Computer Science Education Reports

Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.
Posted: 01 Mar 2022 | Published: 01 Mar 2022

TechTarget ComputerWeekly.com

CW APAC, March 2021: Tech career guide
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the qualities and skills that are required to be successful in DevOps.
Posted: 15 Mar 2021 | Published: 04 Mar 2021

TechTarget ComputerWeekly.com

Computer Weekly – 17 October 2023: The Most Influential Women in UK Technology 2023
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
Posted: 16 Oct 2023 | Published: 17 Oct 2023

TechTarget ComputerWeekly.com

Skill Level and Training Key Factors in IT Project Success
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper provides an analysis of a comprehensive survey with 144 senior IT managers examining the impact training and skill level had on the success of 377 IT projects.
Posted: 01 Dec 2008 | Published: 26 Nov 2008

Hewlett Packard Enterprise

Reducing Total Cost of Ownership: Delivering Cost Effective Enterprise Business Intelligence
sponsored by MicroStrategy
WHITE PAPER: This white paper explains how MicroStrategy's enterprise strength, scalable platform and self-service technology enable organizations to achieve pervasive BI at the lowest industry ownership costs.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

MicroStrategy

Information Security Asean July 2015
sponsored by TechTarget
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget

Gaining Control of Order Management Processes
sponsored by Esker Inc.
EBOOK: In this E-Book, designed for business and IT professionals, find out more about using technology to gain control of sales order management processes. Learn how to navigate the many technology choices and choose between on-premise or SaaS/cloud options. And get key considerations and best practices for optimizing sales order processes.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Esker Inc.

Information Security Asean July 2016
sponsored by TechTarget Security
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.