Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Technical Training

RSS Feed    Add to Google    Add to My Yahoo!
Technical Training Reports
 
BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Benefits Management: How to increase the business value of your IT projects
sponsored by ComputerWeekly.com
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

ComputerWeekly.com

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Maximising automation and the industrialisation of IT
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analysts Bob Tarzey and Clive Longbottom makes the case for automation in IT operations management.
Posted: 18 Feb 2013 | Published: 05 Dec 2012

ComputerWeekly.com

Collaborative Learning in a Project Environment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from ESI International explains how organisations can harness collaborative learning to drive better project management.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

ComputerWeekly.com

Women in Technology 2012
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Women technology experts find their careers just as rewarding as men, but image problems are deterring new female recruits, this exclusive research from Computer Weekly and Mortimer Spinks reveals.
Posted: 09 Jul 2012 | Published: 12 Jul 2012

ComputerWeekly.com

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

Next-Generation Mainframe Computing
sponsored by CA Technologies.
WHITE PAPER: This white paper provides insight into the current state of the mainframe. Discover three challenges affecting the future of these technologies and learn how to successfully overcome them.
Posted: 15 Jul 2011 | Published: 15 Jul 2011

CA Technologies.

Business continuity planning essential for protecting patients, organizations
sponsored by HP & Intel®
EGUIDE: Something as seemingly trivial as a truck hitting a telephone pole can suddenly leave health care employees unable to access clinical applications and patient data. This tip discusses how providers can create, and update, business continuity plans to ensure that key systems and processes are maintained.
Posted: 20 Sep 2011 | Published: 20 Sep 2011

HP & Intel®

Learning & development: Can it really help to motivate and engage staff?
sponsored by Skillsoft
WHITE PAPER: This white paper discusses the importance of training and development initiatives in keeping employees engaged and motivated despite tough economic times.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement