Business of Information Technology  >   Business Management  >   Human Resources Management  >  

IT Education

RSS Feed    Add to Google    Add to My Yahoo!
IT Education Reports
 
IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

How to prepare for the Red Hat Certified System Administrator Exam
sponsored by Red Hat
DATA SHEET: This exclusive datasheet provides all the information candidates need to know when preparing to take the Red Hat Certified Administrator Exam. Find out how the performance-based format is designed to test your ability to accomplish tasks without assistance and what qualifications are needed for a passing score.
Posted: 28 Jan 2015 | Published: 30 May 2014

Red Hat

The Casper Suite from JAMF Software - For Business
sponsored by JAMF Software
WHITE PAPER: No platform offers better security or delivers a more productive user experience than Apple. And no tool manages Apple devicesbetter than the Casper Suite. View this resource to leran more about the software and the additional value it can provide your business.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

JAMF Software

Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Calculating Training ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from ESI International offers essential tips on calculating the return on investment of your training programme.
Posted: 16 Oct 2012 | Published: 16 Oct 2012

ComputerWeekly.com

Top 10 Project Management Trends for 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A global panel of experts identify the top 10 trends in project management in 2013
Posted: 05 Jan 2012 | Published: 24 Jan 2013

ComputerWeekly.com

2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

Adoption Readiness Tool (ART) Training and Services
sponsored by Hewlett-Packard Limited
WHITE PAPER: Well-trained users are more productive and more successful in carrying out their roles. This whitepaper looks at what companies can do to build custom training and documentation.
Posted: 12 Nov 2013 | Published: 01 Jan 2013

Hewlett-Packard Limited

eGuide: Tackle SharePoint Sprawl and Implement Effective Training Strategies
sponsored by AvePoint, Inc.
EGUIDE: Read this E-Guide and uncover key SharePoint training techniques and strategies. Learn which factors can lead to SharePoint sprawl and how your organization can regain control of your SharePoint deployment.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

AvePoint, Inc.

Social channels changing contact center certification
sponsored by Salesforce.com
EGUIDE: In this expert tip, find out which certification programs are getting overhauled, including those focused on individual call center managers and agents, such as the program from ICMI, and the costs associated with these certifications.
Posted: 20 Mar 2012 | Published: 20 Mar 2012

Salesforce.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement