Industry insider news for Australia's technology resellers
These search results are from across the Techday Network of sites
Time for channel professionals to get serious about their career credentials
Few universities teach indirect or channel marketing, which is posing challenges for employers that want to expand channel services.
IT Masters & CSU develop online phishing countermeasures short course
"Generally speaking, the security industry tends to minimise their profile to help reduce what we call the ‘honeypot effect’."
AUT launches online course to support Kiwi entrepreneurship
The Practical Innovation and Entrepreneurship Paper (ENTR770) welcomed its first official intake of students on March 14.
Learn how to bring data to life anywhere, anytime
Even if you have no previous experience with the programme, you can join the course as Dan starts you off from the very basics.
New online course to help make Kiwi workplaces safer
Between 2011- 2016 the number of fatal work-related incidents have been at an all time high.
Businesses are recognising the power of upskilling
Online learning is quickly becoming the primary means of upskilling, providing measurable value to businesses and their tech pros.
Teacher-focused online course provider raises $2.5 million in funding
"We're probably the largest online education company no one knows about," says Ankur Nagpal, Teachable founder.
Online courses grow in popularity, user demand becomes more complex
The e-learning market is growing rapidly, with more Massive Open Online Courses as well as commercial online courses available around the world.
eCoach: Making eLearning accessible for students
Futura Group has launched an eCoach Course Builder - a cloud-based platform that provides secondary school teachers with tools to build online courses
Computers help connect communities
A computer is a luxury not everyone can afford, but with the help of the Otago Polytechnic Digital Outreach Programme, those who need a helping hand will receive it.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?