Business of Information Technology  >   Business Management  >   Human Resources Management  >  

IT Training

RSS Feed    Add to Google    Add to My Yahoo!
IT Training Reports
 
Big Data analytics: Adoption and employment trends
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The report is first of its kind to identify current and future adoption rates for big data by type and size of organisation in the UK with information supplied by 1,000 businesses across the country.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

The Deloitte CIO Survey 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This ground breaking study from Deloitte, based on a survey of 700 CIOs world wide, gives you the latest trends in IT spending, technology and business priorities and CIO's career aspirations.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

ComputerWeekly.com

How to prepare for the Red Hat Certified System Administrator Exam
sponsored by Red Hat
DATA SHEET: This exclusive datasheet provides all the information candidates need to know when preparing to take the Red Hat Certified Administrator Exam. Find out how the performance-based format is designed to test your ability to accomplish tasks without assistance and what qualifications are needed for a passing score.
Posted: 28 Jan 2015 | Published: 30 May 2014

Red Hat

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

Four EHR Change Management Mistakes (And How to Avoid Them)
sponsored by HP & Intel®
WHITE PAPER: The question is no longer if your healthcare practice will make the transition to EHR, but when.  Careful planning and effective change management can help keep missteps – and the stress and costs that come with them – to a minimum.  This white paper presents strategies for avoiding common EHR implementation problems.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Business Information Asean January 2016
sponsored by SearchBusinessAnalytics
EZINE: Read in this issue how Philippine Long Distance Telephone Company (PLDT), has implemented a big data analytics environment, delivering invaluable behavioural insights for its capacity planning.
Posted: 23 Feb 2016 | Published: 04 Jan 2016

SearchBusinessAnalytics

15 Top-Paying IT Certifications for 2014
sponsored by Global Knowledge
WHITE PAPER: It's always a good idea to take stock of your skills, your pay, and your certifications. To that end, here is a review of 15 of the top-paying certifications for 2014. With each certification, you'll find the average (mean) salary and a brief description.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement