Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Education

RSS Feed    Add to Google    Add to My Yahoo!
Education Reports
 
The global state of the project management office
sponsored by ComputerWeekly.com
IT BRIEFING: This global benchmarking study from ESI international identifies the key challenges and successes experienced by project and programme management offices (PMO) and draws recommendations for the future.
Posted: 05 Jan 2012 | Published: 05 May 2011

ComputerWeekly.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Technology Industry Survey 2014
sponsored by ComputerWeekly.com
RESOURCE: From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Open Group technical document: IT Specialist Certification Accreditation Policy
sponsored by ComputerWeekly.com
WHITE PAPER: A common characteristic of people-certification programs in the marketplace is that most test or validate the existence of relevant knowledge. Few reach beyond this.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

Big Data analytics: Adoption and employment trends
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The report is first of its kind to identify current and future adoption rates for big data by type and size of organisation in the UK with information supplied by 1,000 businesses across the country.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Next-Generation Mainframe Computing
sponsored by CA Technologies.
WHITE PAPER: This white paper provides insight into the current state of the mainframe. Discover three challenges affecting the future of these technologies and learn how to successfully overcome them.
Posted: 15 Jul 2011 | Published: 15 Jul 2011

CA Technologies.

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Wisegate

E-Book: Virtualizing Your Infrastructure Chapter 2: Virtualization Management Strategies and Guidelines
sponsored by SearchDataCenter.com
EBOOK: Get an analysis of challenges that accompany server virtualization, and strategies to address them.
Posted: 07 Mar 2013 | Published: 31 Dec 2012

SearchDataCenter.com

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement