Retraining Reports

CIO Trends 2017 #2 ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.
Posted: 08 Feb 2021 | Published: 04 Jul 2017

TechTarget ComputerWeekly.com

Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
Posted: 21 Feb 2022 | Published: 22 Feb 2022

TechTarget ComputerWeekly.com

Computer Weekly – 14 February 2023: Where next for NHS IT?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.
Posted: 10 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Wisegate

Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Software

AMD Honored on CRN’s 5-Star Partner Programs Guide for Second Consecutive Year
sponsored by AMD
PRESS RELEASE: AMD was named  to CRN's 2011 Partner Programs Guide for its AMD Fusion Partner Program (FPP). CRN's  Partner Programs Guide recognizes  vendors  with robust partner programs or products  that provide the best possible partnering elements for channel success.
Posted: 15 Jun 2011 | Published: 28 Mar 2011

AMD

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Best Practices in Performance Management: Monitor, Measure and Manage the End User Experience
sponsored by Knoa Software
WHITE PAPER: This report is the result of a study taken by 87% of IT executives on the best way to manage the service of business critical applications to measure performance at the end-user level. Read this to learn the best practices in performance management.
Posted: 09 Sep 2008 | Published: 09 Sep 2008

Knoa Software

developerWorks Live! briefings
sponsored by IBM
RESOURCE CENTER: Attending one of the jam-packed IBM developerWorks Live! briefings will shorten your learning curve, and improve the quality and results of your most difficult software projects. Keep up-to-speed on the latest trends in the industry by signing up now for some of the most powerful briefings.
Posted: 20 Dec 2011 | Published: 20 Dec 2011

IBM