End User Training Reports

A Computer Weekly buyer's guide to training programmes and tools
sponsored by TechTarget ComputerWeekly.com
EBOOK: It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Virgin Media Case Study: Virgin Media ignites productivity and collaboration with new learning and performance management system
sponsored by Cornerstone OnDemand
CASE STUDY: This case study explains how Virgin Media, a leading provider of broadband, TV, mobile phone and home phone services in the UK, was able to realize significant workforce gains with a cloud-based learning and performance management system.
Posted: 15 May 2013 | Published: 31 Dec 2012

Cornerstone OnDemand

Business Information Asean January 2016
sponsored by TechTarget Business Analytics
EZINE: Read in this issue how Philippine Long Distance Telephone Company (PLDT), has implemented a big data analytics environment, delivering invaluable behavioural insights for its capacity planning.
Posted: 23 Feb 2016 | Published: 04 Jan 2016

TechTarget Business Analytics

BYOD Security Policy Considerations and Best Practices
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.

Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER: This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008

Avaya Inc.

Information Security Asean March 2016
sponsored by TechTarget
EZINE: Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

Smarter Planet Industry Solutions technical podcast series: Season 1
sponsored by IBM
PODCAST: Welcome to the IBM developerWorks Smarter Planet Industry Solutions technical podcast series, your source for technical discussions regarding IT solutions for your industry. Tune in every few weeks to hearĀ a new expert discussion.
Posted: 21 Dec 2011 | Premiered: Oct 21, 2011

IBM