Instruction Reports

Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.
Posted: 01 Mar 2022 | Published: 01 Mar 2022

TechTarget ComputerWeekly.com

Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

Inside India: The world's IT powerhouse
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Covid-19 pandemic is turning out to be a big fork in the road for many companies. But what about the industry that keeps the lights on for them?
Posted: 08 Feb 2021 | Published: 12 Aug 2020

TechTarget ComputerWeekly.com

Top 10 Skills in Demand in 2010
sponsored by Global Knowledge
WHITE PAPER: In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand.
Posted: 25 Jan 2010 | Published: 25 Jan 2010

Global Knowledge

Stories That Move Mountains: Improve your presentation skills
sponsored by TechTarget ComputerWeekly.com
BOOK: Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

TechTarget ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security

BI: The Inconvenient Truth
sponsored by Kalido
WHITE PAPER: What’s the truth behind the failure of many BI projects? Read this paper to learn the main factors leading to disappointment. These pitfalls are not those of new entrants to BI but have been repeated by smart and well managed companies worldwide.
Posted: 04 Jun 2008 | Published: 01 Jan 2008

Kalido

CW Europe – June 2015
sponsored by TechTarget ComputerWeekly.com
EZINE: Employment across Europe - Why industry has a responsibility to ensure the IT workforce adds to Europe's economic value.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

TechTarget ComputerWeekly.com

Computer Weekly – 16 December 2014: MPs give Post Office the cold shoulder
sponsored by Intel Corporation
EZINE: In this week's Computer Weekly we revisit subpostmaster grievances with the Post Office's IT. Despite years of allegations that the Horizon transaction processing system was at fault for many accounting shortfalls, the Post Office unrelentingly defended it. Read the issue now.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Intel Corporation

Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER: This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008

Avaya Inc.