Job Training Reports

CIO Trends 2017 #2 ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.
Posted: 08 Feb 2021 | Published: 04 Jul 2017

TechTarget ComputerWeekly.com

Digital Revolution: Moving towards agility
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.
Posted: 08 Feb 2021 | Published: 21 Mar 2018

TechTarget ComputerWeekly.com

CW Benelux - May-July 2021: Netherlands university launches centre of expertise in applied AI
sponsored by TechTarget ComputerWeekly.com
EZINE: Amsterdam University of Applied Sciences has launched a centre of expertise in applied artificial intelligence, and students from all faculties of the university will learn how to apply AI in their field of study.
Posted: 26 Apr 2021 | Published: 13 May 2021

TechTarget ComputerWeekly.com

Adoption Readiness Tool (ART) Training and Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Well-trained users are more productive and more successful in carrying out their roles. This whitepaper looks at what companies can do to build custom training and documentation.
Posted: 12 Nov 2013 | Published: 01 Jan 2013

Hewlett-Packard Enterprise

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Gaining Control of Order Management Processes
sponsored by Esker Inc.
EBOOK: In this E-Book, designed for business and IT professionals, find out more about using technology to gain control of sales order management processes. Learn how to navigate the many technology choices and choose between on-premise or SaaS/cloud options. And get key considerations and best practices for optimizing sales order processes.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Esker Inc.

Stories That Move Mountains: Improve your presentation skills
sponsored by TechTarget ComputerWeekly.com
BOOK: Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

TechTarget ComputerWeekly.com

Best Practices in Performance Management: Monitor, Measure and Manage the End User Experience
sponsored by Knoa Software
WHITE PAPER: This report is the result of a study taken by 87% of IT executives on the best way to manage the service of business critical applications to measure performance at the end-user level. Read this to learn the best practices in performance management.
Posted: 09 Sep 2008 | Published: 09 Sep 2008

Knoa Software