Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Retraining

RSS Feed    Add to Google    Add to My Yahoo!
Retraining Reports
 
Fostering the next-generation of IT talent
sponsored by ComputerWeekly.com
PRESENTATION: Ian Cohen, group CIO of Jardine Lloyd Thompson discusses his experience in nurturing next-generation talent in the IT department in this PowerPoint presentation.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

ComputerWeekly.com

Overcoming the insight deficit
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Learn how you can empower your employees to make the most of big data and data analytics in this executive guide from the Corporate Executive Board.
Posted: 01 Feb 2012 | Published: 05 Sep 2011

ComputerWeekly.com

What Constitutes Effective Security Awareness Training?
sponsored by KnowBe4
WHITE PAPER: Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


How to measure successful internal talent mobility
sponsored by Oracle Corporation
WHITE PAPER: This resource reveals everything HR professionals, IT professionals, and business leaders need to know about internal talent mobility. With a strong internal mobility program, you can leverage your existing employee base to achieve corporate goals, shifting resources where they're best suited while keeping your employees engaged and content.
Posted: 03 Apr 2014 | Published: 31 Oct 2013

Oracle Corporation

Information Security ANZ March 2015
sponsored by SearchSecurity.com
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

Information Security Asean July 2016
sponsored by SearchSecurity.com
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

SearchSecurity.com

CW ANZ August 2016
sponsored by SearchDataCenter.com
EZINE: In this month's CW ANZ e-zine, analyze the impact of a cloud failure in Australia and it forced enterprises to take heads out of sand and focus on business-continuity strategies. Also, you'll learn how Domain raises its game with the public cloud, why New Zealand calls for tech specialists, and more.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

SearchDataCenter.com

Information Security ANZ July 2015
sponsored by TechTarget ANZ
EZINE: Analysts and security experts discuss the current risk factors in the ANZ region.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement