Staff Training Reports

Digital Revolution: Moving towards agility
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.
Posted: 08 Feb 2021 | Published: 21 Mar 2018

TechTarget ComputerWeekly.com

2023 IT Salary & Career Survey Infographic APAC
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: TechTarget's 2023 study of 1030 technology professionals provides an inside look at major trends in employment, perks, and staffing across APAC. Find out how many of your peers received a raise in the past year, how many are benefitting from flexible working conditions, and the top 3 postitions business are looking to fill in the next 12 months.
Posted: 04 Sep 2023 | Published: 05 Sep 2023

TechTarget ComputerWeekly.com

Computer Weekly – 17 October 2023: The Most Influential Women in UK Technology 2023
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
Posted: 16 Oct 2023 | Published: 17 Oct 2023

TechTarget ComputerWeekly.com

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Virgin Media Case Study: Virgin Media ignites productivity and collaboration with new learning and performance management system
sponsored by Cornerstone OnDemand
CASE STUDY: This case study explains how Virgin Media, a leading provider of broadband, TV, mobile phone and home phone services in the UK, was able to realize significant workforce gains with a cloud-based learning and performance management system.
Posted: 15 May 2013 | Published: 31 Dec 2012

Cornerstone OnDemand

Top 10 Skills in Demand in 2010
sponsored by Global Knowledge
WHITE PAPER: In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand.
Posted: 25 Jan 2010 | Published: 25 Jan 2010

Global Knowledge

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Computer Weekly – 16 December 2014: MPs give Post Office the cold shoulder
sponsored by Intel Corporation
EZINE: In this week's Computer Weekly we revisit subpostmaster grievances with the Post Office's IT. Despite years of allegations that the Horizon transaction processing system was at fault for many accounting shortfalls, the Post Office unrelentingly defended it. Read the issue now.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Intel Corporation

Stories That Move Mountains: Improve your presentation skills
sponsored by TechTarget ComputerWeekly.com
BOOK: Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

TechTarget ComputerWeekly.com

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security