Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Staff Training

RSS Feed    Add to Google    Add to My Yahoo!
Staff Training Reports
 
Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Defining the Business Change Agenda  
sponsored by ComputerWeekly.com
ANALYST REPORT: Is business transformation really the key to success ? This research from analyst group Freeform Dynamics offers some answers.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Women in IT: Labour shadow minister, Chi Onwura
sponsored by ComputerWeekly.com
PRESENTATION: Labour's shadow cabinet office minister, with responsibility for cyber security, Chi Onwura, gives her views on tackling the gender balance in this PowerPoint presentation.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

ComputerWeekly.com

Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Oklahoma State University Medical Center Case Study
sponsored by GE Healthcare
WHITE PAPER: Oklahoma State University Medical Center needed to upgrade image quality and physician access to cardiovascular patient information. This white paper describes an integrated imaging and workflow solution that enhanced cardiologist workflow, improved cardiac health management, and more.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

GE Healthcare

Executing your strategy 3: Vision
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the third of a six part guide explains the key steps of the Strategic Execution Framework, developed to help organisations stay focused on innovation, increase performance, manage change and scale the business.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

AstraZeneca: Success Story
sponsored by SuccessFactors
CASE STUDY: AstraZeneca was looking for a way to automate its manual duty assignment and logging training processes. Read this case study to learn how they accomplished this by implementing a learning management system to automate and streamline the assignment of all regulatory and job-specific training.
Posted: 09 Oct 2012 | Published: 27 Apr 2012

SuccessFactors

15 Top-Paying IT Certifications for 2014
sponsored by Global Knowledge
WHITE PAPER: It's always a good idea to take stock of your skills, your pay, and your certifications. To that end, here is a review of 15 of the top-paying certifications for 2014. With each certification, you'll find the average (mean) salary and a brief description.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Information Security ANZ July 2015
sponsored by TechTarget ANZ
EZINE: Analysts and security experts discuss the current risk factors in the ANZ region.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement