Home Education Software Reports

Computer Weekly – 22 August 2023: Can low code/no code ease developer skills shortages?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with organisations increasingly turning to low-code/no-code tools to enable "citizen developers" among staff – we look at whether this can help to ease software developer skills shortages. Read the issue now.
Posted: 21 Aug 2023 | Published: 22 Aug 2023

TechTarget ComputerWeekly.com

Computer Weekly – 30 March 2021: The ticking timebomb of IR35
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal that IT contractors are seeking a multimillion-pound payout after confusion over the forthcoming IR35 tax reforms. Many firms are building data lakes to improve their analytics – we examine the storage implications. And we talk to the CIO at the London School of Economics. Read the issue now.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

TechTarget ComputerWeekly.com

Computer Weekly – 30 April 2019: Inside Huawei
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the new campus of Chinese networking supplier Huawei, to find out what the firm thinks of the controversy raging about the security of its products. Our latest buyer's guide examines storage optimisation technologies. And we look at the latest developments for technology in schools. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Apr 2019

TechTarget ComputerWeekly.com

Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Jan 2021

TechTarget ComputerWeekly.com

CW Middle East - July-September 2021: Pandemic speeds up edtech revolution in Gulf
sponsored by TechTarget ComputerWeekly.com
EZINE: One of the lessons the Covid-19 pandemic has taught governments across the world is that education providers can still teach when their premises are inaccessible. Read how organisations in the Gulf region's education sector have been quick to adopt the latest education technology, known as edtech, to help in this endeavour.
Posted: 23 Jun 2021 | Published: 08 Jul 2021

TechTarget ComputerWeekly.com

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.

Information Security ANZ July 2016
sponsored by TechTarget Security
EZINE: Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

Virtual Firsthand Training – A New Dimension of SAP® Education
sponsored by SAP America, Inc.
WHITE PAPER: This paper describes how new virtual learning options from the SAP® Education organization fulfill the requirements of many companies and consultants. Continue reading to learn how they reduce training investments, meet various needs, and offer a flexible learning approach.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

Information Security Asean March 2016
sponsored by TechTarget
EZINE: Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security