Computer Training Reports

2023 IT Salary & Career Survey Infographic APAC
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: TechTarget's 2023 study of 1030 technology professionals provides an inside look at major trends in employment, perks, and staffing across APAC. Find out how many of your peers received a raise in the past year, how many are benefitting from flexible working conditions, and the top 3 postitions business are looking to fill in the next 12 months.
Posted: 04 Sep 2023 | Published: 05 Sep 2023

TechTarget ComputerWeekly.com

Computer Weekly – 17 October 2023: The Most Influential Women in UK Technology 2023
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
Posted: 16 Oct 2023 | Published: 17 Oct 2023

TechTarget ComputerWeekly.com

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

How to measure successful internal talent mobility
sponsored by Oracle Corporation
WHITE PAPER: This resource reveals everything HR professionals, IT professionals, and business leaders need to know about internal talent mobility. With a strong internal mobility program, you can leverage your existing employee base to achieve corporate goals, shifting resources where they're best suited while keeping your employees engaged and content.
Posted: 03 Apr 2014 | Published: 31 Oct 2013

Oracle Corporation

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat

AstraZeneca: Success Story
sponsored by SuccessFactors
CASE STUDY: AstraZeneca was looking for a way to automate its manual duty assignment and logging training processes. Read this case study to learn how they accomplished this by implementing a learning management system to automate and streamline the assignment of all regulatory and job-specific training.
Posted: 09 Oct 2012 | Published: 27 Apr 2012

SuccessFactors

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Oracle Compatibility Developers Guide for Postgres Plus Advanced Server
sponsored by EnterpriseDB Corporation
TRAINING GUIDE: This guide describes the Oracle compatibility features of Postgres Plus Advanced Server. Oracle compatibility means that an application runs in an Oracle environment as well as in a Postgres Plus Advanced Server environment with minimal or no changes to the application code.
Posted: 30 Apr 2009 | Published: 14 Mar 2008

EnterpriseDB Corporation

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.