ComputerWeekly.com Research Library

Powered by Bitpipe.com

Training Research

  • What can CIOs do about the skills shortage in ASEAN?

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.

  • Workforce Transformation Strategy: A Spotlight On India

    Sponsored by: Dell India

    Access this Forrester Research Report, which surveyed 61 IT decision makers in India on the major workforce transformation trends they saw throughout 2016

  • What can CIOs do about the IT skills shortage in ANZ?

    Sponsored by: ComputerWeekly.com

    CIOs in Australia and New Zealand, like their counterparts in other parts of the world, have been facing shortages in IT talent that have become more acute in recent years. In this e-guide, read more about IT talent issues in Oceania.

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

  • Employees at the Frontline in the Battle Against Ransomware

    Sponsored by: KnowBe4

    In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.

  • What Constitutes Effective Security Awareness Training?

    Sponsored by: KnowBe4

    Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.

  • Information technology skills guide

    Sponsored by: ComputerWeekly.com

    Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.

  • CW ANZ August 2016

    Sponsored by: SearchDataCenter.com

    In this month's CW ANZ e-zine, analyze the impact of a cloud failure in Australia and it forced enterprises to take heads out of sand and focus on business-continuity strategies. Also, you'll learn how Domain raises its game with the public cloud, why New Zealand calls for tech specialists, and more.

  • Mortimer Spinks and Computer Weekly Women in IT survey 2016

    Sponsored by: ComputerWeekly.com

    The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.

  • Key trends for IT leaders in 2016 Part I

    Sponsored by: ComputerWeekly.com

    Albert Ellis, CEO of recruitment company Harvey Nash Group, considers the key skill, careers and recruitment trends for 2016 in this PowerPoint presentation.

  • Oklahoma State University Medical Center Case Study

    Sponsored by: GE Healthcare

    Oklahoma State University Medical Center needed to upgrade image quality and physician access to cardiovascular patient information. This white paper describes an integrated imaging and workflow solution that enhanced cardiologist workflow, improved cardiac health management, and more.

  • Coding for Kids

    Sponsored by: ComputerWeekly.com

    Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.

  • Harnessing Business-Led IT

    Sponsored by: ComputerWeekly.com

    CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues

  • Information Security Asean July 2016

    Sponsored by: SearchSecurity.com

    In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • How the Internet of Things Is Blurring the Line between Consumer and Industrial Technology

    Sponsored by: IBM

    According to Harbor Research, there will be some 36 billion connected devices by 2020. But how and where will these devices come online? Explore how the Internet of Things will blur the line between consumer and industrial technology with upcoming trends like virtual reality, wearables, and more.

  • Information Security ANZ March 2016

    Sponsored by: TechTarget ANZ

    Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly

  • Information Security Asean March 2016

    Sponsored by: TechTarget ANZ

    Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals

  • Business Information Asean January 2016

    Sponsored by: SearchBusinessAnalytics

    Read in this issue how Philippine Long Distance Telephone Company (PLDT), has implemented a big data analytics environment, delivering invaluable behavioural insights for its capacity planning.

  • Information Security Asean July 2015

    Sponsored by: TechTarget ANZ

    Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.

  • Information Security ANZ July 2015

    Sponsored by: TechTarget ANZ

    Analysts and security experts discuss the current risk factors in the ANZ region.

  • CW Europe – June 2015

    Sponsored by: ComputerWeekly.com

    Employment across Europe - Why industry has a responsibility to ensure the IT workforce adds to Europe's economic value.

  • Information Security ASEAN March 2015

    Sponsored by: SearchSecurity.com

    Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.

  • Information Security ANZ March 2015

    Sponsored by: SearchSecurity.com

    Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.

  • Computer Weekly – 16 December 2014: MPs give Post Office the cold shoulder

    Sponsored by: Intel Corporation

    In this week's Computer Weekly we revisit subpostmaster grievances with the Post Office's IT. Despite years of allegations that the Horizon transaction processing system was at fault for many accounting shortfalls, the Post Office unrelentingly defended it. Read the issue now.

Browse by Report Type: Training White Papers | Training Multimedia | Training IT Downloads

See more topics related to: Training

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.