IT Agents  >  

IT Workforce

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Labor Market, Occupations, Workforce, Information Technology Workforce, Jobs, IT Profession, Labor
DEFINITION: This directly relates to the human factor (people) studies of a high technology workforce.
IT Workforce Reports
1 - 25 of 64 Matches Previous Page  |  Next Page
15 Top-Paying IT Certifications for 2015
sponsored by Global Knowledge
WHITE PAPER: Take a look at some of the top-paying certifications as determined by the more than 11,000 responses to our 2015 IT Skills and Salary Survey of your peers across North America. Certifications in IT security, networking, and systems management are at the top of the certification pay scale.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Global Knowledge

The major recruitment, skills and career development issues facing today's IT leaders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: La Fosse Associates executive search consultant Chris Chandler presents the key recruitment, skills and career development issues facing IT leaders in 2015.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

ComputerWeekly.com

Gartner Identity & Access Management Summit 2015
sponsored by Gartner
EVENT: At Gartner Identity & Access Management Summit, taking place on March 16 & 17 in London, you'll gain the insight you need to address complex IAM issues. Click through now to register and view the full agenda and speaker line-up for the summit.
Posted: 13 Feb 2015 | Published: 16 Jan 2015

Gartner

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

The IT Infrastructure Conversation: How To Prepare For the Next Generation of IT Needs
sponsored by IBM
WHITE PAPER: Access this valuable resource to learn more about conversation surrounding IT infastructures and how you can work to prepare your IT workers for the next-generation of new content, new participants, and new tone.
Posted: 12 Feb 2015 | Published: 31 Jul 2014

IBM

Enterprise Gamification: Playing to win
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Enterprise gamification is becoming increasingly important to delivering true business transformation, according to this report from Capgemini.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in the UK.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

ComputerWeekly.com

Can Your Organization Brave The New World of Advanced Cyber Attacks?
sponsored by Websense
WHITE PAPER: This white paper discusses three key factors that your enterprise needs to watch in order to fend off cyberattackers: Rapidly evolving attacks, enterprise mobility, and a shortage of security personnel.
Posted: 02 Feb 2015 | Published: 08 Jan 2015

Websense

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

The 15 MDM Providers That Matter Most, and How They Stack Up
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, Forrester identifies, evaluates, and compares the 15 foremost MDM providers, detailing how well each vendor fulfills key requirements and where each provider stands in relation to the others.
Posted: 08 Jan 2015 | Published: 30 Sep 2014

Symantec Corporation

2020 Information Management: A View into Technology's Future
sponsored by OpenText
WHITE PAPER: Access this insightful resource to look into the future of technology and how to take advantage of the new currency: information. Read on now to learn how to leverage "enterprise information management" (EIM) to unlock innovation potential without compromising productivity or security.
Posted: 17 Dec 2014 | Published: 23 Oct 2014

OpenText

The Technology Industry Survey 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This is the fourth annual Technology Industry Survey, produced by Computer Weekly and Mortimer Spinks. This year, 3,408 technology professionals shared their views on everything from how cautious they are with their personal data to how they feel about their current employer and what really keeps them happy at work.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

ComputerWeekly.com

Women in IT: Inspiring the next generation
sponsored by ComputerWeekly.com
BOOK: This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Rethinking People Costs in Enterprise IT
sponsored by Rackspace
WHITE PAPER: This informative white paper outlines a new way to assess IT hiring and compensation, as well as a new options for making central IT a driver of enterprise growth.
Posted: 03 Sep 2014 | Published: 11 Aug 2014

Rackspace

DevOps Q&A: Essential components, implementation roadblocks
sponsored by Rackspace
WHITE PAPER: This white paper contains insights from technology leaders on the trials and successes of collaboration between Development and Operations teams, and provides suggestions for companies looking to adopt the DevOps mindset.
Posted: 03 Sep 2014 | Published: 29 Aug 2014

Rackspace

A Better Way to Manage Desktops: HP Workplace Management Services
sponsored by Hewlett-Packard Limited
WHITE PAPER: Enterprises need to give employees a full, flexible and configurable managed desktop environment to meet diverse business requirements and user productivity needs. Find out how HP can help.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Limited

The Help Desk and the Network Operations Center: What MSPs Need and Why
sponsored by N-able Technologies
WHITE PAPER: This helpful resource defines and discusses network operations centers and help desks, including their functions, what differentiates them from one another, how they contribute to a managed service provider's business, and whether or not MSPs should consider outsourcing them.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

N-able Technologies

Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

15 Most Popular IT and Business Certifications for 2014
sponsored by Global Knowledge
WHITE PAPER: This report reviews the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

Leveraging Talent
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Learn how to make the most of your IT workforce and how to nurture talent by following these strategies used by HR professionals.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

CW Europe – September Edition
sponsored by ComputerWeekly.com
EZINE: CW Europe investigates how the IT sector is feeling as the UK computing curriculum commences. Are schools well equipped or unprepared?
Posted: 03 Sep 2014 | Published: 04 Sep 2014

ComputerWeekly.com

How to overcome roadblocks to legacy software replacement: a guide for IT leaders
sponsored by MSM Software
WHITE PAPER: This whitepaper gathers together the views of IT leaders from a recent survey of IT leaders and identifies the most typical roadblocks encountered when attempting to modernize legacy systems – as well as how they address those challenges.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

MSM Software

Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE: In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 03 Mar 2014 | Published: 05 Mar 2014

SearchSecurity.com
1 - 25 of 64 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement