EBOOK:
It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
EZINE:
Amsterdam University of Applied Sciences has launched a centre of expertise in applied artificial intelligence, and students from all faculties of the university will learn how to apply AI in their field of study.
INFOGRAPHIC:
It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
TRAINING GUIDE:
This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions.
WHITE PAPER:
This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program.
WHITE PAPER:
This white paper explains how MicroStrategy's enterprise strength, scalable platform and self-service technology enable organizations to achieve pervasive BI at the lowest industry ownership costs.
WHITE PAPER:
The CollabNet Agile Coaches have observed patterns and key milestones in the way organizations adopt and scale Agile. "Agile Transformation Strategy," by Angela Druckman, CollabNet Certified Scrum Trainer and Agile Transformational Coach, outlines a sound strategy and transformational "blueprint" to help guide organizations on the path to Agility.
EGUIDE:
Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
EZINE:
In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
EZINE:
Read in this issue how Philippine Long Distance Telephone Company (PLDT), has implemented a big data analytics environment, delivering invaluable behavioural insights for its capacity planning.