End User Training Reports

Mortimer Spinks and Computer Weekly Women in IT survey 2016
sponsored by TechTarget ComputerWeekly.com
EBOOK: The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.
Posted: 08 Feb 2021 | Published: 23 Jun 2016

TechTarget ComputerWeekly.com

2023 IT Salary & Career Survey Infographic APAC
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: TechTarget's 2023 study of 1030 technology professionals provides an inside look at major trends in employment, perks, and staffing across APAC. Find out how many of your peers received a raise in the past year, how many are benefitting from flexible working conditions, and the top 3 postitions business are looking to fill in the next 12 months.
Posted: 04 Sep 2023 | Published: 05 Sep 2023

TechTarget ComputerWeekly.com

CIO Trends 2017 #2 ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.
Posted: 08 Feb 2021 | Published: 04 Jul 2017

TechTarget ComputerWeekly.com

Increasing Data Center Density While Driving down Power and Cooling Costs
sponsored by Intel Corporation
WHITE PAPER: This paper discusses various technologies that can help IT managers plan and implement a more comprehensive and effective strategy for expanding data center capabilities while reducing power consumption.
Posted: 24 Jul 2008 | Published: 01 Jun 2006

Intel Corporation

Information Security Asean July 2016
sponsored by TechTarget Security
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

SAP® Knowledge Acceleration: For Effective Business Planning and Consolidation
sponsored by SAP America, Inc.
WHITE PAPER: Read this paper to learn how SAP® Knowledge Acceleration software for business planning and consolidation will help your organization acquire insight and reporting skills it needs to execute today and tomorrow. Read on to learn all the business benefits this SAP software will provide for your organization.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

How the Internet of Things Is Blurring the Line between Consumer and Industrial Technology
sponsored by IBM
EGUIDE: According to Harbor Research, there will be some 36 billion connected devices by 2020. But how and where will these devices come online? Explore how the Internet of Things will blur the line between consumer and industrial technology with upcoming trends like virtual reality, wearables, and more.
Posted: 10 May 2016 | Published: 06 May 2016

IBM

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

BYOD Security Policy Considerations and Best Practices
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security