Software  >   Applications Software  >   Enterprise Applications Software  >   Human Resources Software  >   Training Software  >  

Course Management Systems

RSS Feed    Add to Google    Add to My Yahoo!
Course Management Systems White Papers (View All Report Types)
 
New Ways of Learning Inside and Beyond the Organization
sponsored by Infor
WHITE PAPER: Major changes are happening to the ways we work and how we learn in the workplace. Explore this white paper to discover the changes happening and the new learning methods being adopted in the workplace.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Infor

Choosing an enterprise Learning Management System
sponsored by Infor
WHITE PAPER: This paper deals with an additional set of considerations often overlooked when purchasing a learning management system (LMS), focusing on two particular intangibles: post-purchase vendor support and hidden costs. Read on to learn about how to make the best LMS decision for your organization.
Posted: 18 Jul 2016 | Published: 18 Jul 2016

Infor

The Case for Integrate Learning
sponsored by Infor
WHITE PAPER: Discover integrated learning, a method that brings L&D, HR, and frontline operations together to ensure relevant competence and knowledge throughout the enterprise and beyond.
Posted: 19 Jul 2016 | Published: 19 Jul 2016

Infor

Delivering on the Promise of eLearning
sponsored by Adobe Systems, Inc.
WHITE PAPER: This white paper considers some of the reasons that institutions and enterprises are turning to eLearning to engage learners with ideas and information. It also gives suggestions for creating digital learning experiences that engage learners.
Posted: 19 Jul 2007 | Published: 01 May 2007

Adobe Systems, Inc.

Software Asset Management (SAM) Professional Services from HP
sponsored by HP and Microsoft
WHITE PAPER: Software allows you to thrive in the midst of change. Managing your software assets requires a partner who delivers more—and that’s HP Software Licensing & Management Solutions (SLMS). Download this brochure and learn more.
Posted: 02 Jul 2010 | Published: 02 Jul 2010

HP and Microsoft

5 Fallacies About the Role of Learning Content in Talent Management
sponsored by Skillsoft
WHITE PAPER: This short white paper identifies 5 of the most common fallacies about the role of learning content in talent management, and clears away the confusion by offering truths about how learning content integrates into a well-developed talent management strategy. Read now to learn more.
Posted: 28 Aug 2012 | Published: 30 Apr 2012

Skillsoft

Deciphering the Latest in iOS Open Source Healthcare Software
sponsored by CloudMine
WHITE PAPER: Learn how a Apple's newly released healthcare-focused, open source software framework can change the way healthcare app developers build and how they capture clinical research data in real-time.
Posted: 30 Jun 2016 | Published: 23 Mar 2016


Balancing Needs of Providers and Patients
sponsored by CloudMine
WHITE PAPER: Don't be one of the organizations that take a haphazard approach to leveraging the invaluable asset of your patients. Discover both sides of the communication divide and what steps to take to improve communication quickly.
Posted: 30 Jun 2016 | Published: 17 Mar 2016


How to Quickly Generate Org Charts
sponsored by Ingentis
WHITE PAPER: When hiring candidates or making other critical HR decisions, navigating complex organizational structures without visual data can make your job a lot harder. Learn about an automated org chart solution that can help you visualize company structure quickly by pulling data from your SAP HR apps and other systems.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

Ingentis

A CW buyer’s guide to Human Capital Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at what steps the industry has taken to improve talent management; bridging the gap between the cost savings promised by cloud technologies and the value they deliver; and how to recruit expertise in emerging technologies.
Posted: 13 Nov 2013 | Published: 01 Nov 2013

ComputerWeekly.com

Improve the success of HR systems implementation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Mark Martin, former HR executive at Direct Line Group and T-Mobile, lists the key questions you need to ask suppliers when selecting a HR Technology system.
Posted: 30 May 2014 | Published: 30 May 2014

ComputerWeekly.com

Collaborative Learning in a Project Environment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from ESI International explains how organisations can harness collaborative learning to drive better project management.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

ComputerWeekly.com

Systems Engineering for Dummies
sponsored by IBM
EBOOK: In this comprehensive e-book, learn everything you wanted to know about systems engineering and discover how to harness the complexity of developing smart, interconnected products.
Posted: 04 Nov 2013 | Published: 31 Dec 2012

IBM

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

About to Buy: Mobile Device Management Software
sponsored by SearchSecurity.com
EBOOK: Are you considering purchasing mobile device management (MDM) software? Read this "About to Buy" guide from SearchConsumerization.com for help making a smart MDM software purchase.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

SearchSecurity.com

The Benefits of Agentless Architecture
sponsored by Red Hat
WHITE PAPER: Discover in this white paper the top 12 benefits of implementing agentless IT architecture, utilizing an open source orchestration tool. Read on to learn to effectively manage systems by connecting to them over SSH, and employ a management tool that doesn't impose additional demands on your environment.
Posted: 11 Jul 2016 | Published: 31 Dec 2013

Red Hat

A Practical Approach to ITIL Adoption
sponsored by ServiceNow
EBOOK: The adoption of ITIL is widespread and tens of thousands of companies are already reaping its benefits. But, as with any process, there are a number of common ITIL adoption mistakes to avoid. Access this eBook to avoid the top 5 ITIL implementation mistakes and ensure the success of your efforts.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

ServiceNow

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Next-Generation Security in a Mobile Era
sponsored by SearchCIO.com
EBOOK: Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

SearchCIO.com

SearchConsumerization.com E-Guide: Enterprise device management: A brave new world
sponsored by SearchSecurity.com
EGUIDE: This exclusive E-Guide from SearchConsumerization.com examines the latest trends, news and analysis pertaining to IT device management today.
Posted: 10 May 2012 | Published: 09 May 2012

SearchSecurity.com

Distributed and Centralized Bypass Data Center Architectures Compared
sponsored by Emerson Network Power
WHITE PAPER: In this white paper, explore the principles of centralized versus distributed bypass data center backup, and discover how to apply each method to standalone monolithic and integrated-modular UPS architectures. Access an overview of weaknesses and capabilities of both system designs to simplify your decision-making process.
Posted: 08 Jun 2016 | Published: 31 Dec 2015

Emerson Network Power

About to Buy Guide: Mobile Device Management Software
sponsored by SearchSecurity.com
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

SearchSecurity.com

Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

The CIO's Guide to Avoiding IT Irrelevance: Build a Bridge with BYOD
sponsored by Matrix42
WHITE PAPER: Discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Dig into the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

Guide to Mobile Device Management Software
sponsored by SearchSecurity.com
EGUIDE: This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

SearchSecurity.com

Storage Through the Looking Glass
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Controlling the uncontrollable
sponsored by Microsoft
WHITE PAPER: 29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

Six steps to control the uncontrollable
sponsored by Microsoft
WHITE PAPER: Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.
Posted: 18 May 2016 | Published: 04 May 2016

Microsoft

Tablets and Smartphones in the Enterprise
sponsored by SearchSecurity.com
EBOOK: This expert ebook takes an in-depth look at the BYOD trend, its impact on business and IT, and what your organization can do to ensure its success in your environment.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

SearchSecurity.com

Mobile Security: A global perspective on emerging mobile security issues
sponsored by SearchSecurity.com
EZINE: This in-depth expert guide examines the mobile security issues that arise as organizations seek to empower their workers and connect better with consumers through increased enterprise mobility.
Posted: 09 Aug 2013 | Published: 09 Aug 2013

SearchSecurity.com

BYOD Security Strategies: Balancing BYOD Risks and Rewards
sponsored by SearchSecurity.com
EGUIDE: This expert guide takes an in-depth look at BYOD security strategies, outlining what crucial factors you need to keep in mind and how you can ensure a successful and secure BYOD initiative.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement