Continuing Education Reports

Mortimer Spinks and Computer Weekly Women in IT survey 2016
sponsored by TechTarget ComputerWeekly.com
EBOOK: The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.
Posted: 08 Feb 2021 | Published: 23 Jun 2016

TechTarget ComputerWeekly.com

Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jun 2019

TechTarget ComputerWeekly.com

CW APAC – Tech Career Guide: Artificial intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence roles abound in the era of digitisation. In this handbook, focused on AI in the Asia-Pacific region, Computer Weekly looks at AI ethics, how to make it as a machine learning engineer, Accenture's push for tech talent and cyber security research lab advice.
Posted: 20 Jul 2023 | Published: 20 Jul 2023

TechTarget ComputerWeekly.com

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Information Security Asean July 2016
sponsored by TechTarget Security
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

How the Internet of Things Is Blurring the Line between Consumer and Industrial Technology
sponsored by IBM
EGUIDE: According to Harbor Research, there will be some 36 billion connected devices by 2020. But how and where will these devices come online? Explore how the Internet of Things will blur the line between consumer and industrial technology with upcoming trends like virtual reality, wearables, and more.
Posted: 10 May 2016 | Published: 06 May 2016

IBM

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat

15 Top-Paying IT Certifications for 2014
sponsored by Global Knowledge
WHITE PAPER: It's always a good idea to take stock of your skills, your pay, and your certifications. To that end, here is a review of 15 of the top-paying certifications for 2014. With each certification, you'll find the average (mean) salary and a brief description.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Information Security Asean March 2016
sponsored by TechTarget
EZINE: Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget