Business of Information Technology  >   Business Management  >   Human Resources Management  >  

End User Training

RSS Feed    Add to Google    Add to My Yahoo!
End User TrainingReports
 
Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Women in Technology 2012
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Women technology experts find their careers just as rewarding as men, but image problems are deterring new female recruits, this exclusive research from Computer Weekly and Mortimer Spinks reveals.
Posted: 09 Jul 2012 | Published: 12 Jul 2012

ComputerWeekly.com

Consumerisation and BYOD Purchasing Intentions Europe 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Women in IT: Labour shadow minister, Chi Onwura
sponsored by ComputerWeekly.com
PRESENTATION: Labour's shadow cabinet office minister, with responsibility for cyber security, Chi Onwura, gives her views on tackling the gender balance in this PowerPoint presentation.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

ComputerWeekly.com

Coding for Kids
sponsored by ComputerWeekly.com
BOOK: Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

ComputerWeekly.com

How Social Learning Boosts Skills Development
sponsored by IBM
WHITE PAPER: In this white paper, discover how a social learning program can improve engagement, reduce attrition, and increase speed of knowledge. Explore the common problems that social learning can help solve, the core components of a social learning initiative, and recommended actions for implementation.
Posted: 04 Aug 2014 | Published: 31 Jul 2013

IBM

Executing your strategy 3: Vision
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the third of a six part guide explains the key steps of the Strategic Execution Framework, developed to help organisations stay focused on innovation, increase performance, manage change and scale the business.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Learning & development: Can it really help to motivate and engage staff?
sponsored by Skillsoft
WHITE PAPER: This white paper discusses the importance of training and development initiatives in keeping employees engaged and motivated despite tough economic times.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Agile Transformation Strategy
sponsored by CollabNet
WHITE PAPER: The CollabNet Agile Coaches have observed patterns and key milestones in the way organizations adopt and scale Agile. "Agile Transformation Strategy," by Angela Druckman, CollabNet Certified Scrum Trainer and Agile Transformational Coach, outlines a sound strategy and transformational "blueprint" to help guide organizations on the path to Agility.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

CollabNet

E-Book: Virtualizing Your Infrastructure Chapter 2: Virtualization Management Strategies and Guidelines
sponsored by SearchDataCenter.com
EBOOK: Get an analysis of challenges that accompany server virtualization, and strategies to address them.
Posted: 07 Mar 2013 | Published: 31 Dec 2012

SearchDataCenter.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement