Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Staff Training

RSS Feed    Add to Google    Add to My Yahoo!
Staff Training Reports
 
BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

CW500:Future Gazing 2020 (II)
sponsored by ComputerWeekly.com
PRESENTATION: Professor Victor Newman, author, advisory board member and mentor at Social Innovation Lab Kent (Silk), gives his take on the future of the IT department in 2020.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

The Deloitte CIO Survey 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This ground breaking study from Deloitte, based on a survey of 700 CIOs world wide, gives you the latest trends in IT spending, technology and business priorities and CIO's career aspirations.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

ComputerWeekly.com

Benefits Management: How to increase the business value of your IT projects
sponsored by ComputerWeekly.com
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

ComputerWeekly.com

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

IBM Cognos Learning Assessment
sponsored by IBM
WHITE PAPER: This white paper introduces a customized learning assessment work package that extends the value of one business intelligence and performance management platform by teaching your business users the skills they need to drive success.
Posted: 15 Jan 2014 | Published: 31 Mar 2009

IBM

The dying art of storytelling; how to rejuvenate your training programme
sponsored by Skillsoft
WHITE PAPER: This white paper examines the art of storytelling as a tool in the training process and how you can get employees to retain information from training to apply it on the job.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

What Return on Investment Does e-Learning Provide?
sponsored by Skillsoft
WHITE PAPER: This paper discusses the benefits of e-learning programmes and how to get the maximum return on e-learning investments.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

Skillsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement