Business of Information Technology  >   Business Management  >   Human Resources Management  >  

End User Training

RSS Feed    Add to Google    Add to My Yahoo!
End User TrainingReports
 
2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

10 Tips to Measure Training ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: How do you measure the value of training to the business ? These tips will help you develop your business case.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

ComputerWeekly.com

Women in IT: Ann Brown HR Director of Capgemini
sponsored by ComputerWeekly.com
PRESENTATION: Ann Brown explains how Capgemini is managing the diversity of the IT workforce in this presentation for Computer Weekly's Most Influential Women in IT awards.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

ComputerWeekly.com

Leveraging Talent
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Learn how to make the most of your IT workforce and how to nurture talent by following these strategies used by HR professionals.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

The Deloitte CIO Survey 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This ground breaking study from Deloitte, based on a survey of 700 CIOs world wide, gives you the latest trends in IT spending, technology and business priorities and CIO's career aspirations.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

ComputerWeekly.com

The Changing Social Learning Landscape: Why You Need a Social LMS
sponsored by IBM
ANALYST REPORT: While employees need formal training upon entering a new job, they also need a complete learning environment that allows them to collaborate, network, and share information with coworkers. How are successful companies creating collaborative environments, and how can your organization do the same?
Posted: 06 Aug 2014 | Published: 08 Nov 2012

IBM

Maximising automation and the industrialisation of IT
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analysts Bob Tarzey and Clive Longbottom makes the case for automation in IT operations management.
Posted: 18 Feb 2013 | Published: 05 Dec 2012

ComputerWeekly.com

Four EHR Change Management Mistakes (And How to Avoid Them)
sponsored by HP & Intel®
WHITE PAPER: The question is no longer if your healthcare practice will make the transition to EHR, but when.  Careful planning and effective change management can help keep missteps – and the stress and costs that come with them – to a minimum.  This white paper presents strategies for avoiding common EHR implementation problems.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Wisegate

E-Book: Virtualizing Your Infrastructure Chapter 2: Virtualization Management Strategies and Guidelines
sponsored by SearchDataCenter.com
EBOOK: Get an analysis of challenges that accompany server virtualization, and strategies to address them.
Posted: 07 Mar 2013 | Published: 31 Dec 2012

SearchDataCenter.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement