EZINE:
Amsterdam University of Applied Sciences has launched a centre of expertise in applied artificial intelligence, and students from all faculties of the university will learn how to apply AI in their field of study.
EGUIDE:
In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.
WHITE PAPER:
In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand.
WHITE PAPER:
BI solutions are fast becoming a mainstay for organizations that recognize that proper collection and analysis of information can improve critical business processes. This paper provides key evaluation concerns for organizations looking to implement comprehensive training to ensure the success of their enterprise BI projects.
TRAINING GUIDE:
This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions.
EGUIDE:
According to Harbor Research, there will be some 36 billion connected devices by 2020. But how and where will these devices come online? Explore how the Internet of Things will blur the line between consumer and industrial technology with upcoming trends like virtual reality, wearables, and more.
CASE STUDY:
The IT department of T-Com Human Resources was faced with the challenge of training 140,000 employees to perform reporting processes for their own business travel as quickly as possible. Read this case study to find out how T-Com found their way to datango in their search for a customizable context sensitive online help system.
EZINE:
Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.