IT Agents  >   Information Technology End Users  >   User Groups  >  

INTUG

RSS Feed    Add to Google    Add to My Yahoo!
INTUGReports
 
FM, IT and Data Centres
sponsored by ComputerWeekly.com
ANALYST REPORT: Are Facilities and IT data centre managers implacable enemies, or is it a case of different work priorities, asks analyst Clive Longbottom.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

International technology adoption & workforce issues
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This study from CompTia,  looks at technology and workforce recruitment trends across 10 countries.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Transcript: The Changing Role of the CIO
sponsored by Hewlett-Packard Company
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett-Packard Company

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by IBM and Crossview
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

IBM and Crossview

eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices
sponsored by RES Software
EBOOK: Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement