ComputerWeekly.com Research Library

Powered by Bitpipe.com

Training Research

  • 2017 Salary Survey ASEAN Infographic

    Sponsored by: ComputerWeekly.com

    Download the 2017 Salary Survey ASEAN infographic to discover the latest information about demographics, training, earnings and women in IT.

  • 2017 Salary Survey ANZ Infographic

    Sponsored by: ComputerWeekly.com

    Download the 2017 Salary Survey ANZ infographic to discover the latest information about demographics, training, earnings and women in IT.

  • 2017 Middle East Salary Survey Infographic

    Sponsored by: ComputerWeekly.com

    Download this infographic to access Computer Weekly's annual salary survey revealing the average pay for technology professionals in the Middle East.

  • 2017 Salary Survey - Australia/New Zealand

    Sponsored by: ComputerWeekly.com

    We recently asked our members to share their experiences around IT salary and career goals. With results from 330+ IT pros in Australia/New Zealand we were able to identify some key employment trends and find out more about training, qualifications and diversity in IT departments. Read the results here and see how you compare with your peers.

  • Gain a Competitive Edge with Cloud Certification

    Sponsored by: VMware

    Cloud management is one of the skills that will get you hired and enhance your career. In this eBook, you will review the importance of cloud management platforms, the value of certifications, and the options that are available to you for getting cloud certified.

  • What can CIOs do about the skills shortage in ASEAN?

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.

  • What can CIOs do about the IT skills shortage in ANZ?

    Sponsored by: ComputerWeekly.com

    CIOs in Australia and New Zealand, like their counterparts in other parts of the world, have been facing shortages in IT talent that have become more acute in recent years. In this e-guide, read more about IT talent issues in Oceania.

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

  • Employees at the Frontline in the Battle Against Ransomware

    Sponsored by: KnowBe4

    In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.

  • What Constitutes Effective Security Awareness Training?

    Sponsored by: KnowBe4

    Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.

  • How To Measure e-Learning Effectiveness For Your Employees

    Sponsored by: Pluralsight

    42% of learning is lost after 20 minutes. Are you sure you're getting the most out of your training investments? In this webinar, learning and development expert Larry Israelite discusses tactics to better engage and assess your employees' learning and development.

  • Classroom VS Online Learning: Which Is Right For You?

    Sponsored by: Pluralsight

    Access now to learn the pros and cons of classroom vs. online learning, as well as some strategies for how to effectively train your employees in the digital age. Read on to find information about software designed to make online training simple, with the inclusion of mobile apps, predetermined learning paths, progress monitoring, and more.

  • Information technology skills guide

    Sponsored by: ComputerWeekly.com

    Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.

  • CW ANZ August 2016

    Sponsored by: SearchDataCenter.com

    In this month's CW ANZ e-zine, analyze the impact of a cloud failure in Australia and it forced enterprises to take heads out of sand and focus on business-continuity strategies. Also, you'll learn how Domain raises its game with the public cloud, why New Zealand calls for tech specialists, and more.

  • Mortimer Spinks and Computer Weekly Women in IT survey 2016

    Sponsored by: ComputerWeekly.com

    The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.

  • Timely, Cost-Effective Training for IT Professionals

    Sponsored by: Pluralsight

    Training can take IT pros offline for long periods of time, but de-prioritizing training can prevent IT admins from keeping up with rapidly changing technology. Learn more about on-demand training offerings that are conducted right in your office.

  • Key trends for IT leaders in 2016 Part I

    Sponsored by: ComputerWeekly.com

    Albert Ellis, CEO of recruitment company Harvey Nash Group, considers the key skill, careers and recruitment trends for 2016 in this PowerPoint presentation.

  • Information Security Asean July 2016

    Sponsored by: SearchSecurity.com

    In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • How the Internet of Things Is Blurring the Line between Consumer and Industrial Technology

    Sponsored by: IBM

    According to Harbor Research, there will be some 36 billion connected devices by 2020. But how and where will these devices come online? Explore how the Internet of Things will blur the line between consumer and industrial technology with upcoming trends like virtual reality, wearables, and more.

  • Information Security ANZ March 2016

    Sponsored by: TechTarget ANZ

    Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly

  • Information Security Asean March 2016

    Sponsored by: TechTarget ANZ

    Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals

  • Business Information Asean January 2016

    Sponsored by: SearchBusinessAnalytics

    Read in this issue how Philippine Long Distance Telephone Company (PLDT), has implemented a big data analytics environment, delivering invaluable behavioural insights for its capacity planning.

  • Information Security Asean July 2015

    Sponsored by: TechTarget ANZ

    Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.

  • Information Security ANZ July 2015

    Sponsored by: TechTarget ANZ

    Analysts and security experts discuss the current risk factors in the ANZ region.

Browse by Report Type: Training White Papers | Training Multimedia | Training IT Downloads

See more topics related to: Training

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.