IT Training Reports

Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.
Posted: 01 Mar 2022 | Published: 01 Mar 2022

TechTarget ComputerWeekly.com

Information technology skills guide
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.
Posted: 08 Feb 2021 | Published: 26 Aug 2016

TechTarget ComputerWeekly.com

Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Take Advantage of Oracle's 2 Day DBA Course
sponsored by Oracle Corporation
TRAINING GUIDE: This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions.
Posted: 25 Feb 2009 | Published: 25 Feb 2009

Oracle Corporation

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Top 10 Skills in Demand in 2010
sponsored by Global Knowledge
WHITE PAPER: In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand.
Posted: 25 Jan 2010 | Published: 25 Jan 2010

Global Knowledge

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Informal Learning: Extending the Impact of Enterprise Ideas and Information
sponsored by Adobe
WHITE PAPER: Forward-thinking organizations are turning to enterprise learning in their quest to be better informed, better skilled, better supported at the point of need, and more competitive in their respective marketplaces.
Posted: 10 Apr 2008 | Published: 01 Apr 2007

Adobe

15 Top-Paying IT Certifications for 2014
sponsored by Global Knowledge
WHITE PAPER: It's always a good idea to take stock of your skills, your pay, and your certifications. To that end, here is a review of 15 of the top-paying certifications for 2014. With each certification, you'll find the average (mean) salary and a brief description.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge