Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Employee Training

RSS Feed    Add to Google    Add to My Yahoo!
Employee TrainingReports
 
Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

CEOs are from Mars, CIOs are from Venus
sponsored by ComputerWeekly.com
PRESENTATION: Ian Campbell, board advisor for Value Retail, talks about what CIOs need to do to ensure they are “on the same planet” as the CEO and board members of any organisation in this PowerPoint presentation.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

Jim Norton: The boardroom view of IT
sponsored by ComputerWeekly.com
PRESENTATION: Jim Norton, former BCS president and chartered director, explains the 5 key roles of the CIO and offers tips to CIOs on building credibility with the board.
Posted: 07 Sep 2012 | Published: 05 Sep 2012

ComputerWeekly.com

The Value of ITIL® Certification
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses the true value of ITIL certifications to both businesses and individuals. Inside, discover real-world examples of how ITIL certification brought forth specific organizational improvements while proving to be a worthwhile individual investment.
Posted: 05 Feb 2013 | Published: 05 Feb 2013

Global Knowledge

Top 10 Project Management Trends For 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: There is growing unease with the status quo of current project management practices, this report from ESI International reveals
Posted: 07 Jan 2014 | Published: 07 Jan 2014

ComputerWeekly.com

Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

E-Guide: Tips for minimizing EHR implementation costs
sponsored by CDW Healthcare
EGUIDE: In the first year of EHR implementation, a small group practice can expect to pay about $120,000 per physician. That total includes productivity losses, training and network upgrades. This e-guide provides a real-world view of EHR costs and offers advice for reducing them.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

CDW Healthcare

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat

Step Up to Cisco Premier
sponsored by Comstor
WHITE PAPER: Access this one-page resource to learn about Step Up to Cisco Premier, a unique training that can help your associates receive the Cisco Premier certification so you can identify your company as a qualified, trained, and experienced Cisco resource.
Posted: 08 Feb 2012 | Published: 27 Jan 2012

Comstor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement