Education Reports

A Computer Weekly buyer's guide to training programmes and tools
sponsored by TechTarget ComputerWeekly.com
EBOOK: It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

Digital Disruption Index: Aligning strategy, workforce and technology
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Business leaders' confidence in the digital capabilities of new entrants to the workplace has improved in the past six months, according to the Digital Disruption Index by Deloitte.
Posted: 08 Feb 2021 | Published: 14 Jan 2019

TechTarget ComputerWeekly.com

Futureproof – how to get your business ready for the next disruption
sponsored by TechTarget ComputerWeekly.com
BOOK: This extract from the book, Futureproof – how to get your business ready for the next disruption, by Minter Dial, gives some invaluable career tips for IT and other professionals, looking to futureproof their careers.
Posted: 08 Feb 2021 | Published: 14 Dec 2017

TOPICS:  CIOs | Training
TechTarget ComputerWeekly.com

Inside India: The world's IT powerhouse
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Covid-19 pandemic is turning out to be a big fork in the road for many companies. But what about the industry that keeps the lights on for them?
Posted: 08 Feb 2021 | Published: 12 Aug 2020

TechTarget ComputerWeekly.com

CW Middle East ezine July 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

Computer Weekly – 19 Aug 2014: Training school leavers could help organisations develop the IT skills they require and fill the growing skills gap
sponsored by TechTarget ComputerWeekly.com
EZINE: While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses at university, the IT industry is failing to attract enough new talent. An ageing workforce means there is a "demographic time bomb in IT".
Posted: 15 Aug 2014 | Published: 15 Aug 2014

TechTarget ComputerWeekly.com

Step Up to Cisco Premier
sponsored by Comstor
WHITE PAPER: Access this one-page resource to learn about Step Up to Cisco Premier, a unique training that can help your associates receive the Cisco Premier certification so you can identify your company as a qualified, trained, and experienced Cisco resource.
Posted: 08 Feb 2012 | Published: 27 Jan 2012

Comstor

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Inclusion = everyone: Expert advice for improving tech diversity
sponsored by TechTarget ComputerWeekly.com
WHITE PAPER: At the Computer Weekly diversity in tech event, experts proposed a 15-point plan to improve diversity and inclusion across the industry. Suggestions focused on getting people into the sector and keeping them there. Download the full report here.
Posted: 02 Mar 2023 | Published: 03 Mar 2023

TechTarget ComputerWeekly.com

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security