ComputerWeekly.com Research Library

Powered by Bitpipe.com

Training Research

  • Keys to Empowering Managers

    Sponsored by: SumTotal by Skillsoft

    According to a recent Gallup report, companies failing to hire the right management candidate 82% of the time. Access this infographic to learn why having the right management team is critical to your business's success and how you can empower your managers to better manage their teams, retain top talent, and more.

  • Employees at the Frontline in the Battle Against Ransomware

    Sponsored by: KnowBe4

    In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.

  • What Constitutes Effective Security Awareness Training?

    Sponsored by: KnowBe4

    Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.

  • Hiring for the Future

    Sponsored by: Sage (UK) Limited

    It's vital that you understand how potential employees view your organization. Access this guide to explore the 5 steps to attracting talent, reshaping your organization's recruitment strategy, and give yourself the competitive edge.

  • Your guide to bridging the analytics skills gap.

    Sponsored by: SAS

    This e-book features of collection of interviews with those who employ and educate analytics talent with the hope of helping your bridge the skills gap in your organization. Inside, you'll learn how managers in a variety of industries have used new analytics programs, and plans for educating future analysts.

  • How to Embed Digital Transformation in Your Agency

    Sponsored by: Infor

    Government agencies need to simplify their websites and the ways in which they interact with citizens and users. Reserve a seat for an online training session Thursday, September 22nd at 2pm ET/ 11am PT to learn how agencies can handle digital transformations and the challenges that come with it.

  • Information technology skills guide

    Sponsored by: ComputerWeekly.com

    Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.

  • Mortimer Spinks and Computer Weekly Women in IT survey 2016

    Sponsored by: ComputerWeekly.com

    The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.

  • Cloud Migrations

    Sponsored by: Red Hat

    The name of the game is delivery the highest quality at the lowest price. Many are seeing a cloud migration as the best game plan, but are unsure about how to get there. Read on to learn about a consulting service that guides you every step of the way in your migration to the cloud.

  • Key trends for IT leaders in 2016 Part I

    Sponsored by: ComputerWeekly.com

    Albert Ellis, CEO of recruitment company Harvey Nash Group, considers the key skill, careers and recruitment trends for 2016 in this PowerPoint presentation.

  • Coding for Kids

    Sponsored by: ComputerWeekly.com

    Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.

  • Harnessing Business-Led IT

    Sponsored by: ComputerWeekly.com

    CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues

  • CW ANZ August 2016

    Sponsored by: SearchDataCenter.com

    In this month's CW ANZ e-zine, analyze the impact of a cloud failure in Australia and it forced enterprises to take heads out of sand and focus on business-continuity strategies. Also, you'll learn how Domain raises its game with the public cloud, why New Zealand calls for tech specialists, and more.

  • Information Security Asean July 2016

    Sponsored by: SearchSecurity.com

    In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • How the Internet of Things Is Blurring the Line between Consumer and Industrial Technology

    Sponsored by: IBM

    According to Harbor Research, there will be some 36 billion connected devices by 2020. But how and where will these devices come online? Explore how the Internet of Things will blur the line between consumer and industrial technology with upcoming trends like virtual reality, wearables, and more.

  • Information Security ANZ March 2016

    Sponsored by: TechTarget ANZ

    Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly

  • Information Security Asean March 2016

    Sponsored by: TechTarget ANZ

    Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals

  • Business Information Asean January 2016

    Sponsored by: SearchBusinessAnalytics

    Read in this issue how Philippine Long Distance Telephone Company (PLDT), has implemented a big data analytics environment, delivering invaluable behavioural insights for its capacity planning.

  • Information Security Asean July 2015

    Sponsored by: TechTarget ANZ

    Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.

  • Information Security ANZ July 2015

    Sponsored by: TechTarget ANZ

    Analysts and security experts discuss the current risk factors in the ANZ region.

  • CW Europe – June 2015

    Sponsored by: ComputerWeekly.com

    Employment across Europe - Why industry has a responsibility to ensure the IT workforce adds to Europe's economic value.

  • Information Security ASEAN March 2015

    Sponsored by: SearchSecurity.com

    Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.

  • Information Security ANZ March 2015

    Sponsored by: SearchSecurity.com

    Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.

  • Computer Weekly – 16 December 2014: MPs give Post Office the cold shoulder

    Sponsored by: Intel Corporation

    In this week's Computer Weekly we revisit subpostmaster grievances with the Post Office's IT. Despite years of allegations that the Horizon transaction processing system was at fault for many accounting shortfalls, the Post Office unrelentingly defended it. Read the issue now.

Browse by Report Type: Training White Papers | Training Multimedia | Training IT Downloads

See more topics related to: Training

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.