End User Training Reports

A Computer Weekly buyer's guide to training programmes and tools
sponsored by TechTarget ComputerWeekly.com
EBOOK: It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

Information technology skills guide
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.
Posted: 08 Feb 2021 | Published: 26 Aug 2016

TechTarget ComputerWeekly.com

CW APAC – Tech Career Guide: Artificial intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence roles abound in the era of digitisation. In this handbook, focused on AI in the Asia-Pacific region, Computer Weekly looks at AI ethics, how to make it as a machine learning engineer, Accenture's push for tech talent and cyber security research lab advice.
Posted: 20 Jul 2023 | Published: 20 Jul 2023

TechTarget ComputerWeekly.com

APAC 2021 Salary Survey Results
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Inside this guide, you'll find an overview of the career and salary trends we're seeing in APAC as well as a breakdown of the results from ANZ, ASEAN and India so you can see for your location which job functions are getting paid what, what IT professionals are thinking in terms of career, and their salary expectations for the next 12 months.
Posted: 13 May 2021 | Published: 13 May 2021

TechTarget ComputerWeekly.com

2023 IT Salary & Career Survey Infographic APAC
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: TechTarget's 2023 study of 1030 technology professionals provides an inside look at major trends in employment, perks, and staffing across APAC. Find out how many of your peers received a raise in the past year, how many are benefitting from flexible working conditions, and the top 3 postitions business are looking to fill in the next 12 months.
Posted: 04 Sep 2023 | Published: 05 Sep 2023

TechTarget ComputerWeekly.com

Benefits Management: How to increase the business value of your IT projects
sponsored by TechTarget ComputerWeekly.com
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

TechTarget ComputerWeekly.com

Paving the Way to a Successful Upgrade Project
sponsored by SAP America, Inc.
PRODUCT LITERATURE: The SAP Upgrade Assessment for SAP ERP service delivers the expert advice and assistance you need to upgrade to a new release of the SAP ERP application. Read this whitepaper to learn which of the four different options is right for you.
Posted: 06 Aug 2008 | Published: 01 Jan 2007

SAP America, Inc.

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Stories That Move Mountains: Improve your presentation skills
sponsored by TechTarget ComputerWeekly.com
BOOK: Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

TechTarget ComputerWeekly.com

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat