Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Reskilling

RSS Feed    Add to Google    Add to My Yahoo!
ReskillingWhite Papers (View All Report Types)
 
The Value of ITIL® Certification
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses the true value of ITIL certifications to both businesses and individuals. Inside, discover real-world examples of how ITIL certification brought forth specific organizational improvements while proving to be a worthwhile individual investment.
Posted: 05 Feb 2013 | Published: 05 Feb 2013

Global Knowledge

CW+: Open Group technical document: IT Specialist Certification (ITSC) Conformance Requirements
sponsored by ComputerWeekly.com
WHITE PAPER: The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions.
Posted: 20 Oct 2011 | Published: 21 Oct 2010

ComputerWeekly.com

BlackBerry 10 Readiness Services: Migrate to BlackBerry 10 With Ease
sponsored by BlackBerry
WHITE PAPER: Read this white paper to learn about a platform with flexibility and choice built in to ensure you can find the right level of services to get your organization up and running on their devices as fast as possible.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

BlackBerry

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Virtual Firsthand Training – A New Dimension of SAP® Education
sponsored by SAP America, Inc.
WHITE PAPER: This paper describes how new virtual learning options from the SAP® Education organization fulfill the requirements of many companies and consultants. Continue reading to learn how they reduce training investments, meet various needs, and offer a flexible learning approach.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

The Seven Best Practices of Highly Effective eDiscovery Practitioners: Powerful Lessons in eDiscovery Success
sponsored by Guidance Software, Inc.
WHITE PAPER: The Seven Best Practices of Highly Effective eDiscovery Practitioners article provides legal professionals with insight on how they and other members of the eDiscovery team can achieve a repeatable, defensible in-house eDiscovery process. Read this paper to learn so much more.
Posted: 15 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

Training Options: Choose Quality Content and Then Delivery
sponsored by SAP America, Inc.
WHITE PAPER: This paper examines the importance of choosing a high-quality training provider and of having multiple training delivery options to facilitate a successful technology deployment. The paper also looks at the training offerings that enterprise application vendor SAP provides in this important market.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

Increased Effectiveness through Intentionally Designed Culture
sponsored by Ivar Jacobson Consulting
WHITE PAPER: Intentionally Designed Culture (IDC) is the systematic approach to identifying, effecting, and tracking the necessary behavioral changes in an organization.
Posted: 18 Jun 2008 | Published: 01 May 2008

Ivar Jacobson Consulting

The dying art of storytelling; how to rejuvenate your training programme
sponsored by Skillsoft
WHITE PAPER: This white paper examines the art of storytelling as a tool in the training process and how you can get employees to retain information from training to apply it on the job.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement