Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Education

RSS Feed    Add to Google    Add to My Yahoo!
EducationReports
 
Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

Maximising automation and the industrialisation of IT
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analysts Bob Tarzey and Clive Longbottom makes the case for automation in IT operations management.
Posted: 18 Feb 2013 | Published: 05 Dec 2012

ComputerWeekly.com

Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

Women in Technology 2012
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Women technology experts find their careers just as rewarding as men, but image problems are deterring new female recruits, this exclusive research from Computer Weekly and Mortimer Spinks reveals.
Posted: 09 Jul 2012 | Published: 12 Jul 2012

ComputerWeekly.com

Learning Computing: Why object orientated programming works.
sponsored by ComputerWeekly.com
JOURNAL ARTICLE: Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

ComputerWeekly.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

High-tech, low-tech, no-tech
sponsored by ComputerWeekly.com
PRESENTATION: David Matthewman CIO of The Open University gives his take on the value of no-and low-tech innovation in this PowerPoint presentation.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

Open Group technical document: IT Specialist Certification Accreditation Policy
sponsored by ComputerWeekly.com
WHITE PAPER: A common characteristic of people-certification programs in the marketplace is that most test or validate the existence of relevant knowledge. Few reach beyond this.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Lubrizol's Service Management Transformation
sponsored by HP & Intel®
CASE STUDY: Download this case study to discover how a company transitioned to a service-oriented organization in a timely and cost-effective manner by implementing HP education, software tools and ITSM services.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

HP & Intel®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement