Technical Training Reports

Computer Weekly – 17 October 2023: The Most Influential Women in UK Technology 2023
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
Posted: 16 Oct 2023 | Published: 17 Oct 2023

TechTarget ComputerWeekly.com

Inside India: The world's IT powerhouse
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Covid-19 pandemic is turning out to be a big fork in the road for many companies. But what about the industry that keeps the lights on for them?
Posted: 08 Feb 2021 | Published: 12 Aug 2020

TechTarget ComputerWeekly.com

Information Security Asean July 2016
sponsored by TechTarget Security
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

Seven Steps for Effective Leadership Development
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the technology that can be deployed to extend talent management practices across the enterprise with a focus on leadership positions.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

Oracle Corporation

Top 10 Skills in Demand in 2010
sponsored by Global Knowledge
WHITE PAPER: In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand.
Posted: 25 Jan 2010 | Published: 25 Jan 2010

Global Knowledge

eGuide: Tackle SharePoint Sprawl and Implement Effective Training Strategies
sponsored by AvePoint, Inc.
EGUIDE: Read this E-Guide and uncover key SharePoint training techniques and strategies. Learn which factors can lead to SharePoint sprawl and how your organization can regain control of your SharePoint deployment.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

AvePoint, Inc.

Best Practices in Performance Management: Monitor, Measure and Manage the End User Experience
sponsored by Knoa Software
WHITE PAPER: This report is the result of a study taken by 87% of IT executives on the best way to manage the service of business critical applications to measure performance at the end-user level. Read this to learn the best practices in performance management.
Posted: 09 Sep 2008 | Published: 09 Sep 2008

Knoa Software

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

Computer Weekly – 16 December 2014: MPs give Post Office the cold shoulder
sponsored by Intel Corporation
EZINE: In this week's Computer Weekly we revisit subpostmaster grievances with the Post Office's IT. Despite years of allegations that the Horizon transaction processing system was at fault for many accounting shortfalls, the Post Office unrelentingly defended it. Read the issue now.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Intel Corporation