Computer Training Reports

Digital Disruption Index: Aligning strategy, workforce and technology
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Business leaders' confidence in the digital capabilities of new entrants to the workplace has improved in the past six months, according to the Digital Disruption Index by Deloitte.
Posted: 14 Jan 2019 | Published: 14 Jan 2019

ComputerWeekly.com

T-Systems: Flexible Offerings from SAP® Education Boost Expertise While Keeping Costs down
sponsored by SAP America, Inc.
CASE STUDY: This paper explains how T-Systems, an SAP global hosting partner and an outsourcing provider for SAP, turned to SAP Education to create an intensive SAP training course that greatly reduced the need for travel. Read on to learn the business benefits T-Systems has experienced since combining efforts with SAP Education.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

Oracle Compatibility Developers Guide for Postgres Plus Advanced Server
sponsored by EnterpriseDB Corporation
TRAINING GUIDE: This guide describes the Oracle compatibility features of Postgres Plus Advanced Server. Oracle compatibility means that an application runs in an Oracle environment as well as in a Postgres Plus Advanced Server environment with minimal or no changes to the application code.
Posted: 30 Apr 2009 | Published: 14 Mar 2008

EnterpriseDB Corporation

Informal Learning: Extending the Impact of Enterprise Ideas and Information
sponsored by Adobe
WHITE PAPER: Forward-thinking organizations are turning to enterprise learning in their quest to be better informed, better skilled, better supported at the point of need, and more competitive in their respective marketplaces.
Posted: 10 Apr 2008 | Published: 01 Apr 2007

Adobe

How to measure successful internal talent mobility
sponsored by Oracle Corporation
WHITE PAPER: This resource reveals everything HR professionals, IT professionals, and business leaders need to know about internal talent mobility. With a strong internal mobility program, you can leverage your existing employee base to achieve corporate goals, shifting resources where they're best suited while keeping your employees engaged and content.
Posted: 03 Apr 2014 | Published: 31 Oct 2013

Oracle Corporation

Computer Weekly – 19 Aug 2014: Training school leavers could help organisations develop the IT skills they require and fill the growing skills gap
sponsored by ComputerWeekly.com
EZINE: While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses at university, the IT industry is failing to attract enough new talent. An ageing workforce means there is a "demographic time bomb in IT".
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

Information Security ANZ July 2016
sponsored by SearchSecurity.com
EZINE: Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

SearchSecurity.com

Simplifying the Management of Tier 1 ERP Systems for Mid-Sized Companies
sponsored by Oracle Corporation
WHITE PAPER: This white paper will discuss the impact of Tier 1 systems on IT departments in terms of ongoing maintenance, demonstrating that Tier 1 systems make many IT tasks easier, ranging from new-report generation to user training to upgrade management.
Posted: 04 May 2009 | Published: 04 May 2009

Oracle Corporation

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies