ComputerWeekly.com Research Library

Powered by Bitpipe.com

Training Research

  • Cloud Migrations

    Sponsored by: Red Hat

    The name of the game is delivery the highest quality at the lowest price. Many are seeing a cloud migration as the best game plan, but are unsure about how to get there. Read on to learn about a consulting service that guides you every step of the way in your migration to the cloud.

  • Information Security ANZ March 2016

    Sponsored by: TechTarget ANZ

    Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly

  • Information Security Asean March 2016

    Sponsored by: TechTarget ANZ

    Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals

  • Business Information Asean January 2016

    Sponsored by: SearchBusinessAnalytics

    Read in this issue how Philippine Long Distance Telephone Company (PLDT), has implemented a big data analytics environment, delivering invaluable behavioural insights for its capacity planning.

  • Key trends for IT leaders in 2016 Part I

    Sponsored by: ComputerWeekly.com

    Albert Ellis, CEO of recruitment company Harvey Nash Group, considers the key skill, careers and recruitment trends for 2016 in this PowerPoint presentation.

  • How to prepare for the Red Hat Certified System Administrator Exam

    Sponsored by: Red Hat

    This exclusive datasheet provides all the information candidates need to know when preparing to take the Red Hat Certified Administrator Exam. Find out how the performance-based format is designed to test your ability to accomplish tasks without assistance and what qualifications are needed for a passing score.

  • Coding for Kids

    Sponsored by: ComputerWeekly.com

    Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.

  • Harnessing Business-Led IT

    Sponsored by: ComputerWeekly.com

    CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues

  • Tactics to combat insider threat

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

  • Integrated Talent Management

    Sponsored by: ComputerWeekly.com

    This Independent analyst perspective into the integrated talent management systems market from Elearnity assesses the leading talent management suppliers.

  • Women in Technology 2014

    Sponsored by: ComputerWeekly.com

    Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.

  • Automating Information Governance - assuring compliance

    Sponsored by: ComputerWeekly.com

    This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Harvey Nash CIO Survey 2014

    Sponsored by: ComputerWeekly.com

    Business are increasing their investment in technology more quickly than any time since 2006 as confidence returns in the economy, this global survey of IT leaders reveals.

  • Strategic IT

    Sponsored by: ComputerWeekly.com

    Find out how two leading CIOs have enabled their organisations to use information technology as strategic driver, in this extract from the book Strategic IT.

  • Leveraging Talent

    Sponsored by: ComputerWeekly.com

    Learn how to make the most of your IT workforce and how to nurture talent by following these strategies used by HR professionals.

  • Cisco Certifications

    Sponsored by: Global Knowledge

    In the Cisco networking industry, there is a certification track for you, from the start of your career, through the advanced levels of network design and architecture. Click through to explore more.

  • Information Security Asean July 2015

    Sponsored by: TechTarget ANZ

    Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.

  • Information Security ANZ July 2015

    Sponsored by: TechTarget ANZ

    Analysts and security experts discuss the current risk factors in the ANZ region.

  • CW Europe – June 2015

    Sponsored by: ComputerWeekly.com

    Employment across Europe - Why industry has a responsibility to ensure the IT workforce adds to Europe's economic value.

  • Information Security ASEAN March 2015

    Sponsored by: SearchSecurity.com

    Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.

  • Information Security ANZ March 2015

    Sponsored by: SearchSecurity.com

    Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.

  • Computer Weekly – 16 December 2014: MPs give Post Office the cold shoulder

    Sponsored by: Intel Corporation

    In this week's Computer Weekly we revisit subpostmaster grievances with the Post Office's IT. Despite years of allegations that the Horizon transaction processing system was at fault for many accounting shortfalls, the Post Office unrelentingly defended it. Read the issue now.

  • Computer Weekly – 19 Aug 2014: Training school leavers could help organisations develop the IT skills they require and fill the growing skills gap

    Sponsored by: ComputerWeekly.com

    While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses at university, the IT industry is failing to attract enough new talent. An ageing workforce means there is a "demographic time bomb in IT".

  • Red Hat JBoss Middleware and Fuse Training and Certification

    Sponsored by: Red Hat

    In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.

  • How to measure successful internal talent mobility

    Sponsored by: Oracle Corporation

    This resource reveals everything HR professionals, IT professionals, and business leaders need to know about internal talent mobility. With a strong internal mobility program, you can leverage your existing employee base to achieve corporate goals, shifting resources where they're best suited while keeping your employees engaged and content.

Browse by Report Type: Training White Papers | Training Multimedia | Training IT Downloads

See more topics related to: Training

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.