Certification Reports

MicroScope – May 2023: Vendors need to listen and learn
sponsored by MicroScope
EZINE: In this month's MicroScope ezine, we look at why it is vital that vendors listen to partners and act on the feedback. We also look at what's next for HP's advancing sustainability programme, Amplify Impact. Read the issue now.
Posted: 04 May 2023 | Published: 05 May 2023

MicroScope

MicroScope – April 2023: The benefits of security accreditations
sponsored by MicroScope
EZINE: In this month's MicroScope ezine, we look at how industry-recognised certifications can strengthen business defences. We also see how ChatGPT offers the channel a chance to level the playing field. Read the issue now.
Posted: 31 Mar 2023 | Published: 07 Apr 2023

MicroScope

Step Up to Cisco Premier
sponsored by Comstor
WHITE PAPER: Access this one-page resource to learn about Step Up to Cisco Premier, a unique training that can help your associates receive the Cisco Premier certification so you can identify your company as a qualified, trained, and experienced Cisco resource.
Posted: 08 Feb 2012 | Published: 27 Jan 2012

Comstor

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat

Computer Weekly – 21 February 2023: Innovation not infestation – digitising pest control
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Rentokil Initial is using digital innovations to improve the age-old task of pest control. Leading experts offer a 15-point plan to improve diversity and inclusion in IT. And with all the excitement around ChatGPT, we ask whether business is ready to use the AI chatbot. Read the issue now.
Posted: 22 Sep 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

Can AI take education to a new level?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how LLMs are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how AI is impacting the semiconductor sector as big tech companies put off server upgrades. And we find out how GenAI is changing the way enterprise software works. Read the issue now.
Posted: 20 Nov 2023 | Published: 21 Nov 2023

TechTarget ComputerWeekly.com

T-Systems: Flexible Offerings from SAP® Education Boost Expertise While Keeping Costs down
sponsored by SAP America, Inc.
CASE STUDY: This paper explains how T-Systems, an SAP global hosting partner and an outsourcing provider for SAP, turned to SAP Education to create an intensive SAP training course that greatly reduced the need for travel. Read on to learn the business benefits T-Systems has experienced since combining efforts with SAP Education.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

Social channels changing contact center certification
sponsored by Salesforce.com
EGUIDE: In this expert tip, find out which certification programs are getting overhauled, including those focused on individual call center managers and agents, such as the program from ICMI, and the costs associated with these certifications.
Posted: 20 Mar 2012 | Published: 20 Mar 2012

Salesforce.com

Can virtual data centers (still) be secured by conventional methods?
sponsored by TechTarget Security
EZINE: The winners of Information Security magazine's Security 7 awards are announced. The Security 7 awards honor CISOs, security researchers and others at the top of their profession.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

TechTarget Security