INFOGRAPHIC:
The 2023 Computer Weekly/TechTarget salary survey asked IT professionals around the world to share information about their salaries – take a look to find out how your salary compares to your peers, by job seniority, age, company size and gender.
EZINE:
Artificial intelligence roles abound in the era of digitisation. In this handbook, focused on AI in the Asia-Pacific region, Computer Weekly looks at AI ethics, how to make it as a machine learning engineer, Accenture's push for tech talent and cyber security research lab advice.
BOOK:
Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.
EGUIDE:
In this expert tip, find out which certification programs are getting overhauled, including those focused on individual call center managers and agents, such as the program from ICMI, and the costs associated with these certifications.
CASE STUDY:
AstraZeneca was looking for a way to automate its manual duty assignment and logging training processes. Read this case study to learn how they accomplished this by implementing a learning management system to automate and streamline the assignment of all regulatory and job-specific training.
TRAINING GUIDE:
This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions.
EGUIDE:
Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
WHITE PAPER:
This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
WHITE PAPER:
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.