Staff Training Reports

Information Security ANZ July 2015
sponsored by TechTarget
EZINE: Analysts and security experts discuss the current risk factors in the ANZ region.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget

AMD Honored on CRN’s 5-Star Partner Programs Guide for Second Consecutive Year
sponsored by AMD
PRESS RELEASE: AMD was named  to CRN's 2011 Partner Programs Guide for its AMD Fusion Partner Program (FPP). CRN's  Partner Programs Guide recognizes  vendors  with robust partner programs or products  that provide the best possible partnering elements for channel success.
Posted: 15 Jun 2011 | Published: 28 Mar 2011

AMD

Ensuring Long-Term Success of BI/Analytics Projects: Train and Train Again
sponsored by SAP America, Inc.
WHITE PAPER: BI solutions are fast becoming a mainstay for organizations that recognize that proper collection and analysis of information can improve critical business processes. This paper provides key evaluation concerns for organizations looking to implement comprehensive training to ensure the success of their enterprise BI projects.
Posted: 20 Sep 2010 | Published: 20 Sep 2010

SAP America, Inc.

AstraZeneca: Success Story
sponsored by SuccessFactors
CASE STUDY: AstraZeneca was looking for a way to automate its manual duty assignment and logging training processes. Read this case study to learn how they accomplished this by implementing a learning management system to automate and streamline the assignment of all regulatory and job-specific training.
Posted: 09 Oct 2012 | Published: 27 Apr 2012

SuccessFactors

Computer Weekly – 21 February 2023: Innovation not infestation – digitising pest control
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Rentokil Initial is using digital innovations to improve the age-old task of pest control. Leading experts offer a 15-point plan to improve diversity and inclusion in IT. And with all the excitement around ChatGPT, we ask whether business is ready to use the AI chatbot. Read the issue now.
Posted: 22 Sep 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

E-Book: Virtualizing Your Infrastructure Chapter 2: Virtualization Management Strategies and Guidelines
sponsored by TechTarget Data Center
EBOOK: Get an analysis of challenges that accompany server virtualization, and strategies to address them.
Posted: 07 Mar 2013 | Published: 31 Dec 2012

TechTarget Data Center

15 Top-Paying IT Certifications for 2014
sponsored by Global Knowledge
WHITE PAPER: It's always a good idea to take stock of your skills, your pay, and your certifications. To that end, here is a review of 15 of the top-paying certifications for 2014. With each certification, you'll find the average (mean) salary and a brief description.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Business continuity planning essential for protecting patients, organizations
sponsored by HP & Intel®
EGUIDE: Something as seemingly trivial as a truck hitting a telephone pole can suddenly leave health care employees unable to access clinical applications and patient data. This tip discusses how providers can create, and update, business continuity plans to ensure that key systems and processes are maintained.
Posted: 20 Sep 2011 | Published: 20 Sep 2011

HP & Intel®

T-Systems: Flexible Offerings from SAP® Education Boost Expertise While Keeping Costs down
sponsored by SAP America, Inc.
CASE STUDY: This paper explains how T-Systems, an SAP global hosting partner and an outsourcing provider for SAP, turned to SAP Education to create an intensive SAP training course that greatly reduced the need for travel. Read on to learn the business benefits T-Systems has experienced since combining efforts with SAP Education.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security