Corporate Training Reports

Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jun 2019

TechTarget ComputerWeekly.com

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

CW Benelux - May-July 2021: Netherlands university launches centre of expertise in applied AI
sponsored by TechTarget ComputerWeekly.com
EZINE: Amsterdam University of Applied Sciences has launched a centre of expertise in applied artificial intelligence, and students from all faculties of the university will learn how to apply AI in their field of study.
Posted: 26 Apr 2021 | Published: 13 May 2021

TechTarget ComputerWeekly.com

Computer Weekly – 14 February 2023: Where next for NHS IT?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.
Posted: 10 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 19 Aug 2014: Training school leavers could help organisations develop the IT skills they require and fill the growing skills gap
sponsored by TechTarget ComputerWeekly.com
EZINE: While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses at university, the IT industry is failing to attract enough new talent. An ageing workforce means there is a "demographic time bomb in IT".
Posted: 15 Aug 2014 | Published: 15 Aug 2014

TechTarget ComputerWeekly.com

Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Software

Stories That Move Mountains: Improve your presentation skills
sponsored by TechTarget ComputerWeekly.com
BOOK: Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

TechTarget ComputerWeekly.com

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

IBM Cognos Learning Assessment
sponsored by IBM
WHITE PAPER: This white paper introduces a customized learning assessment work package that extends the value of one business intelligence and performance management platform by teaching your business users the skills they need to drive success.
Posted: 15 Jan 2014 | Published: 31 Mar 2009

IBM

BYOD Security Policy Considerations and Best Practices
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security