Employee Training Reports

A Computer Weekly buyer's guide to training programmes and tools
sponsored by TechTarget ComputerWeekly.com
EBOOK: It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

CW Benelux - May-July 2021: Netherlands university launches centre of expertise in applied AI
sponsored by TechTarget ComputerWeekly.com
EZINE: Amsterdam University of Applied Sciences has launched a centre of expertise in applied artificial intelligence, and students from all faculties of the university will learn how to apply AI in their field of study.
Posted: 26 Apr 2021 | Published: 13 May 2021

TechTarget ComputerWeekly.com

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Top 10 Skills in Demand in 2010
sponsored by Global Knowledge
WHITE PAPER: In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand.
Posted: 25 Jan 2010 | Published: 25 Jan 2010

Global Knowledge

Social channels changing contact center certification
sponsored by Salesforce.com
EGUIDE: In this expert tip, find out which certification programs are getting overhauled, including those focused on individual call center managers and agents, such as the program from ICMI, and the costs associated with these certifications.
Posted: 20 Mar 2012 | Published: 20 Mar 2012

Salesforce.com

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

BYOD Security Policy Considerations and Best Practices
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security

Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER: This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008

Avaya Inc.

IBM Cognos Learning Assessment
sponsored by IBM
WHITE PAPER: This white paper introduces a customized learning assessment work package that extends the value of one business intelligence and performance management platform by teaching your business users the skills they need to drive success.
Posted: 15 Jan 2014 | Published: 31 Mar 2009

IBM

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.