Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Staff Training

RSS Feed    Add to Google    Add to My Yahoo!
Staff Training Reports
 
Executing your strategy 3: Vision
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the third of a six part guide explains the key steps of the Strategic Execution Framework, developed to help organisations stay focused on innovation, increase performance, manage change and scale the business.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Stories That Move Mountains: Improve your presentation skills
sponsored by ComputerWeekly.com
BOOK: Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

What Constitutes Effective Security Awareness Training?
sponsored by KnowBe4
WHITE PAPER: Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Consumerisation and BYOD Purchasing Intentions Europe 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Women in Technology 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Women IT professionals progress at the same rate in their careers as men but discrimination is still an issue, this research from Computer Weekly and Mortimer Spinks reveals.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

ComputerWeekly.com

Executing your strategy 4: Synthesis
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the fourth of six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Wisegate

Information Security ANZ July 2016
sponsored by SearchSecurity.com
EZINE: Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

SearchSecurity.com

The dying art of storytelling; how to rejuvenate your training programme
sponsored by Skillsoft
WHITE PAPER: This white paper examines the art of storytelling as a tool in the training process and how you can get employees to retain information from training to apply it on the job.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

How the Internet of Things Is Blurring the Line between Consumer and Industrial Technology
sponsored by IBM
EGUIDE: According to Harbor Research, there will be some 36 billion connected devices by 2020. But how and where will these devices come online? Explore how the Internet of Things will blur the line between consumer and industrial technology with upcoming trends like virtual reality, wearables, and more.
Posted: 10 May 2016 | Published: 06 May 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement