Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Instruction

RSS Feed    Add to Google    Add to My Yahoo!
Instruction Reports
 
IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Executing your strategy 3: Vision
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the third of a six part guide explains the key steps of the Strategic Execution Framework, developed to help organisations stay focused on innovation, increase performance, manage change and scale the business.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Overcoming the insight deficit
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Learn how you can empower your employees to make the most of big data and data analytics in this executive guide from the Corporate Executive Board.
Posted: 01 Feb 2012 | Published: 05 Sep 2011

ComputerWeekly.com

CEOs are from Mars, CIOs are from Venus
sponsored by ComputerWeekly.com
PRESENTATION: Ian Campbell, board advisor for Value Retail, talks about what CIOs need to do to ensure they are “on the same planet” as the CEO and board members of any organisation in this PowerPoint presentation.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

10 Tips to Measure Training ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: How do you measure the value of training to the business ? These tips will help you develop your business case.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

ComputerWeekly.com

Mortimer Spinks and Computer Weekly Women in IT survey 2016
sponsored by ComputerWeekly.com
EBOOK: The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

ComputerWeekly.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Executing your strategy 4: Synthesis
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the fourth of six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement