End User Training Reports

CIO Trends 2017 #2 ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.
Posted: 08 Feb 2021 | Published: 04 Jul 2017

TechTarget ComputerWeekly.com

Computer Weekly – 14 February 2023: Where next for NHS IT?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.
Posted: 10 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 17 October 2023: The Most Influential Women in UK Technology 2023
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
Posted: 16 Oct 2023 | Published: 17 Oct 2023

TechTarget ComputerWeekly.com

CW Nordics - August-October 2021: Klarna alumni energise Stockholm's startup scene
sponsored by TechTarget ComputerWeekly.com
EZINE: Klarna has not only grown into a well-known Swedish fintech brand, but former staff have gone on to create some of the Nordic region's new startup ventures. Find out more about the so-called 'Klarna academy'. Also read in this issue why growing tech companies in Stockholm say the city's startup environment needs to diversify more.
Posted: 16 Aug 2021 | Published: 26 Aug 2021

TechTarget ComputerWeekly.com

IBM Cognos Learning Assessment
sponsored by IBM
WHITE PAPER: This white paper introduces a customized learning assessment work package that extends the value of one business intelligence and performance management platform by teaching your business users the skills they need to drive success.
Posted: 15 Jan 2014 | Published: 31 Mar 2009

IBM

BI: The Inconvenient Truth
sponsored by Kalido
WHITE PAPER: What’s the truth behind the failure of many BI projects? Read this paper to learn the main factors leading to disappointment. These pitfalls are not those of new entrants to BI but have been repeated by smart and well managed companies worldwide.
Posted: 04 Jun 2008 | Published: 01 Jan 2008

Kalido

developerWorks Live! briefings
sponsored by IBM
RESOURCE CENTER: Attending one of the jam-packed IBM developerWorks Live! briefings will shorten your learning curve, and improve the quality and results of your most difficult software projects. Keep up-to-speed on the latest trends in the industry by signing up now for some of the most powerful briefings.
Posted: 20 Dec 2011 | Published: 20 Dec 2011

IBM

Informal Learning: Extending the Impact of Enterprise Ideas and Information
sponsored by Adobe
WHITE PAPER: Forward-thinking organizations are turning to enterprise learning in their quest to be better informed, better skilled, better supported at the point of need, and more competitive in their respective marketplaces.
Posted: 10 Apr 2008 | Published: 01 Apr 2007

Adobe

Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Software

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies