Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Staff Training

RSS Feed    Add to Google    Add to My Yahoo!
Staff TrainingReports
 
Cisco Certifications
sponsored by Global Knowledge
WHITE PAPER: In the Cisco networking industry, there is a certification track for you, from the start of your career, through the advanced levels of network design and architecture. Click through to explore more.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Global Knowledge

The Changing Social Learning Landscape: Why You Need a Social LMS
sponsored by IBM
ANALYST REPORT: While employees need formal training upon entering a new job, they also need a complete learning environment that allows them to collaborate, network, and share information with coworkers. How are successful companies creating collaborative environments, and how can your organization do the same?
Posted: 06 Aug 2014 | Published: 08 Nov 2012

IBM

Technology Industry Survey 2014
sponsored by ComputerWeekly.com
RESOURCE: From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Defining the Business Change Agenda  
sponsored by ComputerWeekly.com
ANALYST REPORT: Is business transformation really the key to success ? This research from analyst group Freeform Dynamics offers some answers.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

High-tech, low-tech, no-tech
sponsored by ComputerWeekly.com
PRESENTATION: David Matthewman CIO of The Open University gives his take on the value of no-and low-tech innovation in this PowerPoint presentation.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Stories That Move Mountains: Improve your presentation skills
sponsored by ComputerWeekly.com
BOOK: Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Maximising automation and the industrialisation of IT
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analysts Bob Tarzey and Clive Longbottom makes the case for automation in IT operations management.
Posted: 18 Feb 2013 | Published: 05 Dec 2012

ComputerWeekly.com

Social channels changing contact center certification
sponsored by Salesforce.com
EGUIDE: In this expert tip, find out which certification programs are getting overhauled, including those focused on individual call center managers and agents, such as the program from ICMI, and the costs associated with these certifications.
Posted: 20 Mar 2012 | Published: 20 Mar 2012

Salesforce.com

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Wisegate
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement