Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Technical Training

RSS Feed    Add to Google    Add to My Yahoo!
Technical Training Reports
 
Harvey Nash CIO Survey 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Business are increasing their investment in technology more quickly than any time since 2006 as confidence returns in the economy, this global survey of IT leaders reveals.
Posted: 20 May 2014 | Published: 20 May 2014

ComputerWeekly.com

Big Data and Content Analytics: measuring the ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Calculating Training ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from ESI International offers essential tips on calculating the return on investment of your training programme.
Posted: 16 Oct 2012 | Published: 16 Oct 2012

ComputerWeekly.com

Executing your strategy 4: Synthesis
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the fourth of six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Hiring for the Future
sponsored by Sage (UK) Limited
WHITE PAPER: It's vital that you understand how potential employees view your organization. Access this guide to explore the 5 steps to attracting talent, reshaping your organization's recruitment strategy, and give yourself the competitive edge.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Sage (UK) Limited

What Constitutes Effective Security Awareness Training?
sponsored by KnowBe4
WHITE PAPER: Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Employees at the Frontline in the Battle Against Ransomware
sponsored by KnowBe4
WHITE PAPER: In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Women in IT: Labour shadow minister, Chi Onwura
sponsored by ComputerWeekly.com
PRESENTATION: Labour's shadow cabinet office minister, with responsibility for cyber security, Chi Onwura, gives her views on tackling the gender balance in this PowerPoint presentation.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

ComputerWeekly.com

The dying art of storytelling; how to rejuvenate your training programme
sponsored by Skillsoft
WHITE PAPER: This white paper examines the art of storytelling as a tool in the training process and how you can get employees to retain information from training to apply it on the job.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement