End User Training White Papers

(View All Report Types)
Inclusion = everyone: Expert advice for improving tech diversity
sponsored by TechTarget ComputerWeekly.com
WHITE PAPER: At the Computer Weekly diversity in tech event, experts proposed a 15-point plan to improve diversity and inclusion across the industry. Suggestions focused on getting people into the sector and keeping them there. Download the full report here.
Posted: 02 Mar 2023 | Published: 03 Mar 2023

TechTarget ComputerWeekly.com

Reducing Total Cost of Ownership: Delivering Cost Effective Enterprise Business Intelligence
sponsored by MicroStrategy
WHITE PAPER: This white paper explains how MicroStrategy's enterprise strength, scalable platform and self-service technology enable organizations to achieve pervasive BI at the lowest industry ownership costs.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

MicroStrategy

Simplifying the Management of Tier 1 ERP Systems for Mid-Sized Companies
sponsored by Oracle Corporation
WHITE PAPER: This white paper will discuss the impact of Tier 1 systems on IT departments in terms of ongoing maintenance, demonstrating that Tier 1 systems make many IT tasks easier, ranging from new-report generation to user training to upgrade management.
Posted: 04 May 2009 | Published: 04 May 2009

Oracle Corporation

Four Steps to a Best-Run Business
sponsored by SAP America, Inc.
WHITE PAPER: This document describes how you can build a strategy to unify and run your business more effectively.
Posted: 17 Sep 2008 | Published: 17 Sep 2008

SAP America, Inc.

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

How to measure successful internal talent mobility
sponsored by Oracle Corporation
WHITE PAPER: This resource reveals everything HR professionals, IT professionals, and business leaders need to know about internal talent mobility. With a strong internal mobility program, you can leverage your existing employee base to achieve corporate goals, shifting resources where they're best suited while keeping your employees engaged and content.
Posted: 03 Apr 2014 | Published: 31 Oct 2013

Oracle Corporation

Best Practices in Performance Management: Monitor, Measure and Manage the End User Experience
sponsored by Knoa Software
WHITE PAPER: This report is the result of a study taken by 87% of IT executives on the best way to manage the service of business critical applications to measure performance at the end-user level. Read this to learn the best practices in performance management.
Posted: 09 Sep 2008 | Published: 09 Sep 2008

Knoa Software

The key to Effective EHR Change Management
sponsored by HP & IntelĀ®
WHITE PAPER: There are many factors to consider when rolling out an EHR implementation, and one of the most important is getting your people behind the change. This paper provides insight into where your staff may be in terms of resistance to or support for a new EHR system, and the necessary tools, training and support to transition successfully.
Posted: 01 Aug 2013 | Published: 15 Sep 2011

HP & IntelĀ®

15 Top-Paying IT Certifications for 2014
sponsored by Global Knowledge
WHITE PAPER: It's always a good idea to take stock of your skills, your pay, and your certifications. To that end, here is a review of 15 of the top-paying certifications for 2014. With each certification, you'll find the average (mean) salary and a brief description.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies