End User Training Reports

APAC 2021 Salary Survey Results
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Inside this guide, you'll find an overview of the career and salary trends we're seeing in APAC as well as a breakdown of the results from ANZ, ASEAN and India so you can see for your location which job functions are getting paid what, what IT professionals are thinking in terms of career, and their salary expectations for the next 12 months.
Posted: 13 May 2021 | Published: 13 May 2021

TechTarget ComputerWeekly.com

19 machine learning interview questions and answers
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Aspiring machine learning job candidates should be fluent in varied aspects of machine learning, from statistical theory and programming concepts to general industry knowledge. Read our list of commonly asked machine learning questions and accompanying answers to help you prepare for your interview.
Posted: 22 Jan 2023 | Published: 23 Jan 2023

TechTarget ComputerWeekly.com

Business Information Asean January 2016
sponsored by TechTarget Business Analytics
EZINE: Read in this issue how Philippine Long Distance Telephone Company (PLDT), has implemented a big data analytics environment, delivering invaluable behavioural insights for its capacity planning.
Posted: 23 Feb 2016 | Published: 04 Jan 2016

TechTarget Business Analytics

Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER: This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008

Avaya Inc.

Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Software

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

BYOD Security Policy Considerations and Best Practices
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security

Information Security ANZ July 2016
sponsored by TechTarget Security
EZINE: Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

Best Practices in Performance Management: Monitor, Measure and Manage the End User Experience
sponsored by Knoa Software
WHITE PAPER: This report is the result of a study taken by 87% of IT executives on the best way to manage the service of business critical applications to measure performance at the end-user level. Read this to learn the best practices in performance management.
Posted: 09 Sep 2008 | Published: 09 Sep 2008

Knoa Software

How the Internet of Things Is Blurring the Line between Consumer and Industrial Technology
sponsored by IBM
EGUIDE: According to Harbor Research, there will be some 36 billion connected devices by 2020. But how and where will these devices come online? Explore how the Internet of Things will blur the line between consumer and industrial technology with upcoming trends like virtual reality, wearables, and more.
Posted: 10 May 2016 | Published: 06 May 2016

IBM