Continuing Education Reports

CIO Trends 2017 #2 ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.
Posted: 08 Feb 2021 | Published: 04 Jul 2017

TechTarget ComputerWeekly.com

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER: This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008

Avaya Inc.

AstraZeneca: Success Story
sponsored by SuccessFactors
CASE STUDY: AstraZeneca was looking for a way to automate its manual duty assignment and logging training processes. Read this case study to learn how they accomplished this by implementing a learning management system to automate and streamline the assignment of all regulatory and job-specific training.
Posted: 09 Oct 2012 | Published: 27 Apr 2012

SuccessFactors

Oracle Compatibility Developers Guide for Postgres Plus Advanced Server
sponsored by EnterpriseDB Corporation
TRAINING GUIDE: This guide describes the Oracle compatibility features of Postgres Plus Advanced Server. Oracle compatibility means that an application runs in an Oracle environment as well as in a Postgres Plus Advanced Server environment with minimal or no changes to the application code.
Posted: 30 Apr 2009 | Published: 14 Mar 2008

EnterpriseDB Corporation

AMD Honored on CRN’s 5-Star Partner Programs Guide for Second Consecutive Year
sponsored by AMD
PRESS RELEASE: AMD was named  to CRN's 2011 Partner Programs Guide for its AMD Fusion Partner Program (FPP). CRN's  Partner Programs Guide recognizes  vendors  with robust partner programs or products  that provide the best possible partnering elements for channel success.
Posted: 15 Jun 2011 | Published: 28 Mar 2011

AMD

Top 10 Skills in Demand in 2010
sponsored by Global Knowledge
WHITE PAPER: In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand.
Posted: 25 Jan 2010 | Published: 25 Jan 2010

Global Knowledge

Computer Weekly – 21 February 2023: Innovation not infestation – digitising pest control
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Rentokil Initial is using digital innovations to improve the age-old task of pest control. Leading experts offer a 15-point plan to improve diversity and inclusion in IT. And with all the excitement around ChatGPT, we ask whether business is ready to use the AI chatbot. Read the issue now.
Posted: 22 Sep 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

Gaining Control of Order Management Processes
sponsored by Esker Inc.
EBOOK: In this E-Book, designed for business and IT professionals, find out more about using technology to gain control of sales order management processes. Learn how to navigate the many technology choices and choose between on-premise or SaaS/cloud options. And get key considerations and best practices for optimizing sales order processes.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Esker Inc.

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies