Reskilling Reports

CW Europe – September 2018: Costs stack up for Dutch government IT projects
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.
Posted: 08 Feb 2021 | Published: 14 Sep 2018

TechTarget ComputerWeekly.com

CW Nordics - August-October 2021: Klarna alumni energise Stockholm's startup scene
sponsored by TechTarget ComputerWeekly.com
EZINE: Klarna has not only grown into a well-known Swedish fintech brand, but former staff have gone on to create some of the Nordic region's new startup ventures. Find out more about the so-called 'Klarna academy'. Also read in this issue why growing tech companies in Stockholm say the city's startup environment needs to diversify more.
Posted: 16 Aug 2021 | Published: 26 Aug 2021

TechTarget ComputerWeekly.com

Business continuity planning essential for protecting patients, organizations
sponsored by HP & Intel®
EGUIDE: Something as seemingly trivial as a truck hitting a telephone pole can suddenly leave health care employees unable to access clinical applications and patient data. This tip discusses how providers can create, and update, business continuity plans to ensure that key systems and processes are maintained.
Posted: 20 Sep 2011 | Published: 20 Sep 2011

HP & Intel®

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat

Seven Steps for Effective Leadership Development
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the technology that can be deployed to extend talent management practices across the enterprise with a focus on leadership positions.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

Oracle Corporation

Computer Weekly – 21 February 2023: Innovation not infestation – digitising pest control
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Rentokil Initial is using digital innovations to improve the age-old task of pest control. Leading experts offer a 15-point plan to improve diversity and inclusion in IT. And with all the excitement around ChatGPT, we ask whether business is ready to use the AI chatbot. Read the issue now.
Posted: 22 Sep 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

Virgin Media Case Study: Virgin Media ignites productivity and collaboration with new learning and performance management system
sponsored by Cornerstone OnDemand
CASE STUDY: This case study explains how Virgin Media, a leading provider of broadband, TV, mobile phone and home phone services in the UK, was able to realize significant workforce gains with a cloud-based learning and performance management system.
Posted: 15 May 2013 | Published: 31 Dec 2012

Cornerstone OnDemand

Skill Level and Training Key Factors in IT Project Success
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper provides an analysis of a comprehensive survey with 144 senior IT managers examining the impact training and skill level had on the success of 377 IT projects.
Posted: 01 Dec 2008 | Published: 26 Nov 2008

Hewlett Packard Enterprise

E-Book: Virtualizing Your Infrastructure Chapter 2: Virtualization Management Strategies and Guidelines
sponsored by TechTarget Data Center
EBOOK: Get an analysis of challenges that accompany server virtualization, and strategies to address them.
Posted: 07 Mar 2013 | Published: 31 Dec 2012

TechTarget Data Center

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies