End User Training Reports

Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jun 2019

TechTarget ComputerWeekly.com

Adoption Readiness Tool (ART) Training and Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Well-trained users are more productive and more successful in carrying out their roles. This whitepaper looks at what companies can do to build custom training and documentation.
Posted: 12 Nov 2013 | Published: 01 Jan 2013

Hewlett-Packard Enterprise

Simplifying the Management of Tier 1 ERP Systems for Mid-Sized Companies
sponsored by Oracle Corporation
WHITE PAPER: This white paper will discuss the impact of Tier 1 systems on IT departments in terms of ongoing maintenance, demonstrating that Tier 1 systems make many IT tasks easier, ranging from new-report generation to user training to upgrade management.
Posted: 04 May 2009 | Published: 04 May 2009

Oracle Corporation

AMD Honored on CRN’s 5-Star Partner Programs Guide for Second Consecutive Year
sponsored by AMD
PRESS RELEASE: AMD was named  to CRN's 2011 Partner Programs Guide for its AMD Fusion Partner Program (FPP). CRN's  Partner Programs Guide recognizes  vendors  with robust partner programs or products  that provide the best possible partnering elements for channel success.
Posted: 15 Jun 2011 | Published: 28 Mar 2011

AMD

SAP Travel Management at T-Com, eLearning for 140,000 Employees with datango
sponsored by datango AG
CASE STUDY: The IT department of T-Com Human Resources was faced with the challenge of training 140,000 employees to perform reporting processes for their own business travel as quickly as possible. Read this case study to find out how T-Com found their way to datango in their search for a customizable context sensitive online help system.
Posted: 04 Oct 2010 | Published: 04 Oct 2010

datango AG

Information Security ANZ March 2016
sponsored by TechTarget
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

How the Internet of Things Is Blurring the Line between Consumer and Industrial Technology
sponsored by IBM
EGUIDE: According to Harbor Research, there will be some 36 billion connected devices by 2020. But how and where will these devices come online? Explore how the Internet of Things will blur the line between consumer and industrial technology with upcoming trends like virtual reality, wearables, and more.
Posted: 10 May 2016 | Published: 06 May 2016

IBM

Ensuring Long-Term Success of BI/Analytics Projects: Train and Train Again
sponsored by SAP America, Inc.
WHITE PAPER: BI solutions are fast becoming a mainstay for organizations that recognize that proper collection and analysis of information can improve critical business processes. This paper provides key evaluation concerns for organizations looking to implement comprehensive training to ensure the success of their enterprise BI projects.
Posted: 20 Sep 2010 | Published: 20 Sep 2010

SAP America, Inc.

developerWorks Live! briefings
sponsored by IBM
RESOURCE CENTER: Attending one of the jam-packed IBM developerWorks Live! briefings will shorten your learning curve, and improve the quality and results of your most difficult software projects. Keep up-to-speed on the latest trends in the industry by signing up now for some of the most powerful briefings.
Posted: 20 Dec 2011 | Published: 20 Dec 2011

IBM

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security