpoint security: Hybrid work changes the game
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not.  In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.
Posted: 10 Dec 2021 | Published: 10 Dec 2021

TechTarget ComputerWeekly.com

Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
Posted: 08 Feb 2021 | Published: 26 Jul 2016

TechTarget ComputerWeekly.com