Continuing Education Reports

Digital Revolution: Moving towards agility
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.
Posted: 08 Feb 2021 | Published: 21 Mar 2018

TechTarget ComputerWeekly.com

2023 IT Salary & Career Survey Infographic APAC
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: TechTarget's 2023 study of 1030 technology professionals provides an inside look at major trends in employment, perks, and staffing across APAC. Find out how many of your peers received a raise in the past year, how many are benefitting from flexible working conditions, and the top 3 postitions business are looking to fill in the next 12 months.
Posted: 04 Sep 2023 | Published: 05 Sep 2023

TechTarget ComputerWeekly.com

Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jun 2019

TechTarget ComputerWeekly.com

Information Security Asean July 2016
sponsored by TechTarget Security
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER: This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008

Avaya Inc.

Oracle Compatibility Developers Guide for Postgres Plus Advanced Server
sponsored by EnterpriseDB Corporation
TRAINING GUIDE: This guide describes the Oracle compatibility features of Postgres Plus Advanced Server. Oracle compatibility means that an application runs in an Oracle environment as well as in a Postgres Plus Advanced Server environment with minimal or no changes to the application code.
Posted: 30 Apr 2009 | Published: 14 Mar 2008

EnterpriseDB Corporation

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Paving the Way to a Successful Upgrade Project
sponsored by SAP America, Inc.
PRODUCT LITERATURE: The SAP Upgrade Assessment for SAP ERP service delivers the expert advice and assistance you need to upgrade to a new release of the SAP ERP application. Read this whitepaper to learn which of the four different options is right for you.
Posted: 06 Aug 2008 | Published: 01 Jan 2007

SAP America, Inc.

SAP® Knowledge Acceleration: For Effective Business Planning and Consolidation
sponsored by SAP America, Inc.
WHITE PAPER: Read this paper to learn how SAP® Knowledge Acceleration software for business planning and consolidation will help your organization acquire insight and reporting skills it needs to execute today and tomorrow. Read on to learn all the business benefits this SAP software will provide for your organization.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies