Business of Information Technology  >   Business Management  >   Human Resources Management  >  

End User Training

RSS Feed    Add to Google    Add to My Yahoo!
End User Training Reports
 
The Mindset of the Chief Information Officer
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study evaluates the leadership role that Chief Information Officers performs in helping their organisations achieve their commercial goals
Posted: 29 Feb 2012 | Published: 29 Feb 2012

ComputerWeekly.com

Maximising automation and the industrialisation of IT
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analysts Bob Tarzey and Clive Longbottom makes the case for automation in IT operations management.
Posted: 18 Feb 2013 | Published: 05 Dec 2012

ComputerWeekly.com

Defining the Business Change Agenda  
sponsored by ComputerWeekly.com
ANALYST REPORT: Is business transformation really the key to success ? This research from analyst group Freeform Dynamics offers some answers.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

Governance of IT, an executive guide to ISO/IEC 38500
sponsored by ComputerWeekly.com
BOOK: This extract from the book: Governance of IT, an executive guide to ISO/IEC 38500, tells you the key things you need to consider before you start a project implementation.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

AMD Honored on CRN’s 5-Star Partner Programs Guide for Second Consecutive Year
sponsored by AMD
PRESS RELEASE: AMD was named  to CRN's 2011 Partner Programs Guide for its AMD Fusion Partner Program (FPP). CRN's  Partner Programs Guide recognizes  vendors  with robust partner programs or products  that provide the best possible partnering elements for channel success.
Posted: 15 Jun 2011 | Published: 28 Mar 2011

AMD

E-Guide: Tips for minimizing EHR implementation costs
sponsored by CDW Healthcare
EGUIDE: In the first year of EHR implementation, a small group practice can expect to pay about $120,000 per physician. That total includes productivity losses, training and network upgrades. This e-guide provides a real-world view of EHR costs and offers advice for reducing them.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

CDW Healthcare
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement