Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Continuing Education

RSS Feed    Add to Google    Add to My Yahoo!
Continuing EducationReports
 
Increase Your Earning Potential with Cisco Network Design Certifications and Skills
sponsored by Global Knowledge
WHITE PAPER: If you are an experienced network engineer, and you are thinking about making more money, one way to do that is by obtaining additional Cisco certifications and the associated skills in network design in order to receive higher compensation without changing jobs or careers.
Posted: 31 Oct 2013 | Published: 31 Oct 2013

Global Knowledge

IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Fostering the next-generation of IT talent
sponsored by ComputerWeekly.com
PRESENTATION: Ian Cohen, group CIO of Jardine Lloyd Thompson discusses his experience in nurturing next-generation talent in the IT department in this PowerPoint presentation.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

ComputerWeekly.com

Harvey Nash CIO Survey 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Business are increasing their investment in technology more quickly than any time since 2006 as confidence returns in the economy, this global survey of IT leaders reveals.
Posted: 20 May 2014 | Published: 20 May 2014

ComputerWeekly.com

Fighting Economic Crime in the Financial Services sector
sponsored by ComputerWeekly.com
IT BRIEFING: PwC examines the impact of Cybercrime on the financial services industry.
Posted: 27 Mar 2012 | Published: 26 Mar 2012

ComputerWeekly.com

The Global State of the PMO 2012
sponsored by ComputerWeekly.com
IT BRIEFING: This 2012 benchmarking survey from ESI assesses the role of the Project/Programme Management Office (PMO), its development to full-blown maturity and value to the business.
Posted: 17 May 2012 | Published: 17 May 2012

ComputerWeekly.com

Computer Weekly – 19 Aug 2014: Training school leavers could help organisations develop the IT skills they require and fill the growing skills gap
sponsored by ComputerWeekly.com
EZINE: While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses at university, the IT industry is failing to attract enough new talent. An ageing workforce means there is a "demographic time bomb in IT".
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement