Technical Training Reports

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

CW Benelux - May-July 2021: Netherlands university launches centre of expertise in applied AI
sponsored by TechTarget ComputerWeekly.com
EZINE: Amsterdam University of Applied Sciences has launched a centre of expertise in applied artificial intelligence, and students from all faculties of the university will learn how to apply AI in their field of study.
Posted: 26 Apr 2021 | Published: 13 May 2021

TechTarget ComputerWeekly.com

Computer Weekly – 14 February 2023: Where next for NHS IT?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.
Posted: 10 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

CW APAC, March 2021: Tech career guide
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the qualities and skills that are required to be successful in DevOps.
Posted: 15 Mar 2021 | Published: 04 Mar 2021

TechTarget ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security

Reducing Total Cost of Ownership: Delivering Cost Effective Enterprise Business Intelligence
sponsored by MicroStrategy
WHITE PAPER: This white paper explains how MicroStrategy's enterprise strength, scalable platform and self-service technology enable organizations to achieve pervasive BI at the lowest industry ownership costs.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

MicroStrategy

Lubrizol's Service Management Transformation
sponsored by HP & Intel®
CASE STUDY: Download this case study to discover how a company transitioned to a service-oriented organization in a timely and cost-effective manner by implementing HP education, software tools and ITSM services.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

HP & Intel®

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat

Adoption Readiness Tool (ART) Training and Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Well-trained users are more productive and more successful in carrying out their roles. This whitepaper looks at what companies can do to build custom training and documentation.
Posted: 12 Nov 2013 | Published: 01 Jan 2013

Hewlett-Packard Enterprise

Seven Steps for Effective Leadership Development
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the technology that can be deployed to extend talent management practices across the enterprise with a focus on leadership positions.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

Oracle Corporation