Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Instruction

RSS Feed    Add to Google    Add to My Yahoo!
InstructionReports
 
IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

CW+: Open Group technical report: IT Specialist Certification (ITSC) accreditation requirements
sponsored by ComputerWeekly.com
WHITE PAPER: The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

Top 10 Project Management Trends for 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A global panel of experts identify the top 10 trends in project management in 2013
Posted: 05 Jan 2012 | Published: 24 Jan 2013

ComputerWeekly.com

Top 10 Project Management Trends For 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: There is growing unease with the status quo of current project management practices, this report from ESI International reveals
Posted: 07 Jan 2014 | Published: 07 Jan 2014

ComputerWeekly.com

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

2014 IT Skills and Salary Report
sponsored by Global Knowledge
WHITE PAPER: Access this informative resource today to uncover findings from the 2014 IT Skills and Salary Survey. Analyzing results and trends from more than 16,000 participants, this data offers some very interesting insight into the state of today's IT and business landscape.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Global Knowledge

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

AMD Honored on CRN’s 5-Star Partner Programs Guide for Second Consecutive Year
sponsored by AMD
PRESS RELEASE: AMD was named  to CRN's 2011 Partner Programs Guide for its AMD Fusion Partner Program (FPP). CRN's  Partner Programs Guide recognizes  vendors  with robust partner programs or products  that provide the best possible partnering elements for channel success.
Posted: 15 Jun 2011 | Published: 28 Mar 2011

AMD

Course Catalog: Simpana Training Services and Programs
sponsored by CommVault Systems, Inc.
VIRTUAL TRADESHOW: Simpana Training Services Course Catalog January-June 2012.
Posted: 29 Feb 2012 | Premiered: Feb 29, 2012

CommVault Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement