Business of Information Technology  >   Business Management  >   Human Resources Management  >  

End User Training

RSS Feed    Add to Google    Add to My Yahoo!
End User TrainingReports
 
Coding for Kids
sponsored by ComputerWeekly.com
BOOK: Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

ComputerWeekly.com

The global state of the project management office
sponsored by ComputerWeekly.com
IT BRIEFING: This global benchmarking study from ESI international identifies the key challenges and successes experienced by project and programme management offices (PMO) and draws recommendations for the future.
Posted: 05 Jan 2012 | Published: 05 May 2011

ComputerWeekly.com

Top 10 Project Management Trends for 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A global panel of experts identify the top 10 trends in project management in 2013
Posted: 05 Jan 2012 | Published: 24 Jan 2013

ComputerWeekly.com

Jim Norton: The boardroom view of IT
sponsored by ComputerWeekly.com
PRESENTATION: Jim Norton, former BCS president and chartered director, explains the 5 key roles of the CIO and offers tips to CIOs on building credibility with the board.
Posted: 07 Sep 2012 | Published: 05 Sep 2012

ComputerWeekly.com

SANS - Survey on Application Security Programs and Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Strategic IT
sponsored by ComputerWeekly.com
BOOK: Find out how two leading CIOs have enabled their organisations to use information technology as strategic driver, in this extract from the book Strategic IT.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Seven Steps for Effective Leadership Development
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the technology that can be deployed to extend talent management practices across the enterprise with a focus on leadership positions.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

Oracle Corporation

E-Book: Virtualizing Your Infrastructure Chapter 2: Virtualization Management Strategies and Guidelines
sponsored by SearchDataCenter.com
EBOOK: Get an analysis of challenges that accompany server virtualization, and strategies to address them.
Posted: 07 Mar 2013 | Published: 31 Dec 2012

SearchDataCenter.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement